SLGP Header

Enhanced Dynamic Multi-Keyword Rank Scheme using top Key over Encrypted Cloud Data

IJCSEC Front Page

Abstract
The cloud computing platform gives people the ability to share resources, services and information among people from all over the world. In the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data into cloud servers for great convenience and reduced costs in data management. The sensitive data should before the outsourcing of data protection requirements, data usage obsoletes such as keyword-based document retrieval is encrypted. Improved dynamic multi-keyword ranking search scheme with top key via encrypted cloud data that simultaneously supports dynamic update operations as deleting and inserting documents. Greedy depth first search algorithm is provided for efficiency multi keywords on place and index structure. The safe kNN algorithm is used to encrypt the index and query vectors and ensure precise meaning score calculation between encrypted index and query vectors. A secure multi-keyword search is controlled via encrypted cloud data that simultaneously supports dynamic update operations, such as deleting and inserting documents. Here, focus on the data security problems with extended searchable symmetric encryption. For the first time formulate the issue of privacy in terms of relevance and similarity scheme robustness. The observation of these server-side rankings inevitably leak based order-preserving encryption protection. In order to eliminate the leak, we propose to support the top-k Multi-full-text search. Thorough security and performance analysis show that the proposed scheme guarantees a high safety and practicality and dynamic update operations, such as deleting and inserting documents.
Keywords:Advanced Symmetric Encryption Certified Authority,Cloud data, Data security, Keyword Based Retrieval, Multi keyword Retrieval.

References:

  1. Mark D. Ryan,” Cloud computing security: the scientific challenge, and a survey of solutions” University of Birmingham January 28, 2013.
  2. Cong Wang, Ning Cao, Jin Li, Kui Ren, and Wenjing Lou,” Secure Ranked Keyword Search over Encrypted Cloud Data” International Conference on Distributed Computing Systems, 2010.
  3. Ming Li, Shushing Yu, Ming Caoand Wenjing Lou” Authorized Private Keyword Search over Encrypted Data in Cloud Computing”, 31st International Conference on Distributed Computing Systems, 2011.
  4. Jiadi Yu, Peng Lu, Yanmin Zhu, “Toward Secure Multikeyword Top-kRetrieval over Encrypted Cloud Data,” IEEE member, IEEE Transactions on dependable and secure computing, vol. 10, no. 4, July/august 2013.
  5. Ming Cao, Cong Wang ,”Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, January 2014.
  6. Yi Yang, Hongwei Li, Wenchao Liu, Haomiao Yao, Mi Wen,” Secure Dynamic Searchable Symmetric Encryption with Constant Document Update Cost”, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Globecom - Communication and Information System Security Symposium, 2014.
  7. Chi Chen, Xiaojie Zhu, “An Efficient Privacy-Preserving Ranked Keyword Search Method”, Member, IEEE, IEEE DOI 10.1109/TPDS.2425407, IEEE Transactions on Parallel and Distributed Systems, 2015.
  8. Hongwei Li, Dongxiao Liu, Kun Jia, and Xiaodong Linss“Achieving Authorized and Ranked Multi-keywordSearch over Encrypted Cloud Data” School of Computer Science and Engineering, University of Electronic Science and Technology of China. IEEE ICC -Communication and Information Systems Security Symposium, 2015
  9. Zhangjie Fu, Kui Ren, Jiangang Shu, Xingming Sun “Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement”, DOI 10.1109/TPDS.2506573, IEEE Transactions on Parallel and Distributed System, 2015
  10. Wenhai Sun, Bing Wang, Ming Cao,”Privacy-preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking “asia ccs’13, May 8–10, Hangzhou, China. Copyright 2013 acm 978-1-4503-1767-2/13/05, 2013.
  11. Kawser Wazed Nafi, Tonny Shekha Kar, Sayed Anisul Hoque, Dr. M. M. A Hashem, “A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture “Lecturer, Stamford University, Bangladesh, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2012
  12. Chinua Xia, Xinhui Wang,” A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data”, DOI 10.1109/TPDS. 2401003, IEEE Transactions on Parallel and Distributed Systems, 2015.