A Survey on Efficient Searching in Encrypted Cloud Data

Authors

  • Abhishek Nimonkar  BE, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India
  • Mukul Wagh  BE, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India
  • Payal Kale  BE, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India
  • Pranali Bajirao  BE, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India
  • Yash Nathani  BE, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India
  • Prof. A.V. Dehankar  Assistant Professor, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India

Keywords:

Cloud Computing, Encryption, Inner Product Similarity, Single Keyword Search, Multi-Keyword Search, Ranking

Abstract

Cloud computing is an on-request for computing. It is Internet-based computing. Around there shared resources, data and information are given on demand to PCs and distinctive devices. It also gives the organizations over the web. In conveyed computing, pro associations have the ability to give storing at the server according to customers requirements. They allow customers to store and recoup the data in cloud server on demand from wherever and on a device. This control of data at cloud server offers climb to such an assortment of security issues since data is gotten to over web. For security, reason data is stored in encoded sorted out. In this, the client has no prompt control over data once it is exchanged on a cloud server. In this paper, we look at the idea behind single watchword chase over encoded data and besides multi catchphrase situating. Cloud data proprietors require their records in a mixed edge with the true objective of security sparing. Thusly it is essential to make productive and strong ciphertext look for frameworks. One test is that the association between records will be usually shrouded amid the time spent encryption, which will provoke basic request exactness execution degradation.

References

  1. Qin Liuy, Guojun Wangyz, and Jie Wuz,”Secure and privacy preserving keyword searching for cloud storage services”, ELSEVIER Journal of Network and computer Applications, March 2011
  2. Ming Li et al.,” Authorized Private Keyword Search over Encrypted Data in Cloud Computing,IEEE proc. International conference on distributed computing systems,June 2011,pages 383-392
  3. Cong Wang et al.,”Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 23, no. 8, August 2012
  4. Kui Ren et al., “Towards Secure and Effective Data utilization in Public Cloud”, IEEE Transactions on Network, volume 26, Issue 6, November / December 2012
  5. Ming Li et al.,”Toward Privacy-Assured and Searchable Cloud Data Storage Services”, IEEE Transactions on Network, volume 27, Issue 4, July/August 2013
  6. Wei Zhou et al., “K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing “Journal of Software Engineering and Applications, Scientific Research , Issue 6, Volume 29-32,January2013
  7. Baek et al., “Public key encryption with keyword search revisited", in ICCSA 2008, vol. 5072 of Lecture Notes in Computer Science, pp. 1249 - 1259, Perugia, Italy, 2008. Springer Berlin/Heidelberg.
  8. H. S. Rhee et al., “Trapdoor security in a searchable public-key encryption scheme with a designated tester," The Journal of Systems and Software, vol. 83, no. 5, pp. 763-771, 2010.
  9. Peng Xu et al., Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack”,IEEE Transactions on computers, vol. 62, no. 11, November 2013
  10. Ning Cao et al.,” Privacy-Preserving Multi- Keyword Ranked Search over Encrypted Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, jan 2014
  11. D. X. D. Song, D. Wagner, and A. Perrig, ”Practical techniques for searches on encrypted data,” in Proc. S & P, BERKELEY, CA, 2000, pp. 44.
  12. C. Wang, N. Cao, K. Ren, and W. J. Lou, Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
  13. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, ”Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” in Proc. ASIACCS, Hangzhou, China, 2013, pp. 71-82.
  14. R. X. Li, Z. Y. Xu, W. S. Kang, K. C. Yow, and C. Z. Xu, Efficient multi-keyword ranked query over encrypted data in cloud computing, Futur. Gener. Comp. Syst., vol. 30, pp. 179-190, Jan. 2014.
  15. Gurdeep Kaur, Poonam Nandal, “Ranking Algorithm of Web Documents using Ontology”, IOSR Journal of Computer Engineering (IOSR-JCE) eISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VIII (May-Jun. 2014), PP 52-55
  16. Qin Liuy, Guojun Wangyz, and Jie Wuz, ”Secure and privacy preserving keyword searching for cloud storage services”, ELSEVIER Journal of Network and computer Applications, March 2011
  17. Cong Wang et al., ”Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 23, no. 8, August 2012
  18. International Journal of Computer Applications (0975 –887) Volume 126 – No.14, September 2015
  19. Wenhai Sun et al., "Privacy-Preserving Multikeyword Text Search in the Cloud Supporting Similarity-based Ranking'', the 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou, China, May 2013.
  20. Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue,Member, IEEE Computer Society, and Minglu Li,”Toward Secure Multikeyword Top k Retrieval over Encrypted Cloud Data”, IEEE Journal of Theoretical and Applied Information Technology 10th August 2014.
  21. Ning Cao et al.,” Privacy-Preserving MultiKeyword Ranked Search over Encrypted Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, jan 2014
  22. Wenhai Sun et al., "Protecting Your Right: Attributebased Keyword Search with Finegrained Ownerenforced Search Authorization in the Cloud", IEEE INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014
  23. Secure Ranked Keyword Search over Encrypted Cloud Data, IEEE PAPER, 2010.
  24. Zhihua Xia, “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL: PP NO: 99 YEAR 2015

Downloads

Published

2019-02-28

Issue

Section

Research Articles

How to Cite

[1]
Abhishek Nimonkar, Mukul Wagh, Payal Kale, Pranali Bajirao, Yash Nathani, Prof. A.V. Dehankar, " A Survey on Efficient Searching in Encrypted Cloud Data, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 5, Issue 5, pp.22-27, February-2019.