A Robust Search Method Using Features To Determine Combined Keywords On Cloud Encrypted Data

Main Article Content

Y.K. Viswanadham
G Naga Lakshmi
G Dinesh Kumar
B Archana
B Sravanthi

Abstract

Users are more comfortable trusting their sensitive information to the cloud as its security continues to improve. However, when there are several encrypted files, each with its own set of keywords for indexing, the storage overhead grows exponentially, and search efficiency suffers. Therefore, this work provides a technique for searching encrypted cloud data that makes use of features to match joint keywords (FMJK). Joint keywords are generated by randomly selecting a subset of the data owner's non-duplicated keywords choice among the documents' extracted keywords; together, these keywords form a keyword dictionary. Every combined keyword matches with a document's feature as well as a query keyword, making the former's result considered a dimension of a document's index with the latter's result considered a dimension about the query trapdoor. Its BM25 method is then utilized for arranging the top k results by the inner product between the document index and the trapdoor.

Downloads

Download data is not yet available.

Article Details

How to Cite
Y.K. Viswanadham, G Naga Lakshmi, G Dinesh Kumar, B Archana, & B Sravanthi. (2024). A Robust Search Method Using Features To Determine Combined Keywords On Cloud Encrypted Data. Journal of Advanced Zoology, 45(S3), 121–125. https://doi.org/10.53555/jaz.v45iS3.4335
Section
Articles
Author Biographies

Y.K. Viswanadham

Associate Professor, Department of Information Technology, Seshadri Rao Gudlavalleru Engineering College, Gudlavalleru Andhra Pradesh-521356, India

G Naga Lakshmi

Department of Information Technology, Seshadri Rao Gudlavalleru Engineering College, Gudlavalleru Andhra Pradesh-521356, India.

G Dinesh Kumar

Department of Information Technology, Seshadri Rao Gudlavalleru Engineering College, Gudlavalleru Andhra Pradesh-521356, India.

B Archana

Department of Information Technology, Seshadri Rao Gudlavalleru Engineering College, Gudlavalleru Andhra Pradesh-521356, India

B Sravanthi

Department of Information Technology, Seshadri Rao Gudlavalleru Engineering College, Gudlavalleru Andhra Pradesh-521356, India.

References

Z. Wan and R. H. Deng, ‘‘VPSearch: Achieving verifiability for privacy preserving multi-keyword search over encrypted cloud data,’’ IEEE Trans. Depend. Secure Comput., vol. 15, no. 6, pp. 1083–1095, Nov./Dec. 2016.

Y. Yang, H. Lin, X. Liu, W. Guo, X. Zheng, and Z. Liu, ‘‘Blockchain based verifiable multi-keyword ranked search on encrypted cloud with fair payment,’’ IEEE Access, vol. 7, pp. 140818–140832, 2019.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, ‘‘Privacy-preserving multikeyword ranked search over encrypted cloud data,’’ in Proc. IEEE INFOCOM, Apr. 2011, pp. 829–837.

W. K. Wong, D. W.-L. Cheung, B. Kao, and N. Mamoulis, ‘Secure kNN computation on encrypted databases,” in Proc. ACM SIGMOD Int. Conf. Manage. Data, Jun. 2009, pp. 139–152.

Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, ‘‘Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing,’’ IEICE Trans. Commun., vol. E98.B, no. 1, pp. 190–200, 2015.

Z. Xia, X. Wang, X. Sun, and Q. Wang, ‘‘A secure and dynamic multi keyword ranked search scheme over encrypted cloud data,’’ IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340–352, Jan. 2016.

W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, ‘‘Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,’’ IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 11, pp. 3025–3035, Nov. 2014.

L. Liu and Z. Liu, ‘‘A novel fast dimension-reducing ranked query method with high security for encrypted cloud data,’’ Chin. J. Electron., vol. 29, no. 2, pp. 344–350, Mar. 2020.

W. Zhang, Y. Lin, and G. Qi, ‘‘Catch you if you misbehave: Ranked keyword search results verification in cloud computing,’’ IEEE Trans. Cloud Comput., vol. 6, no. 1, pp. 74–86, Mar. 2015.

Z. Guan, X. Liu, L. Wu, J. Wu, R. Xu, J. Zhang, and Y. Li, ‘‘Cross-lingual multi-keyword rank search with semantic extension over encrypted data,’’ Inf. Sci., vol. 514, pp. 523–540, Apr. 2020.

M. Murata, H. Nagano, R. Mukai, K. Kashino, and S. Satoh, ‘‘BM25 with exponential IDF for instance search,’’ IEEE Trans. Multimedia, vol. 16, no. 6, pp. 1690–1699, Oct. 2014.

D. Xiaoding Song, D. Wagner, and A. Perrig, ‘‘Practical techniques for searches on encrypted data,’ in Proc. IEEE Symp. Secur. Privacy (S&P), May 2000, pp. 44–55.

R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, ‘‘Searchable symmetric encryption: Improved definitions and efficient constructions,’’ J. Comput. Secur., vol. 19, no. 5, pp. 895–934, Jan. 2011, doi: 10.3233/JCS-2011- 0426.

R. Li, Z. Xu, W. Kang, K. C. Yow, and C.-Z. Xu, ‘‘Efficient multi-keyword ranked query over encrypted data in cloud computing,’ Future Gener. Comput. Syst., vol. 30, no. 1, pp. 179–190, Jan. 2014, doi: 10.1016/j. future.2013.06.029.

J. Wang, H. Ma, T. Qiang, L. Jin, H. Zhu, S. Ma, and X. Chen, ‘‘A new efficient verifiable fuzzy keyword search scheme,’’ J. Wireless Mobile Netw., Ubiquitous Comput., Dependable Appl., vol. 3, no. 4, pp. 61–71, Dec. 2012.

Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, ‘‘Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement,’’ IEEE Trans. Inf. Forensics Security, vol. 11, no. 12, pp. 2706–2716, Jul. 2016, doi: 10.1109/TIFS.2016.2596138.

Z. Fu, F. Huang, K. Ren, J. Weng, and C. Wang, ‘‘Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data,’’ IEEE Trans. Inf. Forensics Security, vol. 12, no. 8, pp. 1874–1884, Aug. 2017, doi: 10.1109/TIFS.2017.2692728.

R. Zhao, H. Li, Y. Yang, and Y. Liang, ‘‘Privacy-preserving personalized search over encrypted cloud data supporting multi-keyword ranking,’’ in Proc. 6th Int. Conf. Wireless Commun. Signal Process. (WCSP), Oct. 2014, pp. 1–6.

C. Chen, X. Zhu, P. Shen, J. Hu, S. Guo, Z. Tari, and A. Y. Zomaya, ‘‘An efficient privacy-preserving ranked keyword search method,’’ IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 951–963, Apr. 2016.

RFC Index. Accessed: May 25, 2020. [Online]. Available: https://www.rfc-editor.org/rfc-index-100a.html.