Author : L.Harikrishna 1
Date of Publication :7th April 2015
Abstract: Information sharing is the key goal of Cloud Storage servers. It allows storage of sensitive and large volume of data with limited cost and high access benefits. Security must be given due importance for the cloud data with utmost care to the data and confidence to the data owner. But this limits the utilization of data through plain text search. Hence an excellent methodology is required to match the keywords with encrypted cloud data. The proposed approach similarity measure of “coordinate matching” combined with “inner product similarity” quantitatively evaluates and matches all relevant data with search keyword to arrive at best results .In this approach, each document is associated with a binary vector to represent a keyword contained in the document. The search keyword is also described as a binary vector, so the similarity could be exactly measured by the inner product of the query vector with the data vector. The inner product computation and the two multi-keyword ranked search over encrypted data (MRSE) schemes ensures data privacy and provides detailed information about the dynamic operation on the data set and index. To further refine these search results, “stop word” and “stemming” techniques have been used. Also, a checksum value for each page is stored using checksum validation algorithm and individual pages are updated in the cloud which reduces the usage cost and hence improves the experience of the user.
Reference :
-
- R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,”Proc. 13th ACM Conf. Computer and Comm. Security (CCS ’06), 2006.
- S.Yu, C.Wang, K.Ren, and W.Lou, “Achieving Secure, Scalable,and Fine-Grained Data Access Control in Cloud Computing,” Proc. IEEE INFOCOM, 2010.
- C. Wang, Q. Wang, K. Ren, and W. Lou, “PrivacyPreserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE INFOCOM, 2010.
- S. Zerr, E. Demidova, D. Olmedilla, W. Nejdl, M. Winslett, and S. Mitra, “Zerber: r-Confidential Indexing for Distributed Documents,” Proc. 11th Int’l Conf. Extending Database Technology (EDBT ’08), pp. 287-298, 2008.
- I.H. Witten, A. Moffat, and T.C. Bell, Managing Gigabytes:Compressing and Indexing Documents and Images. Morgan Kaufmann Publishing, May 1999
- S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r: Top-k Retrieval from a Confidential Index,” Proc. 12th Int’l Conf. Extending Database Technology (EDBT ’09), pp. 439-449, 2009.
- R. Brinkman, “Searching in Encrypted Data,” PhD thesis, Univ. of Twente, 2007.
- Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, “Cryptography from Anonymity,” Proc. IEEE 47th Ann. Symp. Foundationsof CS,pp.239-248, 2006.
- W.K. Wong, D.W. Cheung, B. Kao, and N. Mamoulis, “Secure kNN Computation on Encrypted Databases,” Proc. 35th ACM SIGMOD Int’l Conf. Management of Data (SIGMOD), pp. 139-152,2009.