Privacy Preserving Keyword Search over Encrypted Cloud Data

نویسندگان

  • S. Ananthi
  • M. Sadish Sendil
  • S. Karthik
چکیده

Cloud computing enables the organizations to outsource their data by providing a service model called infrastructure as a service (IaaS). In a public cloud the infrastructure is owned and managed by a cloud service provider and is located in the provider’s control. To protect the privacy of sensitive data, documents have to be encrypted before outsourcing. When the number of encrypted documents increases exponentially, the search service and retrieval becomes critical. The process of retrieving the files containing the queried keyword further incurs unnecessary network traffic, which is absolutely undesirable in pay-as-you-use cloud paradigm. In this paper, a search scheme that provides both privacy protection and rank-ordered search capability with less overhead has been proposed. Search indexes and documents are first encrypted by the data owner and then stored onto the cloud server. Retrieval results on an encrypted data and security analysis under different attack models show that data privacy can be preserved while retaining very good retrieval performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Conjunctive Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

As Cloud Computing becomes prevalent, more and more sensitive information are centralized into the cloud. For the protect data privacy, sensitive data usually have to be encrypted before outsourcing, which makes efficient data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to search over encrypted data through keywords and selectively retrie...

متن کامل

Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing

Search over encrypted data is a technique of great interest in the cloud computing era, because many believe that sensitive data has to be encrypted before outsourcing to the cloud servers in order to ensure user data privacy. Devising an efficient and secure search scheme over encrypted data involves techniques from multiple domains – information retrieval for index representation, algorithms ...

متن کامل

Privacy- Preserving Keyword-based Semantic Search over Encrypted Cloud Data

To protect the privacy, sensitive information has to be encrypted before outsourcing to the cloud. Thus the effective data utilization becomes a significant challenge. Searchable encryption scheme has been developed to conduct retrieval over encrypted data. However, these schemes only support exact keyword search. Recent fuzzy search schemes mainly evaluate the similarity of keywords from the s...

متن کامل

Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing

As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. In this paper, for the first time we formalize and solve the problem ...

متن کامل

Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Dynamic Update

With the development of cloud computing, the sensitive information of outsourced data is at risk of unauthorized accesses. To protect data privacy, the sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless. Hence, it is an especially important thing to explore secure encrypted cloud data sear...

متن کامل

Fuzzy Keyword Search over Encrypted Data in Cloud Computing.dvi

As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011