Dynamic Secure Multi-Keyword Ranked Search over Encrypted Cloud Data
Keywords:
Dynamic multi-keyword ranked search, inner product similarity, ElGamal Cryptosystem, top k retrievalAbstract
Over the past few years, Companies have been moving IT Resources to the cloud at a rapidly increasing rate. The data owners are commanded to outsource their data to cloud servers for amazing security and reduced expense in data management. However, sensitive content would be encrypted before outsourcing for security concerned, which obsoletes data employment like keyword-based document retrieval. In this paper, we solve the problem of multi-keyword ranked search over encrypted cloud data (MRSE) which simultaneously supports dynamic update operations like deletion and insertion of documents wise privacy in the cloud computing concept. As a result, allowing an encrypted cloud data search service is of extreme impact. In view of a large number of data users and documents in the cloud, it is essential to permit several keywords in the search demand and return documents in the order of their relevant to these keywords. Also, we propose an alert system which will generate alerts when the un-authorized user tries to access the data from the cloud, the alert will generate in the form of mail and message. And the ElGamal Cryptosystem allow users to occupy in the ranking while the popularity of computing work is done on the server side by a process only on cipher text which leads data leakage and convinced data security.
References
- N. Cao, C. Wang, M. Li, K. Ren, and W. Lou,"Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data," Proc. IEEE INFOCOM, pp. 829- 837, Apr 2011.
- L.M. Vaquero, L. Rodero-Merino, J. Caceres, and M.Lindner, "A Break in the Clouds: Towards a Cloud Definition," ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50-55, 2009.
- N. Cao, S. Yu, Z. Yang, W. Lou, and Y. Hou, "LT Codes-Based Secure and Reliable Cloud Storage Service," Proc. IEEE INFOCOM, pp. 693-701, 2012.
- S. Kamara and K. Lauter, "Cryptographic Cloud Storage," Proc. 14th Int'l Conf. Financial Cryptograpy and Data Security, Jan. 2010.
- A. Singhal, "Modern Information Retrieval: A Brief Overview," IEEE Data Eng. Bull., vol. 24, no. 4, pp. 35- 43, Mar. 2001.
- I.H. Witten, A. Moffat, and T.C. Bell, Managing Gigabytes: Compressing and Indexing Documents and Images. Morgan Kaufmann Publishing, May 1999.
- D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data," Proc. IEEE Symp. Security and Privacy, 2000.
- E.-J. Goh, "Secure Indexes," Cryptology ePrint Archive, http:// eprint.iacr.org/2003/216. 2003.
- Y.-C. Chang and M. Mitzenmacher, "Privacy Preserving Keyword Searches on Remote Encrypted Data," Proc. Third Int'l Conf. Applied Cryptography and Network Security, 2005.
- R. Curtmola, J.A. Garay, S. Kamara, and R.Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Proc. 13th ACM Conf. Computer and Comm. Security (CCS '06), 2006.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.