Back to Current Issues

Secure Multi Keyword Dynamic Search Scheme Supporting Dynamic Update.

Vadla Jhansi Rani, K.Samson Paul,

Affiliations
M.Tech(CSE),Dr.K.V.Subba Reddy Institute of Technology.Kurnool,Andhra Pradesh
:10.22362/ijcert/2017/v4/i8/xxxx [UNDER PROCESS]


Abstract
Cloud computing is becoming predominant; data owners are motivated to delegate complex data managements to the commercial cloud for economic savings. Sensitive data is usually encrypted before being uploaded to the cloud, which unfortunately makes the frequently-used search function a challenging problem. In this paper, we present a new multi-keyword dynamic search scheme with result ranking to search encrypted data more secure and practical. In the scheme, we employ a powerful function-hiding inner product encryption to enhance the security by preventing the leakage of the search pattern. For the concern of efficiency, we adopt a tree-based index structure to facilitate the searching process and updating operations. A comprehensive security analysis is provided, and experiments over the real world data show that our scheme is efficient.


Citation
Vadla Jhansi Rani, & K.Samson Paul. (2017). Secure Multi Keyword Dynamic Search Scheme Supporting Dynamic Update. International Journal of Computer Engineering In Research Trends, 4(8), 356-360. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I8007.pdf


Keywords : secure search; ranked search; dynamic update; cloud computing.

References
[1]Jingbo Yan, Yuqing Zhang, Xuefeng Liu,” Secure multi-keyword search supporting dynamic update and ranked retrieval,” Communication Technology (ICT)., Volume: 13, Issue: 10.
 [2] SONG D, WAGNER D, PERRIG A. Practical techniques for searches on encrypted data[C]// Proceedings of IEEE Symposium on Security and Privacy, 2000: 44-45.
[3] BOSCH C, HARTEL P, JONKER W, et al. A Survey of Provably Secure Searchable Encryption [J].ACM Computing Surveys, 2015, 47(2): 1-51.
[4] GOLLE P, STADDON J, and WATERS B. Secure Conjunctive Keyword Search over Encrypted Data[C]// Proceedings of Applied Cryptography and Network Security (ACNS), June 8-11, 2004:31-45.
[5] SUN Wenhai, WANG Bing, CAO Ning, et al. Verifiable Privacy-preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking [J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 25(11):71-82.
[6] CAO Ning, WANG Cong, LI Ming, et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 222-233.
[7] XIA Zhihua, WANG Xinhui, SUN Xingming, et al.A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data [J].IEEE Transactions on Parallel and Distributed Systems, 2016, 27(2): 340-352.
[8] KAMARA S, PAPAMANTHOU C, ROEDER T. Dynamic searchable symmetric encryption[C]//Proceedings of the 2012 ACM conference on Computer and communications security (CCS),2012: 965-976.
[9] CASH D, JAEGER J, JARECKI S. Dynamic Searchable Encryption in Very-Large Databases: Date Structures and Implementation[C]// Network & Distributed System Security Symposium (NDSS),February 23-26, 2014.
[10] KAMARA S, PAPAMANTHOU C. Parallel and dynamic, searchable symmetric encryption[C]//Proceedings of Financial Cryptography and Data Security (FC), April 1-5, 2013: 258-274.
[11] BISHOP A, JAIN A, KOWALCZYK L. Function-Hiding Inner Product Encryption[C]//Proceedings of Advances in Cryptology—ASIAic
[12] A.Raghavendra Praveen Kumar, K.Tarakesh,U.Veeresh,” A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted.” International Journal of Computer Engineering In Research Trends., vol.2, no.12, pp. 1137-1141, 2015.
[13] Mr. M. VEERABRAHMA CHARY, Mrs.N.SUJATHA,” A Novel Additive Multi-Keyword Search for Multiple Data Owners in Cloud Computing .” International Journal of Computer Engineering In Research Trends., vol.3, no.6, pp. 308-313, 2016.
[14] G.Lucy, D.Jaya Narayana Reddy, R.Sandeep Kumar,” Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data.” International Journal of Computer Engineering In Research Trends., vol.2, no.12, pp. 919-923, 2015.
[15] G.Dileep Kumar, A.Sreenivasa Rao,” Privacy-Preserving Public Auditing using TPA for Secure Searchable Cloud Storage data.” International Journal of Computer Engineering In Research Trends., vol.2, no.11, pp. 767-770, 2015. 



DOI Link : not yet assigned

Download :
  V4I8007.pdf


Refbacks : Currently There are no refbacks

Quick Links


DOI:10.22362/ijcert


Science Central

Score: 13.30



Submit your paper to editorijcert@gmail.com

>