Abstract
Data outsourcing to the cloud is gaining popularity day by day in cloud computing. It requires a dynamic architecture that avoids loopholes and stops intruders from entering the cloud environment. To retrieve the enciphered documents from the cloud, the latest technique that is enrolled effectively is multi-keyword fuzzy search. The proposed research work uses this technique along with the n-gram corpus algorithm that helps to achieve relevancy score and sub-linear search time. This algorithmic combination is able to predict the privacy ranking measure of the retrieved data. To validate the opposed approach, simulation analysis has been performed to preserve user-oriented privacy in a cloud environment. The ranking precision of the proposed method is compared with (Fu et al. in IEEE Trans Inf Forensics Secur 12(8):1874–1884. https://doi.org/10.1109/TIFS.2017.2692728, 2017) which uses a stemming algorithm and a matching algorithm based on the inner product. The results express the efficiency of the proposed approach by showing a relative improvement in security precision up to 55%.
Similar content being viewed by others
Data Availibility
The datasets generated during and/or analysed during the current study are available in the Hospital Emergency Department - Diagnosis, Procedure, and External Cause Codes repository, https://data.world/chhs/0e43d826-14d2-4ee3-b4f7-4ef86b961b9c.
References
Ballard L, Kamara S, Monrose F (2005) Achieving efficient conjunctive keyword searches over encrypted data. In: Qing S, Mao W, López J, Wang G (eds) Information and communications security, pp 414–426. Springer, Berlin (ISBN 978-3-540-32099-9)
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Cachin C, Camenisch JL (eds) Advances in cryptology—EUROCRYPT, pp 506–522. Springer, Berlin
California Health and Human Services (2015) Hospital emergency department—diagnosis, procedure, and external cause codes. https://data.world/chhs/0e43d826-14d2-4ee3-b4f7-4ef86b961b9c. Accessed 16 Oct 2018
Cao N, Wang C, Li M, Ren K, Lou W (2014a) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233. https://doi.org/10.1109/TPDS.2013.45(ISSN 1045-9219)
Cao N, Wang C, Li M, Ren K, Lou W (2014b) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233. https://doi.org/10.1109/TPDS.2013.45(ISSN 1045-9219)
Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya AY (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27(4):951–963. https://doi.org/10.1109/TPDS.2015.2425407 (ISSN 1045-9219)
Chuah M, Hu W (2011) Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In: 2011 31st international conference on distributed computing systems workshops, pp 273–281. https://doi.org/10.1109/ICDCSW.2011.11
Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security, CCS ’06, New York, NY, USA. ACM, pp 79–88. https://doi.org/10.1145/1180405.1180417(ISBN 1-59593-518-5)
Dai H, Ji Y, Yang G, Huang H, Yi X (2019) A privacy-preserving multi-keyword ranked search over encrypted data in hybrid clouds. IEEE Access 8:4895–4907
Dilip G (2020) An efficient privacy preserving on high-order heterogeneous data using fuzzy k-prototype clustering. J Ambient Intell Humaniz Compu. https://doi.org/10.1007/s12652-020-01987-z
Ding X, Liu P, Jin H (2017) Privacy-preserving multi-keyword top-$ k $ k similarity search over encrypted data. IEEE Trans Depend Secure Comput 16(2):344–357
Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716. https://doi.org/10.1109/TIFS.2016.2596138 (ISSN 1556-6013)
Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forensics Secur 12(8):1874–1884. https://doi.org/10.1109/TIFS.2017.2692728 (ISSN 1556-6013)
Gentry C (2009) A fully homomorphic encryption scheme. Ph.D. thesis, Stanford, CA, USA. AAI3382729
Goldreich O, Ostrovsky R (1996) Software protection and simulation on oblivious rams. J ACM 43(3):431–473. https://doi.org/10.1145/233551.233553 (ISSN 0004-5411)
Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: Jakobsson M, Yung M, Zhou J (eds) Applied cryptography and network security, pp 31–45. Springer, Heidelberg (ISBN 978-3-540-24852-1)
Guo D, Liu Y, Li X, Yang P (2010) False negative problem of counting bloom filter. IEEE Trans Knowl Data Eng 22(5):651–664. https://doi.org/10.1109/TKDE.2009.209 (ISSN 1041-4347)
Kamara S, Lauter K (2010) Cryptographic cloud storage. In: Sion R, Curtmola R, Dietrich S, Kiayias A, Miret JM, Sako K, Sebé F (eds) Financial cryptography and data security, pp 136–149. Springer, Berlin
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp 1–5
Li J, Li J, Chen X, Liu Z, Jia C (2014a) Privacy-preserving data utilization in hybrid clouds. Future Gener Comput Syst 30:98–106. ISSN 0167-739X. https://doi.org/10.1016/j.future.2013.06.011. http://www.sciencedirect.com/science/article/pii/S0167739X13001258. Special issue on extreme scale parallel architectures and systems, cryptography in cloud computing and recent advances in parallel and distributed systems, ICPADS 2012 selected papers
Li R, Xu Z, Kang W, Yow KC, Xu C-Z (2014b) Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Gener Comput Syst 30:179–190. https://doi.org/10.1016/j.future.2013.06.029. http://www.sciencedirect.com/science/article/pii/S0167739X1300143X. Special issue on extreme scale parallel architectures and systems, cryptography in cloud computing and recent advances in parallel and distributed systems, ICPADS 2012 selected papers (ISSN 0167-739X)
Li H, Yang Y, Luan TH, Liang X, Zhou L, Shen XS (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Depend Secure Comput 13(3):312–325. https://doi.org/10.1109/TDSC.2015.2406704 (ISSN 1545-5971)
Liu X, Yang G, Susilo W, Tonien J, Liu X, Shen Jian (2020) Privacy-preserving multi-keyword searchable encryption for distributed systems. IEEE Trans Parallel Distrib Syst 32(3):561–574
Örencik C, Savaş E (2014) An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distrib Parallel Databases 32(1):119–160. https://doi.org/10.1007/s10619-013-7123-9 (ISSN 1573-7578)
Pang H, Shen J, Krishnan R (2010) Privacy-preserving similarity-based text retrieval. ACM Trans Internet Technol 10(1):4:1-4:39. https://doi.org/10.1145/1667067.1667071 (ISSN 1533-5399)
Rajasekar SS, Palanisamy C, Saranya K (2020) Privacy-preserving location-based services for mobile users using directional service fetching algorithm in wireless networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02361-9
Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1):69–73. https://doi.org/10.1109/MIC.2012.14 (ISSN 1089-7801)
Ren SQ, Tan BHM, Sundaram S, Wang T, Ng Y, Chang V, Aung KMM (2016) Secure searching on cloud storage enhanced by homomorphic indexing. Future Gen Comput Syst 65:102–110. https://doi.org/10.1016/j.future.2016.03.013. http://www.sciencedirect.com/science/article/pii/S0167739X16300577. Special Issue on Big Data in the Cloud (ISSN 0167-739X)
Shu J, Jia X, Yang K, Wang H (2018) Privacy-preserving task recommendation services for crowdsourcing. IEEE Trans Serv Comput 14(1):235–247
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S P 2000, pp 44–55. https://doi.org/10.1109/SECPRI.2000.848445
Song W, Wang B, Wang Q, Peng Z, Lou W, Cui Y (2017) A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications. J Parallel Distrib Comput 99:14–27. https://doi.org/10.1016/j.jpdc.2016.05.017 (ISSN 0743-7315)
Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2014a) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25(11):3025–3035. https://doi.org/10.1109/TPDS.2013.282 (ISSN 1045-9219)
Sun W, Yu S, Lou W, Hou YT, Li H (2014b) Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: IEEE INFOCOM 2014—IEEE conference on computer communications, pp 226–234. https://doi.org/10.1109/INFOCOM.2014.6847943
Swami R, Das P (2017) Multi-keyword search based on top-k cosine similarity with co-ordinate matching. In: 2017 IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–6. IEEE
Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th international conference on distributed computing systems, pp 253–262. https://doi.org/10.1109/ICDCS.2010.34
Wang C, Cao N, Ren K, Lou W (2012a) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479. https://doi.org/10.1109/TPDS.2011.282 (ISSN 1045-9219)
Wang C, Ren K, Yu S, Urs KMR (2012b) Achieving usable and privacy-assured similarity search over outsourced cloud data. In: 2012 Proceedings IEEE INFOCOM, pp 451–459. https://doi.org/10.1109/INFCOM.2012.6195784
Wang C, Chow SSM, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375. https://doi.org/10.1109/TC.2011.245 (ISSN 0018-9340)
Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: IEEE INFOCOM 2014—IEEE conference on computer communications, pp 2112–2120. https://doi.org/10.1109/INFOCOM.2014.6848153
Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352. https://doi.org/10.1109/TPDS.2015.2401003 (ISSN 1045-9219)
Xu Z, Kang W, Li R, Yow K, Xu C (2012) Efficient multi-keyword ranked query on encrypted data in the cloud. In: 2012 IEEE 18th international conference on parallel and distributed systems, pp 244–251. https://doi.org/10.1109/ICPADS.2012.42
Xu P, Jin H, Wu Q, Wang W (2013) Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277. https://doi.org/10.1109/TC.2012.215 (ISSN 0018-9340)
Xu C, Ningning W, Liehuang Z, Kashif S, Chuan Z (2019) Achieving searchable and privacy-preserving data sharing for cloud-assisted e-healthcare system. IEEE Internet Things J 6(5):8345–8356
Yang Y, Liu X, Deng RH (2017) Multi-user multi-keyword rank search over encrypted data in arbitrary language. IEEE Trans Depend Secure Comput 17(2):320–334
Yin F, Zheng Y, Rongxing L, Tang X (2019) Achieving efficient and privacy-preserving multi-keyword conjunctive query over cloud. IEEE Access 7:165862–165872
Yu C, Chen C, Chao H (2017) Privacy-preserving multikeyword similarity search over outsourced cloud data. IEEE Syst J 11(2):385–394. https://doi.org/10.1109/JSYST.2015.2402437 (ISSN 1932-8184)
Zhang W, Lin Y, Xiao S, Liu Q, Zhou T (2014) Secure distributed keyword search in multiple clouds. In: 2014 IEEE 22nd international symposium of quality of service (IWQoS), pp 370–379. https://doi.org/10.1109/IWQoS.2014.6914342
Zhang W, Lin Y, Xiao S, Wu J, Zhou S (2016) Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans Comput 65(5):1566–1577. https://doi.org/10.1109/TC.2015.2448099
Zhang S, Yao T, Liang W, Sandor VKA, Li K-C (2020) An efficient privacy-preserving multi-keyword query scheme in location based services. IEEE Access 8:154036–154049
Zheng Q, Xu S, Ateniese G (2014) Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014—IEEE conference on computer communications, pp 522–530. https://doi.org/10.1109/INFOCOM.2014.6847976
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, N., Kumar, J., Singh, A.K. et al. Privacy-preserving multi-keyword hybrid search over encrypted data in cloud. J Ambient Intell Human Comput 15, 261–274 (2024). https://doi.org/10.1007/s12652-022-03889-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-022-03889-8