Author : S.Uma Maheswari 1
Date of Publication :21st April 2017
Abstract: The enhancement and the fame of cloud computing are increasing nowadays which is driving the data owners to keep their personal and professional data on public cloud servers With the help of data outsourcing the organizations can provide reliable and efficient services to their users. The other advantage of outsourcing the data over cloud servers is for high benefit and lesser cost in managing the data and the data can be accessed from anywhere and at any time. However, for privacy concerns, the data that are highly sensitive should be encrypted before outsourcing. Taking into consideration the huge amount of data users and files that are present in the cloud, it is important that multiple keywords should be allowed in the searching request and retrieve the files relevant to those keywords. There are some methods and solutions offered to provide privacy and security for the data over the cloud server. However, the data that are sensitive should be encrypted and stored before outsourcing. In this paper, a secure scheme called the enhanced multi-keyword ranked search is presented. In the proposed scheme the search takes place as content based search along with ranking. Based on the content, data is searched and retrieved and then the rank is applied. During searching, attacks might be done by SQL injection to dump the database contents by the unauthorized users or attackers. In this project SQL injection is not allowed. The SQL parameterization technique is used to prove that SQL injection is not possible
Reference :
-
- Zhihua Xia, “A Secure and Dynamic Multikeyword Ranked Search Scheme over Encrypted Cloud Data”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL: PP NO: 99 YEAR 2015
- M. Kuzu, M. S. Islam, and M. Kantarcioglu, “Efficient similarity search over encrypted data, ” in Data Engineering (ICDE), 2012 IEEE 28th International Conference on. IEEE, 2012, pp. 1156–1167
- Wenhai Sun et al., "Privacy-Preserving Multikeyword Text Search in the Cloud Supporting Similarity-based Ranking'', the 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou, China, May 2013.
- N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preservingmulti-keyword ranked search over encrypted cloud data,” in IEEE INFOCOM, April 2011, pp. 829–837.
- C.Wang, N. Cao, K. Ren, and W. Lou, “Enabling secure and efficient ranked keyword search over outsourced cloud data,”Parallel and Distributed Systems, IEEE Transactions on, vol. 23, no. 8,pp. 1467–1479, 2012.
- D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu,and M. Steiner, “Dynamic searchable encryption in very large databases: Data structures and implementation,” in Proc. of NDSS,vol. 14, 2014.
- Cong Wang et al.,”Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 23, no.8, August 2012
- P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over encrypted data,” in Applied Cryptography and Network Security. Springer, 2004, pp. 31–45