Beruflich Dokumente
Kultur Dokumente
Available at http://www.ijcsonline.com/
Abstract
Since the growth of internet technology become explosive, so does the growth of cloud technology. Virtually the cloud
technology is improving every day in these days. Along with this rapid improvement, cloud computing is also having
great flexibility and cost effectiveness. These features of cloud lure every data owners to share and upload the data and
information into a cloud network. But for privacy and security needs, they encrypt it before uploading. Hence searching
for the encrypted data in the cloud is necessary in these days. There exist techniques for searching encrypted data,
namely single keyword and Boolean keyword search. But as there is large number of data in the cloud and the number of
users using it is also large, these techniques for searching and retrieving encrypted cloud data arent sufficient. Because
the result obtained through these techniques cant satisfy a hungry user. For these reasons the need of introducing new
searching scheme called multi keyword ranked searching is necessary. The multi keyword searching scheme establishes
a set of strict privacy requirement for a secure cloud data utilization system. It also ensures that the proposed scheme
surely bring in reduced overhead on communication as well as in computation.
Keywords: Multi keyword search, ranked search, cloud computing, searchable encryption, ranked search
I.
INTRODUCTION
153 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
II.
PROBLEM STATEMENT
C. Design Goals
To enable ranked searchable symmetric encryption for
effective utilization of outsourced cloud data under the
aforementioned model, the design is intended to achieve
data secrecy and improved data retrieval. The goals are as
follows.
Multi-keyword ranked search. To design schemes
which allow multi-keyword query and provide
result similarity ranking for effective data retrieval,
instead of returning undifferentiated results.
Data secrecy. To keep the server from exposing
supplementary information from the data set and the
index, and to meet privacy requirements.
Performance. The precedent design goals are
expected to be achieved without diminishing the
performance of the system.
III.
LITERATURE SURVEY
154 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
155 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
156 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
information
about
the
remaining
REFERENCES
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, Privacy-Preserving
Multi-Keyword Ranked Search over Encrypted Cloud Data, IEEE
Computer Society, vol.25, Issue No.01 January 2014, pp. 222233,
[2] A. Singhal, Modern information retrieval: A brief overview,
IEEE Data Engineering Bulletin, vol. 24, no. 4, 2001, pp. 3543.
[3] D. Song, D. Wagner, and A. Perrig, Practical techniques for
searches on encrypted data, in Proc. of S&P, 2000.
[4] J. Katz, A. Sahai, and B. Waters, Predicate encryption supporting
disjunctions, polynomial equations, and inner products, in Proc. of
EUROCRYPT, 2008.
[5] W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, Secure
knn computation on encrypted databases, in Proceedings of the
35th SIGMOD international conference on Management of data,
2009, pp. 139152.
[6] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, A
break in the clouds: towards a cloud definition, ACM SIGCOMM
Comput. Commun. Rev., vol. 39, no. 1, 2009, pp. 5055.
[7] S. Kamara and K. Lauter, Cryptographic cloud storage, in
RLCPS, January 2010, LNCS. Springer, Heidelberg.
[8] A. Singhal, Modern information retrieval: A brief overview,
IEEE Data Engineering Bulletin, vol. 24, no. 4, 2001, pp. 3543.
[9] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, Secure ranked
keyword search over encrypted cloud data, in Proc. of ICDCS10,
2010.
[10] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, Fuzzy
keyword search over encrypted data in cloud computing, in Proc.
of IEEE INFOCOM10 Mini-Conference, March 2010, San Diego,
CA, USA.
[11] W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, Secure
knn computation on encrypted databases, in Proceedings of the
35th SIGMOD international conference on Management of data,
2009, pp. 139152.
[12] S. Zerr, E. Demidova, D. Olmedilla, W. Nejdl, M. Winslett, and S.
Mitra, Zerber: r-confidential indexing for distributed documents,
in Proc. Of EDBT, 2008, pp. 287298.
[1]
CONCLUSION
157 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016