Enhanced Security for Dynamic Multi Keyword Ranked Search Using Greedy Best First Search

Authors

  • Bibin Baby  Assistant Professor, Department of Computer Science, Nilgiri College of Arts and Science, Thaloor, The Nilgris, Tamil Nadu, India
  • Sharmila Banu  Assistant Professor, Department of Computer Science, Providence College for Women, Coonor, The Nilgiris, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT1838111

Keywords:

Cloud Computing, Security, Multi Keyword Search, Greedy Best First Search, Inverse Document Frequency, Term Frequency

Abstract

Today, due to the enormous growth of data technology in cloud computing, the data owners are stimulated to outsource their data in data management to reduce cost and for the convenient. Data confidentiality, in general, can be obtained by encrypting the data before it is outsourced. The client stores the encrypted data to the cloud using Searchable encryption schemes and applies keyword search techniques over cipher text domain. But the main problem in outsourcing is the lack of security and privacy for the sensitive data. So, to overcome this, for privacy requirement, the sensitive data can be encrypted before it is outsourced. Various methods were proposed to preserve the privacy and to provide security to the cloud data which are encrypted. Here in this paper, we proposed a tree-based search method over the encrypted datain the cloud that supports dynamic operation and multi-keyword ranked search. Clearly, the commonly used “inverse document frequency (IDF) term frequency (TF)” model and the vector space method are joined in the query generation and index creation to give multi-keyword ranked search. To get high search efficiency, a tree-type index structure, “Greedy Best-first Search” algorithm is proposed based on the tree- index.

References

  1. Q. Liu, G. Wang, and J. Wu, "Secure and privacy preserving keyword searching for cloud storage services,' Journal of Networks and Computer Applications, vol. 35, no. 3, pp. 927–933, May 2012
  2. C. Wang, N. Cao, K. Ren and W. Lou, -Enabling secure and efficient ranked keyword search over outsourced cloud data, IEEE Transactions on Parallel and Distributed Systems, vol. 23, issue 8, (2012) August, pp. 1467–1479.
  3. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data,' in Proc. of ICDCS'10, 2010.
  4. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, YT, Hou and H. L, -Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking, In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, (2013), pp. 71-82.
  5. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,' in IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222–233, 2014.
  6. Yu, Jiadi& Lu, Peng& Zhu, Yanmin&Xue, Guangtao& Li, Minglu. (2013). Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data. IEEE Transactions on Dependable and Secure Computing. 10.1109/TDSC.2013.9.
  7. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, YT ,Hou and H. L, -Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking, In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, (2013), pp. 71-82.
  8. Cengizorencik , ErkaySavaş, An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking, Distributed and Parallel Databases, v.32 n.1, p.119-160, March 2014
  9. Chen, Lanxiang, et al. "DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data." Soft Computing 21.16 (2017): 4829-4841
  10. C Orencik, M Kantarcioglu, E SavasA practical and secure multi-keyword search method over encrypted cloud data 2013 IEEE Sixth International Conference on Cloud Computing, 390-397
  11. Peng, Tao, Qin Liu, and Guojun Wang. "a multilevel access Control scheme for Data security in Transparent Computing." Computing in Science & Engineering (2016).
  12. Shen, Jian, et al. "An authorized identity authentication-based data access control scheme in cloud." Advanced Communication Technology (ICACT), 2016 18th International Conference on. IEEE, 2016.
  13. Shen, Zhirong, JiwuShu, and Wei Xue. "Keyword Search With Access Control Over Encrypted Cloud Data." IEEE Sensors Journal 17.3 (2017): 858-868

Downloads

Published

2019-01-30

Issue

Section

Research Articles

How to Cite

[1]
Bibin Baby, Sharmila Banu, " Enhanced Security for Dynamic Multi Keyword Ranked Search Using Greedy Best First Search, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 1, pp.74-78, January-February-2019. Available at doi : https://doi.org/10.32628/CSEIT1838111