Skip to main content

Privacy Preserving Ranked Keyword Search over Encrypted Cloud Data

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 420))

Abstract

This paper presents a scheme that discusses secure rank based keyword search over an encrypted cloud data. The data that has to be outsourced is encrypted using symmetric encryption algorithm for data confidentiality. The index file of the keyword set that can be searched is outsourced to the local trusted server where the keyword set that is generated from the data files is also stored. Unlike architectures proposed in previous papers where encrypted index is stored in un-trusted server, in our schema the index is stored in the local trusted server to reduce round trip time and processing overhead. This is done so that the un-trusted server cannot learn about the data with the help of the index formed. The index is created with the help of Aho-Corasick multiple string matching algorithm which matches the pre-defined set of keywords with information in the data files to index them and store relevant data in B+ trees. Whenever the user searches for a keyword, the request is sent to the local trusted server and the indexed data is referred. The files are retrieved and ranked based on certain relevance criteria. The parameters required for ranking is got from the data stored while indexing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proc. of IEEE Symposium on Security and Privacy 2000 (2000)

    Google Scholar 

  2. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proc. of IEEE INFOCOM 2010 Mini-Conference (2010)

    Google Scholar 

  5. Wang, C., Cao, N., Ren, K., Lou, W.: Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data. IEEE Transactions on Parallel and Distributed Systems 23(8) (2012)

    Google Scholar 

  6. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proc. of ICDCS 2010 (2010)

    Google Scholar 

  7. Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient Constructions. In: Proc. of ACM CCS 2006(2006)

    Google Scholar 

  8. Rajan, R.: Efficient and Privacy Preserving Multi User Keyword Search For Cloud Storage Services. International Journal of Advanced Technology and Engineering Research (IJATER) 2(4) (2012) ISSN 2250 - 3536

    Google Scholar 

  9. Khan, Z.A., Pateriya, R.K.: Multiple Pattern String Matching Methodologies: A Comparative Analysis (2012)

    Google Scholar 

  10. Witten, I.H., Moffat, A., Bell, T.C.: Managing gigabytes: Compressing and indexing documents and images. Morgan Kaufmann Publishing, San Francisco (1999)

    Google Scholar 

  11. Moataz, T., Shifka, A.: Boolean Symmetric Searchable Encryption

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nepolean, D., Karthik, I., Preethi, M., Goyal, R., Vanethi, M.K. (2014). Privacy Preserving Ranked Keyword Search over Encrypted Cloud Data. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54525-2_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54524-5

  • Online ISBN: 978-3-642-54525-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics