CFP last date
22 April 2024
Reseach Article

Comparison of Privacy Preserving Single-Keyword Search and Multi-Keyword Ranked Search Techniques over Encrypted Cloud Data

by Madane S.A., B.M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 126 - Number 14
Year of Publication: 2015
Authors: Madane S.A., B.M. Patil
10.5120/ijca2015906307

Madane S.A., B.M. Patil . Comparison of Privacy Preserving Single-Keyword Search and Multi-Keyword Ranked Search Techniques over Encrypted Cloud Data. International Journal of Computer Applications. 126, 14 ( September 2015), 34-38. DOI=10.5120/ijca2015906307

@article{ 10.5120/ijca2015906307,
author = { Madane S.A., B.M. Patil },
title = { Comparison of Privacy Preserving Single-Keyword Search and Multi-Keyword Ranked Search Techniques over Encrypted Cloud Data },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 126 },
number = { 14 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume126/number14/22624-2015906307/ },
doi = { 10.5120/ijca2015906307 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:17:29.183331+05:30
%A Madane S.A.
%A B.M. Patil
%T Comparison of Privacy Preserving Single-Keyword Search and Multi-Keyword Ranked Search Techniques over Encrypted Cloud Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 126
%N 14
%P 34-38
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing otherwise known as on demand computing. It provides the services over the internet. It has the provision of facilitating users to store and access their data in and from cloud server by sitting anywhere and on any device. Storing data in cloud server also opens up so many security threats as data is accessed over internet and client has no direct control over data once uploaded into cloud server. We first implement a basic idea for the Single Keyword Search Over Encrypted Data And then Multi-keyword Ranked. Search over Encrypted cloud data (MRSE) based on secure inner product computation and efficient similarity measure of coordinate matching, i.e., as many matches as possible, in order to capture the relevance of data documents to the search query, then we give two significantly improved MRSE schemes to achieve various stringent privacy requirements in two different threat models. Assignment of anonymous ID to the user to provide more security to the data on cloud server is done. To improve the search experience of the data search service, further extension of the two schemes to support more Search semantics is done.[5]

References
  1. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc.IEEE INFOCOM, pp. 829-837, Apr, 2011.
  2. Secure Ranked Keyword Search over Encrypted Cloud Data , IEEE PAER, 2010.
  3. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 2, February 2014).
  4. Privacy preserving public auditing for Secure Cloud Storage”, Cong Wang, Sherman S.-M. Chow, Qian Wang, Kui Ren.
  5. Shiba Sampat Kale et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7093-7096
  6. Kuchi Ravi Kishore, et al International Journal of Computer and Electronics Research [Volume 4, Issue 2, April 2015]
  7. Li, S. Yu, N. Cao, and W. Lou. Authorized private keyword search over encrypted data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pages 383–392. IEEE, 2011
  8. Boldyreva, N. Chenette, Y. Lee, and A. O’Neill. Order-reserving symmetric encryption. In Proceedings of Eurocrypt'09, volume 5479 of LNCS. Springer, 2009.
  9. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, “Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data,” Proc. IEEE INFOCOM, 2012.
  10. Boldyreva, N. Chenette, Y. Lee, and A. O’Neill. Order-preserving symmetric encryption. In Proceedings of Eurocrypt'09, volume 5479 of LNCS. Springer,
  11. International Journal of Advance Research, IJOAR.org Volume 3, Issue 2, February 2015, Online: ISSN 2320-9194
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Encryption Inner product similarity Single Keyword Search Multi-keyword search ranking.