Advertisement

Ranked Keyword Search Result Verification to Detect Misbehaving Cloud Servers

  • L. AshwiniEmail author
  • N. R. Sunitha
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 98)

Abstract

Nowadays, so many people outward their delicate information to the cloud in an encrypted format to maintain its privacy. On this basis, financial cloud computing becomes more efficient and useful. Protected keyword go through encrypted cloud information has fascinated many scholars for performing an effective data utilization. Current research is based on the impression that a cloud server is curious but truthful and therefore the search outcomes are not proved. But in real-world, sometimes cloud server might compromise and behave untruthfully. To maintain the reliability and secrecy, the outsourced delicate information should remain in the encrypted form. It is a task to go through the encoded data. There is a search facility to deliberate a ranked keyword search and there will be various data users and important files imported into the cloud. Hence, we propose a Ranked keyword search result verification for the detection of misbehaving cloud servers. We demonstrate two misbehaving scenarios of cloud server that will be detected by data user by using the relevance score of each file. In the whole process cloud server operates on the encrypted data.

Keywords

Cloud-computing RSA CP-ABE Ranked keyword 

References

  1. 1.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRefGoogle Scholar
  2. 2.
    Zhu, C., Leung, V., Hu, X., Shu, L., Yang, L.T.: A review of key issues that concern the feasibility of mobile cloud computing. In: Proceedings of IEEE International Conference on IEEE Cyber Physical and Social Computing, and Green Computing and Communications, and IEEE Internet of Things, pp. 769–776 (2013)Google Scholar
  3. 3.
    Ritz, Vulnerable icloud may be the reason to celebrity photo leak (2014). http://marcritz.com/icloud-flaw-leak/
  4. 4.
    Hore, B., Chang, E.C., Diallo, M.H., Mehrotra, S.: Indexing encrypted documents for supporting efficient keyword search. In: Proceedings of Secure Data Manage, Istanbul, Turkey, August 2012, pp. 93–110 (2012)Google Scholar
  5. 5.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology - EUROCRYPT 2004, pp. 506–522. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of IEEE Distributed Computing Systems, Genoa, Italy, June 2010, pp. 253–262 (2010)Google Scholar
  7. 7.
    Wang, B., Yu, S., Lou, W., Hou, Y.T.: Privacy preserving multi keyword fuzzy search over encrypted data in the cloud. In: Proceedings of IEEE INFOCOM, Tornoto, Canada, May 2014, pp. 2112–2120 (2014)Google Scholar
  8. 8.
    Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Proceedings of the Third International Conference on Applied Cryptography and Network Security, pp. 442–455. Springer (2005)Google Scholar
  9. 9.
    Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: Proceedings of IEEE INFOCOM, Tornoto, Canada, May 2014, pp. 226–234 (2014)Google Scholar
  10. 10.
    Jung, T., Mao, X., Li, X., Tang, S.-J., Gong, W., Zhang, L.: Privacy preserving data aggregation without secure channel: multivariate polynomial evaluation. In Proceedings of INFOCOM, pp. 2634–2642. IEEE (2013)Google Scholar
  11. 11.
    Yang, Y., Li, H., Liu, W., Yang, H., Wen, M.: Secure dynamic searchable symmetric encryption with constant document update cost. In: Proceedings of GLOBCOM. IEEE (2014, to appear)Google Scholar
  12. 12.
    Boldyreva, A., Chenette, N., Lee, Y., Oneill, A.: Order-preserving symmetric encryption. In: Advances in Cryptology - EUROCRYPT, pp. 224–241. Springer (2009)Google Scholar
  13. 13.
    Yu, J., Lu, P., Zhu, Y., Xue, G., Li, M.: Towards secure multi keyword top-k retrieval over encrypted cloud data. IEEE Trans. Dependable Sec. Comput. 10(4), 239–250 (2013)CrossRefGoogle Scholar
  14. 14.
    Li, R., Xu, Z., Kang, W., Yow, K.C., Xu, C.-Z.: Efficient multi keyword ranked query over encrypted data in cloud computing. Future Gener. Comput. Syst. 30, 179–190 (2014)CrossRefGoogle Scholar
  15. 15.
    Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X.: Enabling efficient multi keyword ranked search over encrypted cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. (2014).  https://doi.org/10.1109/tetc.2014.2371239CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of CSESITTumkurIndia

Personalised recommendations