Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 2
Abstract
Cloud computing has recently emerged as a new platform for deploying, managing, and provisioning large-scale services through an Internet-based infrastructure. However, concerns of sensitive information on cloud potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable symmetric encryption (SSE) allows retrieval of encrypted data over cloud. Here, focus on addressing data privacy issues using SSE. For the first time, formulate the privacy issue from the aspect of similarity relevance and scheme robustness. We observe that server-side ranking based on order-preserving encryption (OPE) inevitably leaks data privacy. To eliminate the leakage, propose a two-round searchable encryption (TRSE) scheme that supports top-k multi keyword retrieval. In TRSE, employ a vector space model and homomorphic encryption. The vector space model helps to provide sufficient search accuracy, and the homomorphic encryption enables users to involve in the ranking while the majority of computing work is done on the server side by operations only on cipher text. As a result, information leakage can be eliminated and data security is ensured. Thorough analysis shows that proposed solution enjoys “as-strong-as possible” security guarantee compared to previous SSE schemes, while correctly realizing the goal of keyword search. Extensive experimental results demonstrate the efficiency of the proposed solution.
Authors and Affiliations
Juvairiya K P , Rasheeda Z Khan
An Efficient Classification Approach for Novel Class Detection by Evolving Feature Datastreams
Data stream classification has been an extensively studied research problem in recent years. data stream classification requires efficient and effective techniques that are significantly different from static data classi...
A Survey of Machine Learning Algorithm in Network Traffic Classification
Network Traffic Classification is an emerging research area and now a day the research is widely used in various activities such as intrusion detection system and for security purpose. Many of the protocols and proposed...
A Study of Local Binary Pattern Method for Facial Expression Detection
Face detection is a basic task for expression recognition. The reliability of face detection & face recognition approach has a major role on the performance and usability of the entire system. There are several ways...
Detection of Spoofing Using Packet Marking Algorithm
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. However the localization infrastructure can be subjected to non cryptographic attacks, such as signal at...
MIMO Schemes With Spatial Modulation in Wireless Communication
The combination of spatial modulation (SM) and space-time block coding (STBC) provides more advantages than other modulation techniques. In the MA-SM system, the transmitted symbols are mapped into a high dimensional con...