CFP last date
20 May 2024
Reseach Article

A Dynamic K-means Algorithm for Searching Conserved Encrypted Data in a Cloud

by Avinash C., Hasritha P., Abhinay J.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 5
Year of Publication: 2015
Authors: Avinash C., Hasritha P., Abhinay J.
10.5120/ijca2015906918

Avinash C., Hasritha P., Abhinay J. . A Dynamic K-means Algorithm for Searching Conserved Encrypted Data in a Cloud. International Journal of Computer Applications. 129, 5 ( November 2015), 33-38. DOI=10.5120/ijca2015906918

@article{ 10.5120/ijca2015906918,
author = { Avinash C., Hasritha P., Abhinay J. },
title = { A Dynamic K-means Algorithm for Searching Conserved Encrypted Data in a Cloud },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 5 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 33-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number5/23073-2015906918/ },
doi = { 10.5120/ijca2015906918 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:22:39.175193+05:30
%A Avinash C.
%A Hasritha P.
%A Abhinay J.
%T A Dynamic K-means Algorithm for Searching Conserved Encrypted Data in a Cloud
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 5
%P 33-38
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The owner of large amount of data chooses cloud facility to outsource their precious data. For the purpose of privacy the data owners encrypted their data before outsourcing. This encryption hides the connection between the documents. So this makes the ciphertext search critical. Caused by software/hardware failure, data search results returning to the users may carry injured data. Thus, a verifiable method should be provided for users to verify the accuracy of the search results. This paper proposes a hierarchical clustering method in order to get a better clustering result. This method is based on k-means clustering algorithm. Every document will be clustered and hashed; this hash result will be used as the representative of the document. This paper gives a new search technique to adopt the backtracking algorithm on the above clustering method. With the increment of the data volume, the usefulness of the proposed method in rank privacy tends to be more evident. By appealing the Merkle hash tree and cryptographic signature to authenticated tree anatomy, we give a verification mechanism to persuade the accuracy and perfectness of query results. By using this method, the search time increased only sequentially not exponentially. The exploratory result demonstrates that the proposed system solves multi keyword search problems and also brings the relevance between retrieved documents and raises the search efficiency.

References
  1. 1. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword search over encrypted data in cloud computing,” in Proc. of IEEE INFOCOM’10 Mini-Conference, San Diego, CA, USA, March 2010.
  2. A.Singhal, “Modern information retrieval: A brief overview,” IEEE Data Engineering Bulletin, vol. 24, no. 4, pp. 35–43, 2001
  3. D. X. Song, D. Wagner and A. Perrig, "Practical techniques for searches on encrypted data. in Security and Privacy", 2000. S&P 2000, Proceedings 2000 IEEE Symposium, IEEE, (2000).
  4. C. Chen, X. J. Zhu, P. S. Shen, and J. K. Hu, ”A Hierarchical Clustering Method For Big Data Oriented Ciphertext Search,” presented at Proc. BigSecurity, Toronto, Canada, Apr. 27-May. 2, 2014.
  5. Y.-C. Chang and M. Mitzenmacher, “Privacy preserving keyword searches on remote encrypted data,” in Proc. of ACNS’05, 2005.
  6. N. Cao, "Privacy-preserving multi-keyword ranked search over encrypted cloud data", INFOCOM, 2011 Proceedings IEEE, IEEE, (2011).
  7. C. Wang, N. Cao, J. Li, K. Ren, and W. J. Lou, ”Secure Ranked Keyword Search over Encrypted Cloud Data,” in Proc. ICDCS, Genova, ITALY, 2010.
  8. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362–375, 2013.
  9. D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” SIAM Journal on Computing, vol. 32, no. 3, pp. 586–615, 2003.
  10. H. H. Pang, and K. L. Tan, ”Authenticating query results in edge computing,” in Proc. ICDE, Boston, MA, 2004, pp. 560-571.
  11. H. H. Pang, and K. L. Tan, ”Authenticating query results in edge computing,” in Proc. ICDE, Boston, MA, 2004, pp. 560-571.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Ciphertext Multi-keyword search Hierarchical Clustering Security Query Symmetric Key encryption.