Privacy Preserving Multi Keyword Search Using Cosine Similarity in Cloud

Authors

  • Jincy Easow  Department of Computer Science, Mar Athanasius College of Engineering, Kothamangalam, Kerala, India
  • Prof Jisha P Abraham  Department of Computer Science, Mar Athanasius College of Engineering, Kothamangalam, Kerala, India

Keywords:

Cloud Computing, Cosine Similarity, Vector Space Model, Secure Search.

Abstract

Cloud Computing is a mature model of IT infrastructure that provides on demand high quality applications and services from a shared pool of computing resources. It becomes an increasingly popular for data owners to outsource their data to public cloud servers and also allowing data users to retrieve this data. For privacy concerns, secure searches over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner instead, they support multiple owners to share the benefits brought by cloud computing. The proposed scheme is to deal with multiple data owners to store their sensitive information securely in cloud and to allow data users to retrieve data through multiple keywords. To enable cloud servers to perform secure search without knowing the actual data of both keywords and outsourced data, systematically construct a novel secure search protocol using cosine similarity approach.

References

  1. Cong Wang, Ning Cao, Jin Li, Kui Ren and Wenjing Lou, ”Secure Ranked Keyword Search over Encrypted Cloud Data”, IEEE Distrib. Comput. Syst., June 2010.
  2. Anuradha Meharwade, G. A. Patil, ” Efficient Keyword Search Over Encrypted Cloud data”, International Conference on Information Security and Privacy, Dec. 2015.
  3. Quin Liu, Guojun Wang and Jie Wuz, ”Secure and Privacy Preserving Keyword Search on Encrypted Cloud Data”, ELSEVIER Journel of Network and Computer Application, March 2011.
  4. Wenhai Sun, Bing Wang, and Ning Cao, “Privacy Preserving Muli-Keyword Text Search in Cloud Supporting Similarity based Ranking”, ACM Symposium on Information and Computer security, May 2013.
  5. Zhang Xu, W kang, Rin Li, K Yow and C Xu, “Efficient Multi-keyword Ranked Query on Encrypted Cloud Data”, IEEE Int. Conf. Parallel Distribution System, December 2012.
  6. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Trans. Comput., Feb 2013
  7. Jiadi Yu, Member, IEEE, Peng Lu, Yanmin Zhu, Member, IEEE, Guangtao Xue, Member, IEEE Computer Society, and Minglu Li, Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data IEEE Transactions On Dependable And Secure Computing, Vol. 10, No. 4, July/August 2013
  8. Sun-Ho Lee and Im-Yeong Lee,”Secure Index Management Scheme on Cloud Storage Environment” ,International Journal of Security and Its Applications Vol. 6, No. 3, July, 2012
  9. Craig Gentry” Fully Homomorphic Encryption Using Ideal Lattices” In the 41st ACM Symposium on Theory of Computing (STOC), 2009.
  10. Sun-Ho Lee and Im-Yeong Lee,”Secure Index Management Scheme on Cloud Storage Environment” ,International Journal of Security and Its Applications Vol. 6, No. 3, July, 2012

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Jincy Easow, Prof Jisha P Abraham, " Privacy Preserving Multi Keyword Search Using Cosine Similarity in Cloud, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.1367-1372, January-February-2018.