Fuzzy Keyword Search over Encrypted Data in Cloud

Authors(4) :-Prof. Sonali Kale, Yash Gulati, Pooja Ghorpade, Avinash Savake

For privacy concerns, a secure search over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner; instead, they support multiple owners to share the benefits brought by cloud computing. In this paper, we propose schemes to deal with Privacy preserving Ranked Multi-keyword Search in a Multi-owner model (PRMSM). To enable cloud servers to perform secure search without knowing the actual data of both keywords and trapdoors, we systematically construct a novel secure search protocol. To rank the search results and preserve the privacy of relevance scores between keywords and files, we propose a novel Additive Order and Privacy Preserving Function family. To prevent the attackers from eavesdropping secret keys and pretending to be legal data users submitting searches, we propose a novel dynamic secret key generation protocol and a new data user authentication protocol. Hence, some cloud information retrieval schemes has been planned to resolve this drawback, these schemes not only will search the information they have properly, however can also stop sensitive information leaked out. During this paper, we tend to survey the privacy protective cloud information retrieval scheme and provide a comparison of them with regard to the key principles of search and privacy security.

Authors and Affiliations

Prof. Sonali Kale
Department of Computer Engineering, Savitribai phule University/Trinity Academy of Engineering, Pune, Maharashtra, India
Yash Gulati
Department of Computer Engineering, Savitribai phule University/Trinity Academy of Engineering, Pune, Maharashtra, India
Pooja Ghorpade
Department of Computer Engineering, Savitribai phule University/Trinity Academy of Engineering, Pune, Maharashtra, India
Avinash Savake
Department of Computer Engineering, Savitribai phule University/Trinity Academy of Engineering, Pune, Maharashtra, India

Fuzzy Keyword, Encrypted Data, RMSM, cloud servers, CSP

  1. J. Ye, J. Wang, J. Zhao, J. Shen, K-C Li, “Fine-grained searchable encryption in multi-user setting,” Soft Compute DOI 10.1007/s00500-016-2179-x, © Springer-Verlag Berlin Heidelberg 2016.
  2. G. Arthi et.al, “Efficient search of Data in Cloud Computing using Cumulative Key,”  IJSTE - International     Journal of Science Technology & Engineering, Volume 2, Issue 09, March 2016.
  3. J. Shen et.al, “Privacy Preserving Search Schemes over Encrypted Cloud Data: A Comparative Survey,” 2015 First International Conference on Computational Intelligence Theory, Systems and Applications.
  4. W. Zhang et.al, “Secure Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing,” 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
  5. W. Zhang, Y. Lin, “Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing,” Member, IEEE, JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARY 2015.

Publication Details

Published in : Volume 2 | Issue 3 | May-June 2017
Date of Publication : 2017-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 630-633
Manuscript Number : CSEIT1723232
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Prof. Sonali Kale, Yash Gulati, Pooja Ghorpade, Avinash Savake, "Fuzzy Keyword Search over Encrypted Data in Cloud ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.630-633, May-June-2017. |          | BibTeX | RIS | CSV

Article Preview