A Scalable Framework To Allow Users For Keyword Search With Access Control Over Encrypted Data
Abstract
In certain conditions, the keywords that the client searches on are just semantically identified with the data instead of through a definite or fluffy match. Subsequently, semantic-based keywordsearch over encoded cloud data is the fate of central significance. Be that as it may, existing plans as a rule rely on a worldwide word reference, which influences the precision of indexed lists as well as purposes wastefulness in data refreshing. Also, albeit compound keywordsearch is basic by and by, the current methodologies just procedure them as single words, which split the first semantics and accomplish low exactness. To address these impediments, we at first propose a Compound Concept Semantic Similarity (CCSS) estimation strategy to gauge the semantic closeness between compound ideas. Next, by incorporating CCSS with Locality-Sensitive Hashing (LSH) capacity and the safe k-Nearest Neighbor conspire, a Semantic-based Compound Keyword Search (SCKS) plot is proposed. SCKS accomplishes semantic-based search as well as multi-keywordsearch and positioned keywordsearch. Furthermore, SCKS likewise disposes off the predefined worldwide library and can effectively bolster data update.
Â
References
D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,†in IEEE Symposium on Security and Privacy, 2000, pp. 44–55.
B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy-preserving multi-keyword fuzzy search over encrypted data in the
cloud,†in IEEE International Conference on Computer Communications, 2014, pp. 2112–2120.
M. Kuzu, M. S. Islam, and M. Kantarcioglu, “Efï¬cient similarity search over encrypted data,†in IEEE 28th International Conference on Data Engineering (ICDE), 2012, pp. 1156–1167.
C. Wang, K. Ren, S. Yu, and K. M. R. Urs, “Achieving usable and privacy-assured similarity search over outsourced cloud data,†in 2012 Proceedings of IEEE INFOCOM, 2012, pp. 451–459.
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,†IEEE Transactions on Parallel and Cloud Systems, vol. 25, no. 1, pp. 222–233, 2014.
R. Li, Z. Xu, W. Kang, K. C. Yow, and C. Z. Xu, “Efï¬cient multikeyword ranked query over encrypted data in cloud computing,†Future Generation Computer Systems, vol. 30, no. 1, pp. 179–190, 2014.
C.Orencik,M.Kantarcioglu,andE.Savas,â€Apracticalandsecure multi-keyword search method over encrypted cloud data,†in IEEE Sixth International Conference on Cloud Computing (CLOUD), 2013, pp. 390–397.
J. Yu, P. Lu, Y. Zhu, G. Xue, and M. Li, “Toward secure multikeywordtop-kretrievaloverencryptedclouddata,â€IEEETransactions on Dependable and Secure Computing, vol. 10, no. 4, pp. 239–250, 2013.
C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,†inIEEE30thInternational Conference on Cloud Computing Systems (ICDCS), 2010, pp. 253–262.
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order preserving encryption for numeric data,†in ACM SIGMOD International Conference on Management of Data, 2004, pp. 563–574.
C. Chen, X. Zhu, P. Shen, J. Hu, S. Guo, Z. Tari, and A. Y. Zomaya, “An efï¬cient privacy-preserving ranked keyword search method,†IEEE Transactions on Parallel and Cloud Systems, vol. 27, no. 4, pp. 951–963, 2016.
X.Sun,Y.Zhu,Z.Xia,andL.Chen,“Privacy-preserving keyword based semantic search over encrypted cloud data,†International Journal of Security & Its Applications, vol. 8, no. 3, pp. 9–20, 2014.
Z. Xia, Y. Zhu, X. Sun, and L. Chen, “Secure semantic expansion based search over encrypted cloud data supporting similarity ranking,†J. Cloud Comput., vol. 3, no. 1, pp. 8:1–8:11, 2014.
Z. Fu, X. Sun, N. Linge, and L. Zhou, “Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query,†IEEE Transactions on Consumer Electronics, vol. 60, no. 1, pp. 164–172, 2014.
Z. Fu, J. Shu, X. Sun, and N. Linge, “Smart cloud search services: veriï¬able keyword-based semantic search over encrypted cloud data,†IEEE Transactions on Consumer Electronics, vol. 60, no. 4, pp. 762–770, Nov 2014.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â