Book Details

AN EFFECTIVE SECURE KEYWORD SEARCH OVER ENCRYPTED OUTSOURCED CLOUD STORAGE

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC).

Download this PDF format

Abstract

As Cloud Computing becomes widespread, more and more sensitive data are being centralized into the cloud. Although normal searchable encryption schemes permit a user to securely search over encrypted data using keywords and retrieve files of its interest, these techniques support only perfect match keyword search. This work for the first time to formalizes and solves the problem of “Effective Keyword Search over Encrypted Cloud data”. It maintains privacy and security of keyword more than Effective Search. The keyword search greatly increase system usability by returning list of matching files when user’s searching inputs exactly match the predefined keywords or the closest possible matching files based on keyword similarity. In the proposed solution, the ranked search mechanism is constructing keyword sets based on two advanced techniques, which gives solution for optimized storage and representation overheads. Further a relevance score is built to form a searchable index and transformed from the resulted keyword sets. The data owner save their information with security and share the files into authenticate person with different level access permission

References

[1]. Cong Wang, Ning Cao,Kui Ren, Weijing Lou “ Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data” - 2012.

[2]. D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. of IEEE Symposium on Security and Privacy’00, 2000.

[3]. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword search over encrypted data in cloud computing ” inProc.of IEEE INFOCOM’10 Mini-Conference, 2010.

[4]. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” in Proc.of INFOCOM’11, 2011.

Keywords

Ranked search, searchable encryption, Cloud computing.

Image
  • Format Volume 2, Issue 1, No 1, 2014
  • Copyright All Rights Reserved ©2014
  • Year of Publication 2014
  • Author Gopinath Ganapathy, A.Kavitha
  • Reference IJCS-032
  • Page No 172-175

Copyright 2024 SK Research Group of Companies. All Rights Reserved.