Survey on Multi keyword Ranked Search Scheme over Encrypted Data

Authors

  • Vishal Jalindar Gondil  Department of Computer Engineering, Jaywantrao Sawant College of Engineering, Pune, Maharashtra, India
  • Prof. H. A. Hingoliwala  Department of Computer Engineering, Jaywantrao Sawant College of Engineering, Pune, Maharashtra, India

Keywords:

Cloud Computing, Data Outsourcing and security, Natural Language Processing, Multi-keyword Search.

Abstract

In recent years, the advancements and the fame of cloud computing are increasing which is actuating the data owners to keep their personal and professional data on public cloud servers like Amazon, Microsoft, Google, Apple, etc with the help of data outsourcing. The other advantage of outsourcing the data over cloud servers is for high benefit and lesser cost in managing the data and the data can be accessed from anywhere and at any time. However, for privacy concerns, the data that are highly sensitive should be encrypted before outsourcing. Taking into consideration the huge amount of data users and files that are present in the cloud, it is important that multiple keywords should be allowed in the searching request and retrieve the files relevant to those keywords. There are some methods and solutions offered to provide privacy and security for the data over the cloud server. Since the document vector's dimension is equal to the dictionary's size, traditional searchable encryption schemes based on the bag-of-words model require a lot of space to store the document set's index. The bag-of-words model often ignores semantic information between keywords and documents, resulting in potentially meaningless search results for users. The natural language processing (NLP) model can be used as it extracts document features from word and paragraph context information. The features can be used to assess document similarity and provide latent semantics information. The NLP model was used to construct a semantic-conscious multi keyword graded search scheme in this survey on dynamic semantic aware multi keyword ranked search.

References

  1. Xingming Sun, Xinhui Wang, Zhihua Xia, Zhangjie Fu and Tao Li Jiangsu ,”Dynamic Multi-keyword Top-k Ranked Search over Encrypted Cloud Data Engineering Center of Network Monitoring”, Nanjing University of Information Science & Technology, Nanjing, 210044, China sunnudt@163.com, wxh_nuist@163.com, xia_zhihua@163.com, wwwfzj@126.com
  2. Kavitha R1, R J Poovaraghan,” Reusability of Search Index over Encrypted Cloud Data on Dynamic update” SRM University, Chennai, India1 Assistant Professor (OG), Department of Computer Science, SRM University, Chennai, India2
  3. Prasanna B T, C B Akki, “Dynamic Multi-Keyword Ranked Searchable Security Algorithm Using CRSA and B-Tree”, Department of ISE, EPCET Associate Professor, Bengaluru, INDIA-560049, Department of ISE, SJBIT Professor, Bengaluru, INDIA-560060
  4. Khot, Poonam P. and S. Satav. “A Profit Maximization Scheme for Enhancing Quality of Service (QoS) in Cloud Computing.” International Journal of Computer Applications 145 (2016): 35-39.
  5. S. Grzonkowski, P. M. Corcoran, and T. Coughlin, “Security analysis of authentication protocols for nextgeneration mobile and CE cloud services,” in Proc. IEEE Int. Conf. Consumer Electron., 2011, Berlin, Germany, 2011, pp. 83-87.
  6. C. Chen, X. J. Zhu, P. S. Shen, and J. K. Hu, “A hierarchical clustering method For big data oriented ciphertext search,” in Proc. IEEE INFOCOM, Workshop on Security and Privacy in Big Data, Toronto, Canada, 2014, pp. 559-564.
  7. P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over encrypted data,” in Proc. Proc. 2nd Int. Conf. Appl. Cryptography Netw. Security, Yellow Mt, China, 2004, pp. 31-45.
  8. R. X. Li, Z. Y. Xu, W. S. Kang, K. C. Yow, and C. Z. Xu, “Efficient Multi-keyword ranked query over encrypted data in cloud computing, Futur. Gener. Comp. Syst., vol. 30, pp. 179-190, Jan. 2014
  9. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," Proceedings of IEEE INFOCOM'10 Mini-Conference, San Diego, CA, USA, pp. 1-5, Mar. 2010.
  10. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," Proceedings of IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 253-262, 2010.
  11. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," Proceedings of IEEE INFOCOM 2011, pp. 829-837, 2011.
  12. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, and Y. T. Hou, "Privacy preserving multi-keyword text search in the cloud supporting similarity based ranking," ASIACCS 2013, Hangzhou, China, May 2013, pp. 71-82, 2013.
  13. X. Dai, H. Dai, C. Rong, G. Yang and F. Xiao, "Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data," in IEEE Transactions on Cloud Computing, doi: 10.1109/TCC.2020.3047921.
  14. Z. Xia, X. Wang, X. Sun and Q. Wang, "A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data," in IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340-352, 1 Feb. 2016, doi: 10.1109/TPDS.2015.2401003.
  15. R. P. Rashmi and S. M. Sangve, "Public auditing system: Improved remote data possession checking protocol for secure cloud storage," 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), 2015, pp. 75-80, doi: 10.1109/ICATCCT.2015.7456858.

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
Vishal Jalindar Gondil, Prof. H. A. Hingoliwala "Survey on Multi keyword Ranked Search Scheme over Encrypted Data" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 2, pp.439-445, November-December-2021.