Algorithm for Multi Keyword Search Over Encrypted Data in Cloud Environment

被引:0
|
作者
Das, Debasis [1 ]
Amin, Ruhul [2 ]
Kalra, Sumit [1 ]
机构
[1] Indian Inst Technol IIT Jodhpur, Dept CSE, Jodhpur, Rajasthan, India
[2] IIIT Naya Raipur, Dept CSE, Raipur, India
关键词
Cloud Computing; Multi- Keyword Searching; Encryption; SECURE; PRIVACY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud Computing offers storage resources as well as network and computing resources to the organizations. This eliminates the high infrastructure cost for the organizations that are using these services as they can now dynamically pay for these services, i.e., pay per use model, which is followed by most of the cloud providers. As the organization does not locally host these resources, these are comparatively far easier to manage and use than the traditional infrastructural resources. As a result of these factors, the popularity of cloud computing is increasing continuously. But this transfer of data and applications to the cloud server also creates some challenges. It poses problems that must be dealt with properly to ensure a secure cloud computing environment. As more and more sensitive data is being uploaded on the cloud in the present scenario, the privacy and security concerns associated with the data is continuously increasing. To address this, issue the data is stored on the cloud in the encrypted form. Also, as the amount of data stored is usually tremendous, so an efficient search scheme is also necessary. So here, we deal with two significant aspects of cloud computing: Encryption and Searching. We are proposing a secure and efficient encryption scheme to encrypt the data stored in the cloud as well as the queries along with a multi-keyword search scheme to search over the encrypted cloud data.
引用
收藏
页码:733 / 739
页数:7
相关论文
共 50 条
  • [31] Secure multi-keyword ranked search over encrypted cloud data for multiple data owners
    Guo, Ziqing
    Zhang, Hua
    Sun, Caijun
    Wen, Qiaoyan
    Li, Wenmin
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 380 - 395
  • [32] Blockchain-Aided Keyword Search over Encrypted Data in Cloud
    Varri, Uma Sankararao
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I, 2023, 1797 : 331 - 348
  • [33] Split keyword fuzzy and synonym search over encrypted cloud data
    Raghavendra, S.
    Girish, S.
    Geeta, C. M.
    Buyya, Rajkumar
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (08) : 10135 - 10156
  • [34] Implementation of Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
    Shekokar, Narendra
    Sampat, Kunjita
    Chandawalla, Chandni
    Shah, Jahnavi
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 499 - 505
  • [35] Verifiable keyword search over encrypted cloud data in smart city
    Miao, Yinbin
    Ma, Jianfeng
    Jiang, Qi
    Li, Xiong
    Sangaian, Arun Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 65 : 90 - 101
  • [36] Semantic Keyword Search based on Trie over Encrypted Cloud Data
    Fu, Zhangjie
    Shu, Jiangang
    Sun, Xingming
    Zhang, Daxing
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 59 - 62
  • [37] An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data
    Peng, Tianyue
    Lin, Yaping
    Yao, Xin
    Zhang, Wei
    IEEE ACCESS, 2018, 6 : 21924 - 21933
  • [38] Split keyword fuzzy and synonym search over encrypted cloud data
    Rajkumar Raghavendra S
    S. S. Girish S
    L. M. Geeta C. M.
    Multimedia Tools and Applications, 2018, 77 : 10135 - 10156
  • [39] Authorized Private Keyword Search over Encrypted Data in Cloud Computing
    Li, Ming
    Yu, Shucheng
    Cao, Ning
    Lou, Wenjing
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 383 - 392
  • [40] Approximate Keyword-based Search over Encrypted Cloud Data
    Ibrahim, Ayad
    Jin, Hai
    Yassin, Ali A.
    Zou, Deqing
    2012 NINTH IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2012, : 238 - 245