Skip to main content

Domain Dictionary-Based Metadata Construction for Search Over Encrypted Cloud Data

  • Conference paper
  • First Online:
Intelligent Communication, Control and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 624))

Abstract

With the massive increase in the amount of data generated every day and with the advent of the modern technology, cloud storage has become a need of the hour. Advancements in cloud computing led the data owners to outsource their intensive data to cloud servers like Amazon, Microsoft Azure, Google Drive, and so on. Cloud storage services permit users to store and/or accession of data in a cloud; irrespective of the time and geographical locations, in an on-demand basis using any device. However, entrusting the cloud service provider with the sensitive data raises the underlying security and privacy issues. In order to provide confidentiality, data are encrypted before safekeeping it on the cloud service provider (CSP). Although the encryption approach does strengthen the data security, it consequently effects the various operations to be performed on the data, most significant being data searching and retrieval. Various searchable encryption schemes are developed for search over outsourced encrypted data. Mostly these schemes perform index-based ranked search and employ frequency of search keyword in the document; hence, challenging the security and reducing efficiency. In this paper, we present a domain dictionary-based index generation scheme for search over encrypted data. We have proposed a novel concept of domain dictionary wherefrom a metadata-based index file is to be generated that is to be queried while performing searching operations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Neelam S. Khan and C. Rama Krishna. A Survey on Secure Ranked Keyword Search over Outsourced Encrypted Cloud Data. International Conference on Computer Networks and Information Technology (ICCNIT), March 20–21, 2014, NITTTR Chandigarh, pp. 347–357.

    Google Scholar 

  2. Mahreen S., Warsi M.R, Neelam S.: Secure Metadata based Search over Encrypted Cloud Data supporting Similarity Ranking: Unpublished.

    Google Scholar 

  3. Moh, T.S., Ho, K.H.: Efficient semantic search over encrypted data in cloud computing. In:International Conference on High Performance Computing and Simulation, pp. 382–390. Bologna (2014). http://ieeexplore.ieee.org/abstract/document/6903711/

  4. Saini V., Challa R.K., Khan N.S.: An Efficient Multi-keyword Synonym-Based Fuzzy Ranked Search Over Outsourced Encrypted Cloud Data. In: Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol. 452. Springer, Singapore (2016). http://doi.org/10.1007/978-981-10-1023-1_43

  5. Sharon. E, N. Saravanan.: A Survey on Keyword Based Search over Outsourced Encrypted Data. In: International Journal of Engineering and Technology (IJET), vol. 5, pp. 905–909, (2013).

    Google Scholar 

  6. D. Song, D. Wagner, and A. Perrig.: Practical Techniques for Searches on Encrypted Data. In: Proceedings IEEE Symposium. Security and Privacy, (2000).

    Google Scholar 

  7. E.-J. Goh, “Secure Indexes,” Cryptology ePrint Archive, http://eprint.iacr.org/2003/216. 2003.

  8. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of EUROCRYPT, pp. 457–473, (2005).

    Google Scholar 

  9. J. Bethencourt, A. Sahai, and B. Waters.: Ciphertext-policy Attribute based encryption. In: Proceedings of IEEE Symposium. on Security and Privacy, pp. 321–334, (2007).

    Google Scholar 

  10. L. Ballard, S. Kamara, and F. Monrose.: Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. In: Proceedings of Seventh Int’l Conference Information and Communication Security (ICICS ’05), (2005).

    Google Scholar 

  11. D. Boneh and B. Waters.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Proc. Fourth Conf. Theory Cryptography (TCC), pp. 535–554, (2007).

    Google Scholar 

  12. J. Katz, A. Sahai, and B. Waters.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Proc.27th Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), (2008).

    Google Scholar 

  13. A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Proc. 29th Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT ’10), (2010).

    Google Scholar 

  14. A. Swaminathan, Y. Mao, G. M. Su, H. Gou, A. Varna, S. He, M. Wu, and D. Oard.: Confidentiality-Preserving Rank-Ordered Search. In: ACM Storage SS, pp. 7–12, (2007).

    Google Scholar 

  15. K. Li; W. Zhang; C. Yang; N. Yu.: Security Analysis on One to-Many Order Preserving Encryption-Based Cloud Data Search. In: IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1918–1926, (2015).

    Google Scholar 

  16. C. Wang, N. Cao, K. Ren, and W. J. Lou.: Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.In: IEEE Transaction on Parallel Distributed System, vol. 23, no. 8, pp. 1467–1479, (2012).

    Google Scholar 

  17. N. Cao, C. Wang, M. Li, K. Ren, and W. J. Lou.: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data.In: IEEE INFOCOM, pp. 829–837, (2011).

    Google Scholar 

  18. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy preserving multi-keyword search over encncrypted cloud data.In: IEEE Trans. Parallel Distrib. Syst. 25, 222–233, (2014).

    Google Scholar 

  19. Z. Xu, W. Kang, R. Li, K. Yow and C. Xu.: Efficient multi keyword rank query on encrypted cloud data. In: 18th IEEE International Conference on Parallel and Distributed Systems, pp. 244–251, (2012).

    Google Scholar 

  20. Khan Neelam, S., Challa, R.K.: Secure ranked fuzzy multi-keyword search over outsourced en-crypted cloud data. In: 5th IEEE International Conference on Computer and Communication Technology (ICCCT), Allahabad (2014).

    Google Scholar 

  21. Z. Fu, X. Sun, N. Linge, and L. Zhou.: Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query. In: IEEE Transaction Consumer Electronics, vol. 60, no. 1, pp. 164–172, (2014).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. K. Mahreen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mahreen, S.K., Warsi, M.R., Neelam, S.K. (2018). Domain Dictionary-Based Metadata Construction for Search Over Encrypted Cloud Data. In: Singh, R., Choudhury, S., Gehlot, A. (eds) Intelligent Communication, Control and Devices. Advances in Intelligent Systems and Computing, vol 624. Springer, Singapore. https://doi.org/10.1007/978-981-10-5903-2_68

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5903-2_68

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5902-5

  • Online ISBN: 978-981-10-5903-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics