Skip to main content

Privacy Preserving Multi Keyword Ranked Search with Context Sensitive Synonyms over the Encrypted Cloud Data

  • Conference paper
  • First Online:
Communication, Networks and Computing (CNC 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 839))

Included in the following conference series:

  • 1002 Accesses

Abstract

The increase in the number of people and organizations relying on cloud for storing their data has led to significant increase in the volume of data on cloud. Wherever the Cloud Service Provider (CSP) allows encryption of documents and metadata, keyword search becomes necessary for quick, easy and effective retrieval of outsourced encrypted cloud data. As the cloud users, over the period of time may tend to forget the exact keywords for issuing a search query, the keyword search therefore should support synonyms. But the synonym discovery is always context sensitive, as not all synonyms can simply replace a word in all occurrences of a query. It is therefore, important to keep the connotation of the word under consideration. As some synonyms can infuse a different meaning, than the one user actually intends for and can cause drift to user’s search. In this paper, we propose a scheme Context sensitive Multi keyword Ranked Search (CSMRS) to this issue by analyzing the encrypted query click logs. The results achieved show that the synonyms selected with CSMRS are more appropriate and as per the context as intended by the user.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rightscale 2016 State of the Cloud Report - Hybrid Cloud Adoption Ramps as Cloud Users and Cloud Providers Mature (2016). http://assets.rightscale.com/uploads/pdfs/RightScale-2016-State-of-the-Cloud-Report.Pdf

  2. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy (2000)

    Google Scholar 

  3. Goh, E.-J.: Secure Indexes*. Cryptology ePrint Archive: Report 2003/216 (2004)

    Google Scholar 

  4. Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005). https://doi.org/10.1007/11496137_30

    Chapter  Google Scholar 

  5. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  6. Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566–582. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_33

    Chapter  MATH  Google Scholar 

  7. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)

    Article  MathSciNet  Google Scholar 

  8. Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM CC 2006 (2006)

    Google Scholar 

  9. Brinkman, R: Searching in encrypted data. Ph.D. thesis. University of Twente (2007)

    Google Scholar 

  10. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of ICDCS 2010 (2010)

    Google Scholar 

  11. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 829–837 (2011)

    Google Scholar 

  12. Ahsan, M.M., Chowdhury, F.Z., Sabilah, M., Wahab, A.W.B.A., Idris, M.Y.I.B.: An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In: International Conference on Research and Innovation in Information Systems (ICRIIS) (2017)

    Google Scholar 

  13. Yang, C., Zhang, W., Xu, J., Xu, J., Yu, N.: A fast privacy-preserving multi-keyword search scheme on cloud data. In: International Conference on Computing & Processing (Hardware/Software), pp. 104–110 (2012)

    Google Scholar 

  14. Xu, Z., Kang, W., Li, R., Yow, K., Xu, C.Z.: Efficient multi-keyword ranked query on encrypted data in the cloud. In: ICPADS 2012, pp. 244–251 (2012)

    Google Scholar 

  15. Xu, J., Zhang, W., Yang, C., Xu, J., Yu, N.: Two-step-ranking secure multi-keyword search over encrypted cloud data. In: International Conference on Computing & Processing (Hardware/Software), pp. 124–130 (2012)

    Google Scholar 

  16. Yang, C., Zhang, W., Xu, J., Xu, J., Yu, N.: A fast privacy-preserving multi-keyword search scheme on cloud data. In: International Conference on Computing & Processing (Hardware/Software), pp. 104–110 (2012)

    Google Scholar 

  17. Handa, R., Challa, R.K.: A cluster based multi-keyword search on outsourced encrypted cloud data. In: 2nd IEEE International Conference on Computing for Sustainable Global Development, pp. 115–120 (2015)

    Google Scholar 

  18. Krishna, C.R., Handa, R.: Dynamic cluster based privacy-preserving multi-keyword search over encrypted cloud data. In: 6th IEEE International Conference on Cloud System and Big Data Engineering, pp. 146–151 (2016)

    Google Scholar 

  19. Khan, N.S., Krishna, C.R., Khurana, A.: Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data. In: 5th IEEE International Conference on Computer and Communication Technology, pp. 241–249 (2014)

    Google Scholar 

  20. Fu, Z., Sun, X., Linge, N., Zhou, L.: Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans. Consum. Electron. 60(1), 164–172 (2014)

    Article  Google Scholar 

  21. Krishna, C.R., Mittal, S.A.: Privacy preserving synonym based fuzzy multi-keyword ranked search over encrypted cloud data. In: International Conference on Computing, Communication and Automation (ICCCA2016), pp. 1187–1194 (2016)

    Google Scholar 

  22. Saini, V., Challa, R.K., Khan, N.S.: An efficient multi-keyword synonym-based fuzzy ranked search over outsourced encrypted cloud data. In: Choudhary, R.K., Mandal, J.K., Auluck, N., Nagarajaram, H.A. (eds.) Advanced Computing and Communication Technologies. AISC, vol. 452, pp. 433–441. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-1023-1_43

    Chapter  Google Scholar 

  23. Medelyan, O.: Why not use query logs as corpora? In: Ninth ESSLLI Student Session, pp. 1–10 (2004)

    Google Scholar 

  24. Liu, C., Zhu, L., Wang, M., Tan, Y.: Search pattern leakage in searchable encryption: attacks and new construction. J. Inf. Sci.: Int. J. 265, 176–188 (2014)

    Article  Google Scholar 

  25. Wei, X., Peng, F., Tseng, H., Lu, Y., Wang, X., Dumoulin, B.: Search with synonyms: problems and solutions. In: Coling 2010, Poster Volume, Beijing, pp. 1318–1326 (2010)

    Google Scholar 

  26. (2017). http://moby-thesaurus.org/

  27. (2017). http://www.cim.mcgill.ca/~dudek/206/Logs/AOL-user-ct-collection

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anu Khurana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Khurana, A., Challa, R.K., Kaur, N. (2019). Privacy Preserving Multi Keyword Ranked Search with Context Sensitive Synonyms over the Encrypted Cloud Data. In: Verma, S., Tomar, R., Chaurasia, B., Singh, V., Abawajy, J. (eds) Communication, Networks and Computing. CNC 2018. Communications in Computer and Information Science, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-2372-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2372-0_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2371-3

  • Online ISBN: 978-981-13-2372-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics