Open Access Open Access  Restricted Access Subscription or Fee Access

Dynamic and Secure Ranked Keyword Search in Cloud with Authenticity

G. Sankareeswari, C. Jeganathan

Abstract


Sensitive clouds data have to be encrypted before outsourced to the commercial cloud environment, which makes effective data utilization, service a very challenging task. In this paper, define and solve the problem of secure ranked keyword search over encrypted cloud data. Enhance system usability by enabling search result relevance ranking instead of sending undifferentiated results and further ensures the file retrieval accuracy through Ranked search. Specifically, The statistical measure approach explore, i.e., relevance score, from information retrieval to build a secure searchable index, develop a one-to-many order-preserving mapping technique to properly protect those sensitive score information. Hence, supporting the score dynamics in the searchable index for an RSSE system, the corresponding file collection updates reflected thus of practical importance. Thus, enabling a search result authentication mechanism that can detect such unexpected behaviours of cloud server is also of practical interest and worth further investigation. The resultant design is able to facilitate efficient server-side ranking without losing keyword privacy.

Keywords


Authenticity, Dynamic, Ranked Search, Searchable Encryption, Order-Preserve Mapping.

Full Text:

PDF

References


Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data,Cong Wang,Student Member ,IEEE, Ning Cao, Student Member, IEEE, Kui Ren, Senior Member, IEEE, and Wenjing Lou,Senior Member, IEEE, VOL. 23, NO. 8, AUGUST 2012

C. Wang, N.cao,j.Li,k.Ren, and W.lou, ”Secure Ranked Keyword Search Over Encrypted Cloud Data,”proc .IEEE 30thInt‟l Conf. Distributed Computing Syystems (ICDCS‟10), 2010.

J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W.Lou, “Fuzzy Keyword Search over Encrypted Data in Cloud Computing,”Proc IEEE INFOCOM‟10, 2010.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc .IEEE INFOCOM ‟11, 2011.

A. Boldyreva, N. Chenette, Y. Lee, and A. O‟Neill, “Order-Preserving Symmetric Encryption,” Proc. Int‟l Conf. Advances in Cryptology (Eurocrypt ‟09), 2009.

K. Ren, C. Wang, and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, vol 16, no. 1, pp. 69-73, 2012.

C. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, “Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data,” Proc. IEEE INFOCOM, 2012.

Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22,no. 5, pp. 847-859, May 2011

RFC “Request for Comments Database,” http://www.ietf.org/rfc.html, 2012.

M.C. Mont, S. Pearson, and P. Bramhall, “Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services,” Proc. Int‟l Workshop Database and Expert Systems Applications (DEXA), pp. 377-382, 2003. S. Oaks, Java Security. O‟Really, 2001.

P.T. Jaeger, J. Lin, and J.M. Grimes, “Cloud Computing and Information Policy: Computing in a Policy Cloud?,” J. Information Technology and Politics, vol. 5, no. 3, pp. 269-283, 2009.

R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,”Proc. ACM Conf. Computer and Comm. Security (CCS‟06), 2006.

Cloud Security Alliance “Security Guidance for Critical Areas of Focus in Cloud Computing,” http://www.cloudsecurityalliance. org, 2009.

P. Mell and T. Grance, “Draft Nist Working Definition of Cloud Computing,”http://csrc.nist.gov/groups/SNS/cloudcomputing/index.htm, Jan. 2010.

M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,”Technical Report UCB-EECS-2009-28, Univ. of California,Berkeley, Feb. 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.