A Survey on Semantic Search Encryption Using Cloud Computing

Authors

  • Dr. R. Shankar  Assistant Professor, Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamilnadu, India
  • R. Gowriprakash  M.Phil Research scholar, Department of Computer Science, Chikkanna Government Arts College, Tirupur, Tamilnadu, India

Keywords:

Searchable Symmetric Encryption, Cloud Computing, Web Ontology Language, Fuzzy Concept, GCP, RSL

Abstract

As Cloud Computing becomes widely, more and spread sensitive data are being centralized into the cloud. Data in outsourced to the public cloud for economic savings and ease of access. However, the privacy information has to be encrypted to guarantee the security. To implement efficient data utilization, search over encrypted cloud data has been a great challenge. The existing solutions depended entirely on the submitted keyword-based search schemes, and almost all of them depend on predefined keywords extracted in the phases of index construction and query. In view of the deficiency, as an attempt, we propose a semantic expansion based similar search solution over encrypted cloud data. Our solution could return not only the exactly matched files, but also the files including the terms semantically related to the query keyword. In the proposed scheme, a corresponding file metadata is constructed for each file. Then both the encrypted metadata set and file collection are uploaded to the cloud server. Further more, we a basic idea for significantly improved scheme to satisfy the security guarantee of searchable symmetric encryption (SSE).

References

  1. Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, and Wenjing Lou. Privacy-preserving query over encrypted graph structured data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pages 393–402. IEEE, 2011.
  2. Khorshed, M.T., Ali, A.S., Wasimi, S.A. “Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning”, Security and Privacy in Computing Communications (TrustCom), 2011 IEEE 10th International Conference on, 2011, pp 757-764.
  3. S.Miranda- Jimnez, A.Gelbukh, and G.Sidorov, ”Summarizing conceptual graphs for automatic summarization task,” Conceptual Structures for STEM Research and Education, Springer Berlin Heidelberg,pp. 245-253,2013.
  4. R. Ferreira, L.de Souza Cabral, and R.D. Lins, ”Assessing sentence scoring techniques for extractive text summarization,” Expert systems with applications,vol.40,no.14,pp.5755-5764,2013.
  5. Z.Fu, X.Sun,and Q.Liu,”Achieving Efficien tCloud Search Services: Multi keyword Ranked Search over Encrypted Cloud Data Supporting ParallelComputing,”IEICETransactionsonCommunications,vol.98,no.1,pp.190-200,2015.
  6. S. Ji, G. Li, C. Li, and J. Feng, “Efficient interactive fuzzy keyword search,” in Proc. of WWW’09,2009.
  7. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,” in Proc. of ICDCS’10,2010.
  8. Wang, li et al [2014] - Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data.
  9. Wang, Yu et al [2014] Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud.
  10. Y. Zhu, G. J. Ahn, H. Hu, S. S. Yau, H. G. An, and C. J. Hu, ”Dynamic audit services for outsourced storages in cloud,” IEEE Transactions on Services Computing. vol. 6, no. 2, pp.227-238, Apr.-Jun. 2013. 0018.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. R. Shankar, R. Gowriprakash, " A Survey on Semantic Search Encryption Using Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.759-763, May-June-2018.