Fuzzy Keyword Search over Encrypted Data in Cloud

Authors

  • Prof. Sonali Kale  Department of Computer Engineering, Savitribai phule University/Trinity Academy of Engineering, Pune, Maharashtra, India
  • Yash Gulati  Department of Computer Engineering, Savitribai phule University/Trinity Academy of Engineering, Pune, Maharashtra, India
  • Pooja Ghorpade  Department of Computer Engineering, Savitribai phule University/Trinity Academy of Engineering, Pune, Maharashtra, India
  • Avinash Savake  Department of Computer Engineering, Savitribai phule University/Trinity Academy of Engineering, Pune, Maharashtra, India

Keywords:

Fuzzy Keyword, Encrypted Data, RMSM, cloud servers, CSP

Abstract

For privacy concerns, a secure search over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner; instead, they support multiple owners to share the benefits brought by cloud computing. In this paper, we propose schemes to deal with Privacy preserving Ranked Multi-keyword Search in a Multi-owner model (PRMSM). To enable cloud servers to perform secure search without knowing the actual data of both keywords and trapdoors, we systematically construct a novel secure search protocol. To rank the search results and preserve the privacy of relevance scores between keywords and files, we propose a novel Additive Order and Privacy Preserving Function family. To prevent the attackers from eavesdropping secret keys and pretending to be legal data users submitting searches, we propose a novel dynamic secret key generation protocol and a new data user authentication protocol. Hence, some cloud information retrieval schemes has been planned to resolve this drawback, these schemes not only will search the information they have properly, however can also stop sensitive information leaked out. During this paper, we tend to survey the privacy protective cloud information retrieval scheme and provide a comparison of them with regard to the key principles of search and privacy security.

References

  1. J. Ye, J. Wang, J. Zhao, J. Shen, K-C Li, “Fine-grained searchable encryption in multi-user setting,” Soft Compute DOI 10.1007/s00500-016-2179-x, © Springer-Verlag Berlin Heidelberg 2016.
  2. G. Arthi et.al, “Efficient search of Data in Cloud Computing using Cumulative Key,”  IJSTE - International     Journal of Science Technology & Engineering, Volume 2, Issue 09, March 2016.
  3. J. Shen et.al, “Privacy Preserving Search Schemes over Encrypted Cloud Data: A Comparative Survey,” 2015 First International Conference on Computational Intelligence Theory, Systems and Applications.
  4. W. Zhang et.al, “Secure Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing,” 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
  5. W. Zhang, Y. Lin, “Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing,” Member, IEEE, JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARY 2015.

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
Prof. Sonali Kale, Yash Gulati, Pooja Ghorpade, Avinash Savake, " Fuzzy Keyword Search over Encrypted Data in Cloud , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.630-633, May-June-2017.