
International Journal of Engineering Research in Computer Science and Engineering
Volume5 ,February 2018.
Volume5,February 2018,
Topic : A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
Authors:P.Rasagna || Rafia Tamkeen, T.Srikanth, Syed Abdul Moeed
Abstract:Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TF_IDF model are combined in the index construction and query generation. We construct a special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search. The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between the encrypted index and query vectors. In order to resist statistical attacks, phantom terms are added to the index vector for blinding search results. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme..
Keywords:
Download Paper
DOI: 01.1617/vol5/iss2/pid67253
Related Articles
Wormhole Attack Prevention and Detection Approaches in Mobile Ad hoc Networks: A Survey.
Authors: Avinash Singh || Ram Singar Verma
Doi : 01.1617/vol4/iss03/pid34591
Volume4 ,March 2018.
Developing a GIS Platform for Tourism marketing and promotion In Nigeria: Case Study Of Bauchi State
Authors: Abubakar Siddiq Ango || Abdulsalam Waheed Abdulfatah, Idrissa Djibo
Doi : 01.1617/vol3/iss09/pid91783
Volume3 ,September 2018.
Decentralized Trust Management and Trust Worthiness of Cloud Environments
Authors: Qhubaib Syed || Syed Afzal Ahmed,Syed Abdul Haq
Doi : 01.1617/vol4/iss4/pid21386
Volume4 ,April 2018.
Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients
Authors: Sindhura Rao || Ashwini S,Kusuma Mohanchandra
Doi : 01.1617/vol4/iss4/pid82074
Volume4 ,April 2018.
Multilevel Authentication System
Authors: Nichita Silva Lobo || Beverly Rodrigues,Pavni Alluri,Prathibha Singh,Nicole Alvares
Doi : 01.1617/vol4/iss4/pid82135
Volume4 ,April 2018.
Stock Prediction Using Clustering And Regression Techniques
Authors: Shalini Lotlikar || Megha Ainapurkar
Doi : 01.1617/vol4/iss4/pid39708
Volume4 ,April 2018.
Brain Tumor Detection using Image Segmentation
Authors: Siddhi N. Nerurkar ||
Doi : 01.1617/vol4/iss4/pid02845
Volume4 ,April 2018.
Video Mining using Query by Example
Authors: Rosebud Valadares ||
Doi : 01.1617/vol4/iss4/pid89542
Volume4 ,April 2018.
Fuzzy Opinion Mining for Product Recommender System
Authors: Aarti Bandodker ||
Doi : 01.1617/vol4/iss4/pid03652
Volume4 ,April 2018.
Aadhaar and Server based Electoral system
Authors: Yugansh Garg || Sakshi Mishra
Doi : 01.1617/vol4/iss4/pid69053
Volume4 ,April 2018.