IJTEEE

Open Access Journal of Scientific, Technology & Engineering Research


International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)
QUICK LINKS
CURRENT PUBLICATIONS



IJTEEE >> Volume 3 - Issue 6, June 2015 Edition



International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289



A Survey On Ranked Multikeyword Search Over Outsourced Cloud Data

[Full Text]

 

AUTHOR(S)

Lekshmi Balakrishnan, Soja Salim

 

KEYWORDS

Keywords: Cloud computing; searchable encryption;privacy-preserving;ranked search

 

ABSTRACT

ABSTRACT: With the arrival of cloud computing, data owners can outsource their complex data from local systems to the commercial public cloud .Storing data on cloud enables them to access their data from anywhere by using any system. The main advantage of cloud computing is data service outsourcing.It allows data owners to store their documents in the public data centers by economically saving their capital investment towards data management. But for protecting data privacy, sensitive information must be encrypted before storing them to cloud.Encrypting the documents before storing them to cloud outmoded traditional data utilization which focuses on plaintext keyword search. Today’s main challenge is to enable searching over encrypted cloud data. Since cloud contains large number of data users and documents, it is necessary to allow multi-keywords in the search request and return documents in the order of their relevance to these keywords. The main aim is to make effective data access in the public cloud storage by improving various searching techniques, thereby, increasing the data utilization. In this survey, an attempt is made to study various searching techniques over encrypted cloud data.

 

REFERENCES

[1] M. S. I. M. K. Mehmet Kuzu, “Efficient similarity search over encrypted data,” IEEE 28th International Conference on Data Engineering, 2012.

[2] P.Indyk and R.Motwani, “Approximate nearest neighbors: towards removing the curse of dimensionality,” in 30 th STOC, 1998.

[3] P. I. A. Gionis and R. Motwani., “A. gionis, p. indyk, and r. motwani.,” in Proc. of VLDB’99, 1999.

[4] D. W. D. Song and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. of S&P, 2000.

[5] S. Zittrower and C. C. Zou, “Encrypted phrase searching in the cloud,” in IEEE Symposium on Security and Privacy, 2012.

[6] Y. Z. G. X. J. Y. P. Lu and M. Li, “Toward secure multikeyword top-k retrieval over encrypted cloud ata,” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, vol. 10, Aug 2013.

[7] D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,” Proc. Fourth Conf. Theory Cryptography (TCC),, pp. 535–554, 2007.

[8] E. S. E. Shen and B. Waters, “Predicate privacy in encryption systems,” Proc. Sixth Theory of Cryptography Conf. Theory of Cryptography (TCC), 2009.

[9] M. L. K. R. Ning Cao, Cong Wang and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014.