Abstract
With the massive increase in the amount of data generated every day and with the advent of the modern technology, cloud storage has become a need of the hour. Advancements in cloud computing led the data owners to outsource their intensive data to cloud servers like Amazon, Microsoft Azure, Google Drive, and so on. Cloud storage services permit users to store and/or accession of data in a cloud; irrespective of the time and geographical locations, in an on-demand basis using any device. However, entrusting the cloud service provider with the sensitive data raises the underlying security and privacy issues. In order to provide confidentiality, data are encrypted before safekeeping it on the cloud service provider (CSP). Although the encryption approach does strengthen the data security, it consequently effects the various operations to be performed on the data, most significant being data searching and retrieval. Various searchable encryption schemes are developed for search over outsourced encrypted data. Mostly these schemes perform index-based ranked search and employ frequency of search keyword in the document; hence, challenging the security and reducing efficiency. In this paper, we present a domain dictionary-based index generation scheme for search over encrypted data. We have proposed a novel concept of domain dictionary wherefrom a metadata-based index file is to be generated that is to be queried while performing searching operations.
References
Neelam S. Khan and C. Rama Krishna. A Survey on Secure Ranked Keyword Search over Outsourced Encrypted Cloud Data. International Conference on Computer Networks and Information Technology (ICCNIT), March 20–21, 2014, NITTTR Chandigarh, pp. 347–357.
Mahreen S., Warsi M.R, Neelam S.: Secure Metadata based Search over Encrypted Cloud Data supporting Similarity Ranking: Unpublished.
Moh, T.S., Ho, K.H.: Efficient semantic search over encrypted data in cloud computing. In:International Conference on High Performance Computing and Simulation, pp. 382–390. Bologna (2014). http://ieeexplore.ieee.org/abstract/document/6903711/
Saini V., Challa R.K., Khan N.S.: An Efficient Multi-keyword Synonym-Based Fuzzy Ranked Search Over Outsourced Encrypted Cloud Data. In: Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol. 452. Springer, Singapore (2016). http://doi.org/10.1007/978-981-10-1023-1_43
Sharon. E, N. Saravanan.: A Survey on Keyword Based Search over Outsourced Encrypted Data. In: International Journal of Engineering and Technology (IJET), vol. 5, pp. 905–909, (2013).
D. Song, D. Wagner, and A. Perrig.: Practical Techniques for Searches on Encrypted Data. In: Proceedings IEEE Symposium. Security and Privacy, (2000).
E.-J. Goh, “Secure Indexes,” Cryptology ePrint Archive, http://eprint.iacr.org/2003/216. 2003.
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of EUROCRYPT, pp. 457–473, (2005).
J. Bethencourt, A. Sahai, and B. Waters.: Ciphertext-policy Attribute based encryption. In: Proceedings of IEEE Symposium. on Security and Privacy, pp. 321–334, (2007).
L. Ballard, S. Kamara, and F. Monrose.: Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. In: Proceedings of Seventh Int’l Conference Information and Communication Security (ICICS ’05), (2005).
D. Boneh and B. Waters.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Proc. Fourth Conf. Theory Cryptography (TCC), pp. 535–554, (2007).
J. Katz, A. Sahai, and B. Waters.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Proc.27th Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), (2008).
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Proc. 29th Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT ’10), (2010).
A. Swaminathan, Y. Mao, G. M. Su, H. Gou, A. Varna, S. He, M. Wu, and D. Oard.: Confidentiality-Preserving Rank-Ordered Search. In: ACM Storage SS, pp. 7–12, (2007).
K. Li; W. Zhang; C. Yang; N. Yu.: Security Analysis on One to-Many Order Preserving Encryption-Based Cloud Data Search. In: IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1918–1926, (2015).
C. Wang, N. Cao, K. Ren, and W. J. Lou.: Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.In: IEEE Transaction on Parallel Distributed System, vol. 23, no. 8, pp. 1467–1479, (2012).
N. Cao, C. Wang, M. Li, K. Ren, and W. J. Lou.: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data.In: IEEE INFOCOM, pp. 829–837, (2011).
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy preserving multi-keyword search over encncrypted cloud data.In: IEEE Trans. Parallel Distrib. Syst. 25, 222–233, (2014).
Z. Xu, W. Kang, R. Li, K. Yow and C. Xu.: Efficient multi keyword rank query on encrypted cloud data. In: 18th IEEE International Conference on Parallel and Distributed Systems, pp. 244–251, (2012).
Khan Neelam, S., Challa, R.K.: Secure ranked fuzzy multi-keyword search over outsourced en-crypted cloud data. In: 5th IEEE International Conference on Computer and Communication Technology (ICCCT), Allahabad (2014).
Z. Fu, X. Sun, N. Linge, and L. Zhou.: Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query. In: IEEE Transaction Consumer Electronics, vol. 60, no. 1, pp. 164–172, (2014).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mahreen, S.K., Warsi, M.R., Neelam, S.K. (2018). Domain Dictionary-Based Metadata Construction for Search Over Encrypted Cloud Data. In: Singh, R., Choudhury, S., Gehlot, A. (eds) Intelligent Communication, Control and Devices. Advances in Intelligent Systems and Computing, vol 624. Springer, Singapore. https://doi.org/10.1007/978-981-10-5903-2_68
Download citation
DOI: https://doi.org/10.1007/978-981-10-5903-2_68
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5902-5
Online ISBN: 978-981-10-5903-2
eBook Packages: EngineeringEngineering (R0)