Open AccessProceedings Article
A cluster based multi-keyword search on outsourced encrypted cloud data
Rohit Handa,Rama Krishna Challa +1 more
- pp 115-120
TLDR
This paper proposes a cluster based privacy preserving multi-keyword search scheme over encrypted cloud data that retains the security requirements as proposed in the existing approaches in literature but provides results efficiently.Abstract:
Cloud provides an illusion of infinite storage to the user at limited setup and usage cost. Due to the availability of resources at low initial investment cost and fast internet speed, the organizations are motivated to outsource their data on cloud. But storing secure and confidential data on cloud introduces many security risks, namely data leakage, data theft and reduced control on data. In order to maintain confidentiality, the data is encrypted before outsourcing it to cloud. But this introduces the problem of efficient searching on the cloud. Several approaches exist for searching on this encrypted data stored on cloud but require large number of comparisons and time to search the desired documents. In this paper, we propose a cluster based privacy preserving multi-keyword search scheme over encrypted cloud data. The proposed search scheme retains the security requirements as proposed in the existing approaches in literature but provides results efficiently. Experimental results demonstrate the effectiveness of the proposed search scheme as it reduces the number of comparisons required to search the desired document by 80% for dataset with 6000 documents. Also, the time required to search the desired documents is also reduced by 70% for the same dataset as compared to the existing efficient search schemes in literature.read more
Citations
More filters
Journal ArticleDOI
Searchable encryption: A survey on privacy‐preserving search schemes on encrypted outsourced data
TL;DR: This paper attempts to present a complete taxonomy/classification of the searchable encryption schemes in terms of the type of search, type of index, results retrieved, implementation type, multiplicity of users, and the technique used.
Proceedings ArticleDOI
Dynamic Cluster based Privacy-Preserving Multi-Keyword Search over encrypted cloud data
C. Rama Krishna,Rohit Handa +1 more
TL;DR: The proposed dynamic search scheme posses all the security requirements as proposed in the existing approaches in literature but provides searching and dynamic updates results efficiently and the cost of index generation is reduced as compared to existing available searching schemes which support tree-based index.
Proceedings ArticleDOI
Privacy Preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data
C. Rama Krishna,Sneha A. Mittal +1 more
TL;DR: Privacy Preserving Synonym Based Fuzzy Multi-Keyword Ranked Search Over Encrypted Cloud Data is proposed, a scheme which enhances user search experience to a paramount by providing both fuzzy and synonym based multi-keyword ranked search, thereby taking encrypted search experience closer to free text search engines.
Journal ArticleDOI
Document clustering for efficient and secure information retrieval from cloud
TL;DR: Experimental results using real datasets demonstrate that the proposed multi‐keyword ranked search scheme on encrypted cloud data significantly reduce the number of comparisons and search time in comparison to the existing techniques while maintaining recall of 100% and precision of 82%.
Book ChapterDOI
An Efficient Multi-keyword Synonym-Based Fuzzy Ranked Search Over Outsourced Encrypted Cloud Data
TL;DR: A multi-keyword synonym based fuzzy ranked search (MSFRS) scheme over outsourced encrypted cloud data which provides efficient search results retaining the security features of the existing schemes.
References
More filters
ReportDOI
The NIST Definition of Cloud Computing
Peter Mell,Timothy Grance +1 more
TL;DR: This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
Proceedings ArticleDOI
Practical techniques for searches on encrypted data
TL;DR: This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today.
Book ChapterDOI
Public Key Encryption with Keyword Search
TL;DR: This work defines and construct a mechanism that enables Alice to provide a key to the gateway that enables the gateway to test whether the word “urgent” is a keyword in the email without learning anything else about the email.
Journal ArticleDOI
Cloud computing
TL;DR: As software migrates from local PCs to distant Internet servers, users and developers alike go along for the ride.
Book ChapterDOI
Privacy preserving keyword searches on remote encrypted data
TL;DR: This paper offers solutions for the problem of efficiently retrieving some of the encrypted files containing (or indexed by) specific keywords, keeping the keywords themselves secret and not jeopardizing the security of the remotely stored files.