scispace - formally typeset
Open AccessProceedings Article

A cluster based multi-keyword search on outsourced encrypted cloud data

Rohit Handa, +1 more
- pp 115-120
TLDR
This paper proposes a cluster based privacy preserving multi-keyword search scheme over encrypted cloud data that retains the security requirements as proposed in the existing approaches in literature but provides results efficiently.
Abstract
Cloud provides an illusion of infinite storage to the user at limited setup and usage cost. Due to the availability of resources at low initial investment cost and fast internet speed, the organizations are motivated to outsource their data on cloud. But storing secure and confidential data on cloud introduces many security risks, namely data leakage, data theft and reduced control on data. In order to maintain confidentiality, the data is encrypted before outsourcing it to cloud. But this introduces the problem of efficient searching on the cloud. Several approaches exist for searching on this encrypted data stored on cloud but require large number of comparisons and time to search the desired documents. In this paper, we propose a cluster based privacy preserving multi-keyword search scheme over encrypted cloud data. The proposed search scheme retains the security requirements as proposed in the existing approaches in literature but provides results efficiently. Experimental results demonstrate the effectiveness of the proposed search scheme as it reduces the number of comparisons required to search the desired document by 80% for dataset with 6000 documents. Also, the time required to search the desired documents is also reduced by 70% for the same dataset as compared to the existing efficient search schemes in literature.

read more

Citations
More filters
Journal ArticleDOI

Searchable encryption: A survey on privacy‐preserving search schemes on encrypted outsourced data

TL;DR: This paper attempts to present a complete taxonomy/classification of the searchable encryption schemes in terms of the type of search, type of index, results retrieved, implementation type, multiplicity of users, and the technique used.
Proceedings ArticleDOI

Dynamic Cluster based Privacy-Preserving Multi-Keyword Search over encrypted cloud data

TL;DR: The proposed dynamic search scheme posses all the security requirements as proposed in the existing approaches in literature but provides searching and dynamic updates results efficiently and the cost of index generation is reduced as compared to existing available searching schemes which support tree-based index.
Proceedings ArticleDOI

Privacy Preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data

TL;DR: Privacy Preserving Synonym Based Fuzzy Multi-Keyword Ranked Search Over Encrypted Cloud Data is proposed, a scheme which enhances user search experience to a paramount by providing both fuzzy and synonym based multi-keyword ranked search, thereby taking encrypted search experience closer to free text search engines.
Journal ArticleDOI

Document clustering for efficient and secure information retrieval from cloud

TL;DR: Experimental results using real datasets demonstrate that the proposed multi‐keyword ranked search scheme on encrypted cloud data significantly reduce the number of comparisons and search time in comparison to the existing techniques while maintaining recall of 100% and precision of 82%.
Book ChapterDOI

An Efficient Multi-keyword Synonym-Based Fuzzy Ranked Search Over Outsourced Encrypted Cloud Data

TL;DR: A multi-keyword synonym based fuzzy ranked search (MSFRS) scheme over outsourced encrypted cloud data which provides efficient search results retaining the security features of the existing schemes.
References
More filters
ReportDOI

The NIST Definition of Cloud Computing

Peter Mell, +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Proceedings ArticleDOI

Practical techniques for searches on encrypted data

TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Book ChapterDOI

Public Key Encryption with Keyword Search

TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Journal ArticleDOI

Cloud computing

Brian Hayes
TL;DR: As software migrates from local PCs to distant Internet servers, users and developers alike go along for the ride.
Book ChapterDOI

Privacy preserving keyword searches on remote encrypted data

TL;DR: This paper offers solutions for the problem of efficiently retrieving some of the encrypted files containing (or indexed by) specific keywords, keeping the keywords themselves secret and not jeopardizing the security of the remotely stored files.
Related Papers (5)