Multi-Keyword Ranked Search in Cloud Storage using Homomorphic Indexing

  • Authors

    • K Renugha
    • P Shanthi
    • A Umamakeswari
    2018-04-25
    https://doi.org/10.14419/ijet.v7i2.24.12057
  • XOR Homomorphic encryption scheme (HOM), cloud storage, data security, keyword search, On-demand key, access pattern, Multi-keyword ranked search.
  • In the cloud environment, the main issue is outsourcing of the information to the cloud service provider and outsider. Consider this, the cloud tenant store data in an encrypted form to achieve data security and privacy. The data owner needs the secure information sharing from the cloud and without leak of access pattern to the eavesdroppers. XOR homomorphic encryption searchable algorithm along with ranking is proposed to provide the security over the network. In addition our scheme provides secure Multi-keyword ranked search over encrypted data. Efficient ranked search algorithm returns the relevant document based on the results for the given multiple keywords. The experimental results prove that the system is efficient.

     

  • References

    1. [1] Ren SQ, Tan BH, Sundaram S, Wang T, Ng Y, Chang V, “Aung KM,Secure searching on cloud storage enhanced by homomorphic indexingâ€, Future Generation Computer Systems, 2016.

      [2] Xiuxiu Jiang , Jia Yu, Jingbo Yan , Rong Hao, “Enabling efficient and verifiable multi-keyword ranked searchover encrypted cloud dataâ€, Information Sciences, PP.403–404.2017.

      [3] K. Renugha, P. Shanthi,A ,“ novel secure searching on cloud storage enhanced by homomorphic indexingâ€, International Journal of Pure and Applied Mathematics, vol 117 No. 16, PP.533-541, 2017.

      [4] Song DX, Wagner D, Perrig A, “Practical techniques for searches on encrypted dataâ€, In Security and Privacy, 2000.

      [5] Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G, “Public key encryption with keyword searchâ€, InEurocrypt, Vol. 3027, pp. 506-522, 2004.

      [6] Haiping Huang, Jianpeng Du, Hui Wang and Ruchuan Wang, “A Multi-keyword Multi-user Searchable Encryption Scheme Based On Cloud Storageâ€, IEEE TrustCom-BigDataSE-IS,2016.

      [7] Chen R, Mu Y, Yang G, Guo F, Wang X, “Dual-server public-key encryption with keyword search for secure cloud storageâ€, IEEE transactions on information forensics and security, pp.789-98, 2016.

      [8] Mathew P, Babu SS, “Secure Fuzzy Multi-Keyword Ranked Search over Encrypted Cloud Dataâ€, International Journal of Innovative Research in Computer and Communication Engineering, 2015.

      [9] Strizhov M, Ray I, “Multi-keyword similarity search over encrypted cloud dataâ€, IFIP International Information Security Conference, Springer, pp. 52-65, 2014.

      [10] Craig Macdonald , Iadh Ounis, “The influence of the document ranking in expert searchâ€, Information Processing and Management, pp. 376–390, 2011.

      [11] Wang C, Cao N, Ren K, Lou W, “Enabling secure and efficient ranked keyword search over outsourced cloud dataâ€, IEEE Transactions on parallel and distributed systems, pp.1467-79, 2012.

      [12] Alain Materne, Gershom Sleightholme, “Methods of ranking search results for searches based on multiple search concepts carried out in multiple databasesâ€, World Patent Information, 2014 .

      [13] Amit Praseed, Remya K Sudheesh and Dr. K.Chandrasekaran, “Efficient Privacy Preserving Ranked Search over Encrypted Dataâ€, IEEE Recent Advances in Intelligent Computational Systems (RAICS), 2015.

      [14] Rodrigues J, Ferreira B, Domingos H, “TMS: a trusted mail repository service using public storage cloudsâ€, InProceedings of the 8th Workshop on Middleware for Next Generation Internet Computing, 2013.

      [15] Goh EJ, “Secure indexesâ€, IACR Cryptology ePrint Archive, 2003.

      [16] Zhihua Xia, Xinhui Wang, Xingming Sun and Qian Wang, “A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Dataâ€, IEEE transactions on parallel and distributed systems, vol. 27, no. 2, 2016.

      [17] Bing Wang, Shucheng Yu,Wenjing Lou and Y. Thomas Hou, “Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloudâ€, IEEE INFOCOM, 2014.

      [18] Hongwei Li, Dongxiao Liu, Yuanshun Dai, Tom H. Luan,And Xuemin (Sherman) Shen, “Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storageâ€, IEEE transactions on emerging topics in computing, 2015.

      [19] Chang YC, Mitzenmacher M, “Privacy preserving keyword searches on remote encrypted dataâ€, InACNS, Vol. 5, pp. 442-455, 2005.

      [20] Liu C, Zhu L, Wang M, Tan YA, “Search pattern leakage in searchable encryption: Attacks and new constructionâ€, Information Sciences, pp. 176-88, 2014.

      [21] Durstenfeld R, “Algorithm 235: random permutationâ€, Communications of the ACM, 1964.

      [22] T. Padmapriya, V.Saminadan, “Performance Improvement in long term Evolution-advanced network using multiple imput multiple output techniqueâ€, Journal of Advanced Research in Dynamical and Control Systems, Vol. 9, Sp-6, pp: 990-1010, 2017.

      [23] S.V.Manikanthan and V.Rama“Optimal Performance of Key Predistribution Protocol In Wireless Sensor Networks†International Innovative Research Journal of Engineering and Technology ,ISSN NO: 2456-1983,Vol-2,Issue –Special –March 2017.

  • Downloads

  • How to Cite

    Renugha, K., Shanthi, P., & Umamakeswari, A. (2018). Multi-Keyword Ranked Search in Cloud Storage using Homomorphic Indexing. International Journal of Engineering & Technology, 7(2.24), 243-248. https://doi.org/10.14419/ijet.v7i2.24.12057