A Survey on Semantic Search Encryption Using Cloud Computing
Keywords:
Searchable Symmetric Encryption, Cloud Computing, Web Ontology Language, Fuzzy Concept, GCP, RSLAbstract
As Cloud Computing becomes widely, more and spread sensitive data are being centralized into the cloud. Data in outsourced to the public cloud for economic savings and ease of access. However, the privacy information has to be encrypted to guarantee the security. To implement efficient data utilization, search over encrypted cloud data has been a great challenge. The existing solutions depended entirely on the submitted keyword-based search schemes, and almost all of them depend on predefined keywords extracted in the phases of index construction and query. In view of the deficiency, as an attempt, we propose a semantic expansion based similar search solution over encrypted cloud data. Our solution could return not only the exactly matched files, but also the files including the terms semantically related to the query keyword. In the proposed scheme, a corresponding file metadata is constructed for each file. Then both the encrypted metadata set and file collection are uploaded to the cloud server. Further more, we a basic idea for significantly improved scheme to satisfy the security guarantee of searchable symmetric encryption (SSE).
References
- Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, and Wenjing Lou. Privacy-preserving query over encrypted graph structured data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pages 393–402. IEEE, 2011.
- Khorshed, M.T., Ali, A.S., Wasimi, S.A. “Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning”, Security and Privacy in Computing Communications (TrustCom), 2011 IEEE 10th International Conference on, 2011, pp 757-764.
- S.Miranda- Jimnez, A.Gelbukh, and G.Sidorov, ”Summarizing conceptual graphs for automatic summarization task,” Conceptual Structures for STEM Research and Education, Springer Berlin Heidelberg,pp. 245-253,2013.
- R. Ferreira, L.de Souza Cabral, and R.D. Lins, ”Assessing sentence scoring techniques for extractive text summarization,” Expert systems with applications,vol.40,no.14,pp.5755-5764,2013.
- Z.Fu, X.Sun,and Q.Liu,”Achieving Efficien tCloud Search Services: Multi keyword Ranked Search over Encrypted Cloud Data Supporting ParallelComputing,”IEICETransactionsonCommunications,vol.98,no.1,pp.190-200,2015.
- S. Ji, G. Li, C. Li, and J. Feng, “Efficient interactive fuzzy keyword search,” in Proc. of WWW’09,2009.
- C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,” in Proc. of ICDCS’10,2010.
- Wang, li et al [2014] - Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data.
- Wang, Yu et al [2014] Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud.
- Y. Zhu, G. J. Ahn, H. Hu, S. S. Yau, H. G. An, and C. J. Hu, ”Dynamic audit services for outsourced storages in cloud,” IEEE Transactions on Services Computing. vol. 6, no. 2, pp.227-238, Apr.-Jun. 2013. 0018.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.