Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 2

Abstract

Cloud computing has recently emerged as a new platform for deploying, managing, and provisioning large-scale services through an Internet-based infrastructure. However, concerns of sensitive information on cloud potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable symmetric encryption (SSE) allows retrieval of encrypted data over cloud. Here, focus on addressing data privacy issues using SSE. For the first time, formulate the privacy issue from the aspect of similarity relevance and scheme robustness. We observe that server-side ranking based on order-preserving encryption (OPE) inevitably leaks data privacy. To eliminate the leakage, propose a two-round searchable encryption (TRSE) scheme that supports top-k multi keyword retrieval. In TRSE, employ a vector space model and homomorphic encryption. The vector space model helps to provide sufficient search accuracy, and the homomorphic encryption enables users to involve in the ranking while the majority of computing work is done on the server side by operations only on cipher text. As a result, information leakage can be eliminated and data security is ensured. Thorough analysis shows that proposed solution enjoys “as-strong-as possible” security guarantee compared to previous SSE schemes, while correctly realizing the goal of keyword search. Extensive experimental results demonstrate the efficiency of the proposed solution.

Authors and Affiliations

Juvairiya K P , Rasheeda Z Khan

Keywords

Related Articles

Feature Subset Selection with Fast Algorithm Implementation

The Title “Feature Subset Selection with FAST Algorithm Implementation” has intended to show the things occurred in between the searches happened in the place of client and server. The users clearly know about the proces...

Implementation of an Efficient RBAC Technique of Cloud Computing in .Net Environment

Cloud Computing is flourishing day by day and it will continue in developing phase until computers and internet era is in existence. While dealing with cloud computing, a number of security and traffic related issues are...

A Survey of an Adaptive Weighted Spatio-Temporal Pyramid Matching For Video Retrieval

Recently, in the field of video analysis and retrieval Human action recognition in video is an important research and challenging topic. An efficient video retrieval is needed to search most similar and relevant video co...

Automatic Generation of Standard Deviation Attribute Profiles for Spectral–Spatial Classification of Remote Sensing Data

In recent years, the development of high-resolution remote sensing image extends the visual field of the terrain features. Back Propagation neural network is widely used in remote sensing image classification in recent y...

M-Privacy Preserving Synergetic for Data Publishing

In this paper, our focus is on the study of Data mining is the extraction of interesting patterns or knowledge from huge amount of data. In recent years, with the explosivedevelopment in Internet, data storage and data...

Download PDF file
  • EP ID EP115945
  • DOI -
  • Views 129
  • Downloads 0

How To Cite

Juvairiya K P, Rasheeda Z Khan (2014). Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 9(2), 72-77. https://europub.co.uk/articles/-A-115945