Abstract
This paper presents a scheme that discusses secure rank based keyword search over an encrypted cloud data. The data that has to be outsourced is encrypted using symmetric encryption algorithm for data confidentiality. The index file of the keyword set that can be searched is outsourced to the local trusted server where the keyword set that is generated from the data files is also stored. Unlike architectures proposed in previous papers where encrypted index is stored in un-trusted server, in our schema the index is stored in the local trusted server to reduce round trip time and processing overhead. This is done so that the un-trusted server cannot learn about the data with the help of the index formed. The index is created with the help of Aho-Corasick multiple string matching algorithm which matches the pre-defined set of keywords with information in the data files to index them and store relevant data in B+ trees. Whenever the user searches for a keyword, the request is sent to the local trusted server and the indexed data is referred. The files are retrieved and ranked based on certain relevance criteria. The parameters required for ranking is got from the data stored while indexing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proc. of IEEE Symposium on Security and Privacy 2000 (2000)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005)
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proc. of IEEE INFOCOM 2010 Mini-Conference (2010)
Wang, C., Cao, N., Ren, K., Lou, W.: Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data. IEEE Transactions on Parallel and Distributed Systems 23(8) (2012)
Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proc. of ICDCS 2010 (2010)
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient Constructions. In: Proc. of ACM CCS 2006(2006)
Rajan, R.: Efficient and Privacy Preserving Multi User Keyword Search For Cloud Storage Services. International Journal of Advanced Technology and Engineering Research (IJATER)Â 2(4) (2012) ISSN 2250 - 3536
Khan, Z.A., Pateriya, R.K.: Multiple Pattern String Matching Methodologies: A Comparative Analysis (2012)
Witten, I.H., Moffat, A., Bell, T.C.: Managing gigabytes: Compressing and indexing documents and images. Morgan Kaufmann Publishing, San Francisco (1999)
Moataz, T., Shifka, A.: Boolean Symmetric Searchable Encryption
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nepolean, D., Karthik, I., Preethi, M., Goyal, R., Vanethi, M.K. (2014). Privacy Preserving Ranked Keyword Search over Encrypted Cloud Data. In: MartÃnez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-54525-2_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54524-5
Online ISBN: 978-3-642-54525-2
eBook Packages: Computer ScienceComputer Science (R0)