AN EFFECTIVE SEARCH OF CLOUD DATA USING ABC BASED CRYPTOGRAPHY AND MULTIPLE KEYWORD SEMANTICS

被引:0
|
作者
Kumari, P. Senthil [1 ]
Kamal, A. R. Nadira Banu [2 ]
机构
[1] Thassim Beevi Abdul Kader Coll Women, Dept Master Comp Applicat, Kilakarai, Tamil Nadu, India
[2] Thassim Beevi Abdul Kader Coll Women, Dept Comp Sci, Kilakarai, Tamil Nadu, India
关键词
Data outsourcing; Encryption; Index generation; Multiple keyword semantics; Association Based Cryptography (ABC); Search query;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing enables the organizations to outsource their information and data by providing a service model known as IaaS (Infrastructure as a Service). In a public cloud, the cloud service provider manages the infrastructure and it is situated in the provider's control. The documents are encrypted before outsourcing in order to protect the privacy of sensitive data. When the number of encrypted documents is exponentially increased, the search service and retrieval becomes critical. The process of retrieving files consisting of queried keyword leads to unnecessary network traffic. In this paper, a secure scheme with multi keyword search is proposed for encrypted cloud data. A searchable index is generated for the data that has to be outsourced to the cloud. Encryption of data is performed using Association Based Cryptography (ABC). The encrypted data is wrapped with index and then outsourced. The searched result is ranked by the cloud server according to Robust Searchable Symmetric Encryption (RSSE) ranking criteria in order to enhance the document retrieval accuracy. This approach provides high security by using ABC. The experimental results show that the method provides efficient integrity verification for the transferred data and achieves minimum overhead for both communication and computation.
引用
收藏
页码:1257 / 1267
页数:11
相关论文
共 50 条
  • [1] Effective XML keyword search basing on the path semantics
    [J]. Ji, B. (xianyinglou@gmail.com), 2013, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [2] ELCEA: An Entity-based Semantics towards Effective XML Keyword Search
    Ji, Qingling
    Zhou, Junfeng
    Guo, Jingfeng
    [J]. 2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
  • [3] Ranked Multi-Keyword Search Data Using Cloud
    Shete, Sneha
    Dongre, Nilima
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 590 - 594
  • [4] Ranked multi-keyword search data using cloud
    Shete, Sneha
    Dongre, Nilima
    [J]. Proceedings of the International Conference on Inventive Computing and Informatics, ICICI 2017, 2018, : 590 - 594
  • [5] MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers
    He, Jingsha
    Wu, Jianan
    Zhu, Nafei
    Pathan, Muhammad Salman
    [J]. FUTURE INTERNET, 2018, 10 (05)
  • [6] Effective Keyword Search in Relational Databases Considering Query Semantics
    Hristidis, Vagelis
    Gravano, Luis
    Papakonstantinou, Yannis
    [J]. ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, 2009, 5731 : 172 - +
  • [7] MCN: A New Semantics Towards Effective XML Keyword Search
    Zhou, Junfeng
    Bao, Zhifeng
    Ling, Tok Wang
    Meng, Xiaofeng
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PROCEEDINGS, 2009, 5463 : 511 - +
  • [8] From Structure-Based to Semantics-Based: Towards Effective XML Keyword Search
    Thuy Ngoc Le
    Wu, Huayu
    Ling, Tok Wang
    Li, Luochen
    Lu, Jiaheng
    [J]. CONCEPTUAL MODELING, ER 2013, 2013, 8217 : 356 - +
  • [9] Keyword Binning-Based Efficient Search on Encrypted Cloud Data
    Rohit Handa
    C. Rama Krishna
    Naveen Aggarwal
    [J]. Arabian Journal for Science and Engineering, 2019, 44 : 3559 - 3584
  • [10] Semantic Keyword Search based on Trie over Encrypted Cloud Data
    Fu, Zhangjie
    Shu, Jiangang
    Sun, Xingming
    Zhang, Daxing
    [J]. SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 59 - 62