A STUDY ON PRIVACY PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA

Authors

  • Vipin Das Department of Computer Science, Saintgits College of Engineering (Autonomous), Kottayam, Pathamuttom, Kerala, India Author
  • Prasanth K Baby Department of Computer Science, Saintgits College of Engineering (Autonomous), Kottayam, Pathamuttom, Kerala, India Author

Keywords:

Privacy, Keyword Search, Multiple Keyword Search, Encryption

Abstract

With the great advent of the cloud computing the data owners are intent for outsource the complex data. The main advantage is that, for great flexibility and economic saving. For protecting data privacy, sensitive data must have to be encrypted before outsourcing. As the encryption is done there is a necessary for the encrypted cloud data search service is importance. The stored data is relatively large so as, required multiple keywords in the search query and return document in the order of their relevance to these keywords searched. In this paper, the survey on searchable encryption focus on multiple keyword search.

References

NIST Cloud Definition, Access Year January 2016, http:// csrc. nist. gov/ publications/ nistpubs/ 800-145/ SP800-145.pdf.

Kamara, Seny, and Kristin Lauter. "Cryptographic cloud storage." Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2010. 136-149.

Ankatha Samuyelu Raja Vasanthi ,” Secured Multi Keyword Ranked Search over Encrypted Cloud Data”, 2012.

Y.-C. Chang and M. Mitzenmacher, “Privacy Preserving Keyword Searches on Remote Encrypted Data,” Proc. Third Int’l Conf. Applied Cryptography and Network Security, 2005.

Y. Prasanna, Ramesh . ”Efficient and Secure Multi-Keyword Search on Encrypted Cloud Data”, 2012.

Jain Wang, Yan Zhao , Shuo Jaing, and Jaijin Le, ”Providing Privacy Preserving in Cloud Computing”,2010.

Larry A. Dunning, Ray Kresman ,“ Privacy Preserving Data Sharing with Anonymous ID Assignment”,2013.

J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy Keyword Search Over Encrypted Data in Cloud Computing,” Proc. IEEE Infocom, Mar. 2010.

N. Cao, S. Yu, Z. Yang, W. Lou, and Y. Hou, “LT Codes-BasedSecure and Reliable Cloud Storage Service,” Proc. IEEE Infocom, pp. 693-701, 2012.

S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing,” Proc.IEEE Infocom, 2010.

C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE Infocom, 2010.

Downloads

Published

2016-05-14

How to Cite

Vipin Das, & Prasanth K Baby. (2016). A STUDY ON PRIVACY PRESERVING MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA. INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND INFORMATION TECHNOLOGY (IJRCAIT), 4(3), 33-37. https://ijrcait.com/index.php/home/article/view/IJRCAIT_04_03_006