CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud Computing

by Vasudha Arora, S.S. Tyagi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 12
Year of Publication: 2015
Authors: Vasudha Arora, S.S. Tyagi

Vasudha Arora, S.S. Tyagi . Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud Computing. International Journal of Computer Applications. 127, 12 ( October 2015), 46-51. DOI=10.5120/ijca2015906567

@article{ 10.5120/ijca2015906567,
author = { Vasudha Arora, S.S. Tyagi },
title = { Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 12 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 46-51 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2015906567 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T23:19:46.116284+05:30
%A Vasudha Arora
%A S.S. Tyagi
%T Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 12
%P 46-51
%D 2015
%I Foundation of Computer Science (FCS), NY, USA

Cloud computing is a specialised form of distributed computing that introduces utilization models for remotely provisioning scalable and measured resources. The driving motivation behind the cloud computing is to provide IT resources as a service that encapsulates other IT resources. Data service outsourcing is one of the service that is economically enabled by the cloud computing. But in order to protect data privacy sensitive data has to be encrypted before outsourcing to the commercial public cloud. Data encryption protects data security to some extent, but this may lead to a compromise on the part of efficiency of storage and retrieval on the server. This paper analyzes various searchable encryption schemes where data owner itself is responsible for his data security. These searchable encryption schemes allow retrieval of encrypted data over the cloud thereby making data retrieval fast and efficient. These schemes also guarantee high security and efficiency.

  1. P. Mell, T. Grance,”The NIST Definition of Cloud Computing”, Version 15,10-7-09
  2. B.Reddy Kandukuri, V. Ramakrishna, A. Rakshit, “Cloud Security Issues”, 2009 IEEE International Conference on service computing(SSC 2009), September 2009, Bangalore. pp. 517-520.
  3. S. Subashini S, V. Kavitha, “A survey on security issues in service delivery models of cloud computing”, Journal of Network and Computer Applications Volume 34 issue 1 January 2011, pp.1-11.
  4. C. Wang, N. Cao, J. Li, K. Ren, W. Lou, “ Secure Ranked Keyword Search over Encrypted Cloud Data”, proc. IEEE 30th International Conference on Distributed Computing Systems(ICDCS ’10), 2010.
  5. D.Song, D. Wanger, and A. Perrig, “Practical Techniques for Searches on Encrypted Data” Proc. IEEE symp. Security and Privacy, 2000.
  6. .J. Yu, P. Lu, Y. Zhu, G. Xue, M. Li, “ Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data”, IEEE Transactions on Dependable and Secure Computing, vol. 10, No. 4, July 2013.
  7. D. Boneh, G. Crescenzo, R. Ostrovsky, G. Persiano, “ Public Key Encryption with Keyword Search”, Proc. International Conference on Theory and Applications of Cryptographic Techniques (Eurocrypt), 2004.
  8. R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,” Proc. ACM 13th Conf. Computer and Comm. Security (CCS), 2006.
  9. O S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r: Top-k Retrieval from a Confidential Index,” Proc. 12th International Conference on Extending Database Technology: Advances in Database Technology (EDBT), 2009.
  10. A. Swaminathan, Y. Mao, G.-M. Su, H. Gou, A.L. Varna, S. He, M. Wu, and D.W. Oard, “Confidentiality-Preserving Rank-Ordered Search,” Proc. Workshop Storage Security and Survivability, 2007.
  11. C. Wang, N. Cao, K. Ren, W. Lou, “ Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”, IEEE Transactions On Parallel and Distributed Systems, Vol. 23, No. 8, August 2012.
  12. P.S. Priya, D. Preethi, J. Priya, B. Shanthini, “ Retrieval of Encrypted Data Using Multi Keyword Top-k Algorithm”, International Journal of Scientific and Research Publications, Vol. 4, Issue 4, April 2014.
  13. P. Akriti, P. Mary Ann, D. Sarvanan, “ Ranked Keyword Search Using RSE over Outsourced Cloud Data”, IPASJ International Journal of Computer Science, Vol. 2, Issue 3, March 2014.
  14. E. Christal Joy, K. Indira, “ Multi keyword Ranked Search over Encrypted Cloud Data”, International Journal of Applied Engineering Research, Vol. 9, No. 20, pp 7149-7176, 2014.
  15. L. K. Pillai, P. Saranya, “ Towards Secure Top-K Multi Keyword Retrieval over Encrypted Cloud Data”, International Journal of Scientific Research and Management(IJSRM), Vol. 2, Issue 6, pp 950-955, 2014.
  16. R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, “Order Preserving Encryption for Numeric Data”, SIGMOD ’04 Proc. Of 2004 ACM SIGMOD International Conference on Management of Data, pp 563-574, 2004.
  17. L. Xiao, I. Yen, “Security Analysis for Order Preserving Encryption Schemes”, IEEE, 2012.
  18. A. Boldyreva, N. Chenette, Y. Lee, A. Neill, “ Order Preserving Symmetric Encryption”, Advances in Cryptology- CRYPTO 2011, 31st Annual International Cryptography Conference, LNCS, Springer, 2011.
  19. S. Agarwal, A. Choubey, “Survey of Fully Homomorphic Encryption and Its Potential to Cloud Computing Security”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 7, July 2014.
  20. S. Zittrower, C.C. Zou, “ Encrypted Phrase Searching in the Cloud”, IEEE Globecom 2012-Communication and Information System Security Symposium, 2012.
  21. M.R. Girme, G. M. Bhandari, “Efficient Secure Ranked Search Algotithms over outsource Cloud Data”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Vol. 2, Issue 5, September –october 2013.
  22. A. Singhal, “ Modern Information Retrieval: A brief overview,” IEEE Data Engineering Bulletin, Vol. 24, No. 4, pp 35-43, 2001.
  23. M. Bellare, A. Boldyreva, A. O’Neill, “Deterministic and efficiently searchable encryption,” in proc. Of Eurocrypt’09, vol. 5479 of LNCS, Springer 2009.
  24. E.J. Goh, “Secure indexes”, Cryptology eprint Archieve, Report 2003/216, 2003,
  25. X. Sun, Y. Zhu, Z. Xia, L. Chen, “ Privacy-Preserving Keyword-based Semantic Search over Encrypted Cloud Data”, International Journal of Security and Its Applications, Vol. 8, No. 3, pp 9-20, 2014.
  26. K.W. Church and P. Hanks, “Word Association Norms, Mutual Information, and lexicography”,Computational Linguistics, Vol. 16, pp 22-29,1990.
  27. V. Arora, S.S. Tyagi “ Load Balancing Policies across virtual machines in a data center” IEEE International Conference on Reliability, Optimization and Information Technology ,pp 384-387, 2014.
Index Terms

Computer Science
Information Sciences


Data outsourcing data encryption searchable encryption