Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 2

Abstract

Cloud computing has recently emerged as a new platform for deploying, managing, and provisioning large-scale services through an Internet-based infrastructure. However, concerns of sensitive information on cloud potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable symmetric encryption (SSE) allows retrieval of encrypted data over cloud. Here, focus on addressing data privacy issues using SSE. For the first time, formulate the privacy issue from the aspect of similarity relevance and scheme robustness. We observe that server-side ranking based on order-preserving encryption (OPE) inevitably leaks data privacy. To eliminate the leakage, propose a two-round searchable encryption (TRSE) scheme that supports top-k multi keyword retrieval. In TRSE, employ a vector space model and homomorphic encryption. The vector space model helps to provide sufficient search accuracy, and the homomorphic encryption enables users to involve in the ranking while the majority of computing work is done on the server side by operations only on cipher text. As a result, information leakage can be eliminated and data security is ensured. Thorough analysis shows that proposed solution enjoys “as-strong-as possible” security guarantee compared to previous SSE schemes, while correctly realizing the goal of keyword search. Extensive experimental results demonstrate the efficiency of the proposed solution.

Authors and Affiliations

Juvairiya K P , Rasheeda Z Khan

Keywords

Related Articles

WLan Architecture

It is the review paper of Architecture of Wireless local area networks. In this paper we are discussing the architecture of wlan. A wireless LAN (WLAN) is a local area network based on wireless technology. Most modern lo...

An Effective Method of Eye Detection Using Segmentation and Projection

Face detection and eye detection has long been the subject of interest in practical implementation of image processing and vision. Moreover the exact pupil detection of eye is the cream of research as the basic step of r...

Locate Misplaced Objects! GPS-GSM-Bluetooth Enabled Tracking

Every house has had a history of searching for keys, pen-drives, wallets and hand-purses and it is such a tedious job, especially, when they are of utmost need. To reduce the hectic searching effort and time spent, a sys...

Private Grid Environment for Personal Users

The overall aim of this paper is to introduce the Private grid environment (PvGrid) as a ubiquitous grid environment that is not only owned and utilized by personal users but also deployed over their own devices. In this...

Adaptive Integration of P2P and Mobile-Ad-hoc-Networks by a Cross Modeled CHORD Protocol

We set DHT (Distributed Hash Table) centered P2P (Peer to Peer) program-Chord in to MANET (Mobile Ad-hoc Network) in this paper. Then, we propose a new routing modified scheme Cross Modeled Chord(CM-Chord) which bases on...

Download PDF file
  • EP ID EP115945
  • DOI -
  • Views 150
  • Downloads 0

How To Cite

Juvairiya K P, Rasheeda Z Khan (2014). Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(2), 72-77. https://europub.co.uk/articles/-A-115945