Enhanced Security for Dynamic Multi Keyword Ranked Search Using Greedy Best First Search

Authors(2) :-Bibin Baby, Sharmila Banu

Today, due to the enormous growth of data technology in cloud computing, the data owners are stimulated to outsource their data in data management to reduce cost and for the convenient. Data confidentiality, in general, can be obtained by encrypting the data before it is outsourced. The client stores the encrypted data to the cloud using Searchable encryption schemes and applies keyword search techniques over cipher text domain. But the main problem in outsourcing is the lack of security and privacy for the sensitive data. So, to overcome this, for privacy requirement, the sensitive data can be encrypted before it is outsourced. Various methods were proposed to preserve the privacy and to provide security to the cloud data which are encrypted. Here in this paper, we proposed a tree-based search method over the encrypted datain the cloud that supports dynamic operation and multi-keyword ranked search. Clearly, the commonly used “inverse document frequency (IDF) term frequency (TF)” model and the vector space method are joined in the query generation and index creation to give multi-keyword ranked search. To get high search efficiency, a tree-type index structure, “Greedy Best-first Search” algorithm is proposed based on the tree- index.

Authors and Affiliations

Bibin Baby
Assistant Professor, Department of Computer Science, Nilgiri College of Arts and Science, Thaloor, The Nilgris, Tamil Nadu, India
Sharmila Banu
Assistant Professor, Department of Computer Science, Providence College for Women, Coonor, The Nilgiris, Tamil Nadu, India

Cloud Computing, Security, Multi Keyword Search, Greedy Best First Search, Inverse Document Frequency, Term Frequency

  1. Q. Liu, G. Wang, and J. Wu, "Secure and privacy preserving keyword searching for cloud storage services,' Journal of Networks and Computer Applications, vol. 35, no. 3, pp. 927–933, May 2012
  2. C. Wang, N. Cao, K. Ren and W. Lou, -Enabling secure and efficient ranked keyword search over outsourced cloud data, IEEE Transactions on Parallel and Distributed Systems, vol. 23, issue 8, (2012) August, pp. 1467–1479.
  3. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data,' in Proc. of ICDCS'10, 2010.
  4. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, YT, Hou and H. L, -Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking, In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, (2013), pp. 71-82.
  5. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,' in IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222–233, 2014.
  6. Yu, Jiadi& Lu, Peng& Zhu, Yanmin&Xue, Guangtao& Li, Minglu. (2013). Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data. IEEE Transactions on Dependable and Secure Computing. 10.1109/TDSC.2013.9.
  7. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, YT ,Hou and H. L, -Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking, In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, (2013), pp. 71-82.
  8. Cengizorencik , ErkaySava?, An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking, Distributed and Parallel Databases, v.32 n.1, p.119-160, March 2014
  9. Chen, Lanxiang, et al. "DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data." Soft Computing 21.16 (2017): 4829-4841
  10. C Orencik, M Kantarcioglu, E SavasA practical and secure multi-keyword search method over encrypted cloud data 2013 IEEE Sixth International Conference on Cloud Computing, 390-397
  11. Peng, Tao, Qin Liu, and Guojun Wang. "a multilevel access Control scheme for Data security in Transparent Computing." Computing in Science & Engineering (2016).
  12. Shen, Jian, et al. "An authorized identity authentication-based data access control scheme in cloud." Advanced Communication Technology (ICACT), 2016 18th International Conference on. IEEE, 2016.
  13. Shen, Zhirong, JiwuShu, and Wei Xue. "Keyword Search With Access Control Over Encrypted Cloud Data." IEEE Sensors Journal 17.3 (2017): 858-868

Publication Details

Published in : Volume 5 | Issue 1 | January-February 2019
Date of Publication : 2019-01-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 74-78
Manuscript Number : CSEIT1838111
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Bibin Baby, Sharmila Banu, "Enhanced Security for Dynamic Multi Keyword Ranked Search Using Greedy Best First Search", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.74-78, January-February-2019. Available at doi : https://doi.org/10.32628/CSEIT1838111
Journal URL : http://ijsrcseit.com/CSEIT1838111

Article Preview