Survey on Muilt-Keyword Search in Encrypted Data with Privacy Preservation
Keywords:
Cloud computing, Encryption, Inner product similarity, Single Keyword Search, Multi-keyword search, rankingAbstract
Cloud computing is computing that is on demand. This is computation focused on the Internet. On request, PCs and various gadgets are provided with shared properties, information and data. It also provides the administration over the phone. In distributed computing, specialist organizations have the capacity to provide cloud storage as needed by customers. They allow customers to store and retrieve information on request from anywhere and on a gadget on a cloud server. This cloud server information management gives rise to such a number of security problems when data is accessed over the network. Information is stored in an encoded ordered structure for security purposes. In this, once it is migrated to the cloud server, the customer has no immediate control over details. We explore the concept behind single watchword hunting over encoded information in this paper and multi catchphrase positioning in addition. In a scrambled framework, cloud data owners need their records with the ultimate aim of safeguarding privacy. It is necessary to build efficient and solid systems for ciphertext search in this way. One test is that during the time spent encryption, the link between documents will typically be secret, which will prompt debasement of vital investigation accuracy execution.
References
- Qin Liuy, Guojun Wangyz, and Jie Wuz,”Secure and privacy preserving keyword searching for cloud storage services”, ELSEVIER Journal of Network and computer Applications, March 2011
- Ming Li et al.,” Authorized Private Keyword Search over Encrypted Data in Cloud Computing, IEEE proc. International conference on distributed computing systems, June 2011,pages 383-392
- Cong Wang et al., “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 23, no. 8, August 2012
- Kui Ren et al., “Towards Secure and Effective Data utilization in Public Cloud”, IEEE Transactions on Network, volume 26, Issue 6, November / December 2012
- Ming Li et al.,”Toward Privacy-Assured and Searchable Cloud Data Storage Services”, IEEE Transactions on Network, volume 27, Issue 4, July/August 2013
- Wei Zhou et al., “K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing “Journal of Software Engineering and Applications, Scientific Research , Issue 6, Volume 29-32,January2013
- J. Baek et al., “Public key encryption with keyword search revisited", in ICCSA 2008, vol. 5072 of Lecture Notes in Computer Science, pp. 1249 - 1259, Perugia, Italy, 2008. Springer Berlin/Heidelberg.
- H. S. Rhee et al., “Trapdoor security in a searchable public-key encryption scheme with a designated tester," The Journal of Systems and Software, vol. 83, no. 5, pp. 763-771, 2010.
- Peng Xu et al., Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack”,IEEE Transactions on computers, vol. 62, no. 11, November 2013
- Ning Cao et al.,” Privacy-Preserving Multi- Keyword Ranked Search over Encrypted Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, jan 2014
- D. X. D. Song, D. Wagner, and A. Perrig, ”Practical techniques for searches on encrypted data,” in Proc. S & P, BERKELEY, CA, 2000, pp. 44.
- C. Wang, N. Cao, K. Ren, and W. J. Lou, Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
- W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, ”Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” in Proc. ASIACCS, Hangzhou, China, 2013, pp. 71-82.
- R. X. Li, Z. Y. Xu, W. S. Kang, K. C. Yow, and C. Z. Xu, Efficient multi-keyword ranked query over encrypted data in cloud computing, Futur. Gener. Comp. Syst., vol. 30, pp. 179-190, Jan. 2014.
- Gurdeep Kaur, Poonam Nandal, “Ranking Algorithm of Web Documents using Ontology”, IOSR Journal of Computer Engineering (IOSR-JCE) eISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VIII (May-Jun. 2014), PP 52-55
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.