Skip to main content
Log in

Privacy-preserving multi-keyword hybrid search over encrypted data in cloud

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Data outsourcing to the cloud is gaining popularity day by day in cloud computing. It requires a dynamic architecture that avoids loopholes and stops intruders from entering the cloud environment. To retrieve the enciphered documents from the cloud, the latest technique that is enrolled effectively is multi-keyword fuzzy search. The proposed research work uses this technique along with the n-gram corpus algorithm that helps to achieve relevancy score and sub-linear search time. This algorithmic combination is able to predict the privacy ranking measure of the retrieved data. To validate the opposed approach, simulation analysis has been performed to preserve user-oriented privacy in a cloud environment. The ranking precision of the proposed method is compared with (Fu et al. in IEEE Trans Inf Forensics Secur 12(8):1874–1884. https://doi.org/10.1109/TIFS.2017.2692728, 2017) which uses a stemming algorithm and a matching algorithm based on the inner product. The results express the efficiency of the proposed approach by showing a relative improvement in security precision up to 55%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data Availibility

The datasets generated during and/or analysed during the current study are available in the Hospital Emergency Department - Diagnosis, Procedure, and External Cause Codes repository, https://data.world/chhs/0e43d826-14d2-4ee3-b4f7-4ef86b961b9c.

References

  • Ballard L, Kamara S, Monrose F (2005) Achieving efficient conjunctive keyword searches over encrypted data. In: Qing S, Mao W, López J, Wang G (eds) Information and communications security, pp 414–426. Springer, Berlin (ISBN 978-3-540-32099-9)

  • Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Cachin C, Camenisch JL (eds) Advances in cryptology—EUROCRYPT, pp 506–522. Springer, Berlin

  • California Health and Human Services (2015) Hospital emergency department—diagnosis, procedure, and external cause codes. https://data.world/chhs/0e43d826-14d2-4ee3-b4f7-4ef86b961b9c. Accessed 16 Oct 2018

  • Cao N, Wang C, Li M, Ren K, Lou W (2014a) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233. https://doi.org/10.1109/TPDS.2013.45(ISSN 1045-9219)

  • Cao N, Wang C, Li M, Ren K, Lou W (2014b) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222–233. https://doi.org/10.1109/TPDS.2013.45(ISSN 1045-9219)

  • Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya AY (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27(4):951–963. https://doi.org/10.1109/TPDS.2015.2425407 (ISSN 1045-9219)

    Article  Google Scholar 

  • Chuah M, Hu W (2011) Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In: 2011 31st international conference on distributed computing systems workshops, pp 273–281. https://doi.org/10.1109/ICDCSW.2011.11

  • Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security, CCS ’06, New York, NY, USA. ACM, pp 79–88. https://doi.org/10.1145/1180405.1180417(ISBN 1-59593-518-5)

  • Dai H, Ji Y, Yang G, Huang H, Yi X (2019) A privacy-preserving multi-keyword ranked search over encrypted data in hybrid clouds. IEEE Access 8:4895–4907

    Article  Google Scholar 

  • Dilip G (2020) An efficient privacy preserving on high-order heterogeneous data using fuzzy k-prototype clustering. J Ambient Intell Humaniz Compu. https://doi.org/10.1007/s12652-020-01987-z

  • Ding X, Liu P, Jin H (2017) Privacy-preserving multi-keyword top-$ k $ k similarity search over encrypted data. IEEE Trans Depend Secure Comput 16(2):344–357

    Article  Google Scholar 

  • Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur 11(12):2706–2716. https://doi.org/10.1109/TIFS.2016.2596138 (ISSN 1556-6013)

    Article  Google Scholar 

  • Fu Z, Huang F, Ren K, Weng J, Wang C (2017) Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inf Forensics Secur 12(8):1874–1884. https://doi.org/10.1109/TIFS.2017.2692728 (ISSN 1556-6013)

    Article  Google Scholar 

  • Gentry C (2009) A fully homomorphic encryption scheme. Ph.D. thesis, Stanford, CA, USA. AAI3382729

  • Goldreich O, Ostrovsky R (1996) Software protection and simulation on oblivious rams. J ACM 43(3):431–473. https://doi.org/10.1145/233551.233553 (ISSN 0004-5411)

    Article  MathSciNet  Google Scholar 

  • Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: Jakobsson M, Yung M, Zhou J (eds) Applied cryptography and network security, pp 31–45. Springer, Heidelberg (ISBN 978-3-540-24852-1)

  • Guo D, Liu Y, Li X, Yang P (2010) False negative problem of counting bloom filter. IEEE Trans Knowl Data Eng 22(5):651–664. https://doi.org/10.1109/TKDE.2009.209 (ISSN 1041-4347)

    Article  Google Scholar 

  • Kamara S, Lauter K (2010) Cryptographic cloud storage. In: Sion R, Curtmola R, Dietrich S, Kiayias A, Miret JM, Sako K, Sebé F (eds) Financial cryptography and data security, pp 136–149. Springer, Berlin

  • Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp 1–5

  • Li J, Li J, Chen X, Liu Z, Jia C (2014a) Privacy-preserving data utilization in hybrid clouds. Future Gener Comput Syst 30:98–106. ISSN 0167-739X. https://doi.org/10.1016/j.future.2013.06.011. http://www.sciencedirect.com/science/article/pii/S0167739X13001258. Special issue on extreme scale parallel architectures and systems, cryptography in cloud computing and recent advances in parallel and distributed systems, ICPADS 2012 selected papers

  • Li R, Xu Z, Kang W, Yow KC, Xu C-Z (2014b) Efficient multi-keyword ranked query over encrypted data in cloud computing. Future Gener Comput Syst 30:179–190. https://doi.org/10.1016/j.future.2013.06.029. http://www.sciencedirect.com/science/article/pii/S0167739X1300143X. Special issue on extreme scale parallel architectures and systems, cryptography in cloud computing and recent advances in parallel and distributed systems, ICPADS 2012 selected papers (ISSN 0167-739X)

  • Li H, Yang Y, Luan TH, Liang X, Zhou L, Shen XS (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Depend Secure Comput 13(3):312–325. https://doi.org/10.1109/TDSC.2015.2406704 (ISSN 1545-5971)

    Article  Google Scholar 

  • Liu X, Yang G, Susilo W, Tonien J, Liu X, Shen Jian (2020) Privacy-preserving multi-keyword searchable encryption for distributed systems. IEEE Trans Parallel Distrib Syst 32(3):561–574

    Article  Google Scholar 

  • Örencik C, Savaş E (2014) An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distrib Parallel Databases 32(1):119–160. https://doi.org/10.1007/s10619-013-7123-9 (ISSN 1573-7578)

    Article  Google Scholar 

  • Pang H, Shen J, Krishnan R (2010) Privacy-preserving similarity-based text retrieval. ACM Trans Internet Technol 10(1):4:1-4:39. https://doi.org/10.1145/1667067.1667071 (ISSN 1533-5399)

    Article  Google Scholar 

  • Rajasekar SS, Palanisamy C, Saranya K (2020) Privacy-preserving location-based services for mobile users using directional service fetching algorithm in wireless networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02361-9

  • Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1):69–73. https://doi.org/10.1109/MIC.2012.14 (ISSN 1089-7801)

    Article  Google Scholar 

  • Ren SQ, Tan BHM, Sundaram S, Wang T, Ng Y, Chang V, Aung KMM (2016) Secure searching on cloud storage enhanced by homomorphic indexing. Future Gen Comput Syst 65:102–110. https://doi.org/10.1016/j.future.2016.03.013. http://www.sciencedirect.com/science/article/pii/S0167739X16300577. Special Issue on Big Data in the Cloud (ISSN 0167-739X)

  • Shu J, Jia X, Yang K, Wang H (2018) Privacy-preserving task recommendation services for crowdsourcing. IEEE Trans Serv Comput 14(1):235–247

    Google Scholar 

  • Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S P 2000, pp 44–55. https://doi.org/10.1109/SECPRI.2000.848445

  • Song W, Wang B, Wang Q, Peng Z, Lou W, Cui Y (2017) A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications. J Parallel Distrib Comput 99:14–27. https://doi.org/10.1016/j.jpdc.2016.05.017 (ISSN 0743-7315)

    Article  Google Scholar 

  • Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2014a) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25(11):3025–3035. https://doi.org/10.1109/TPDS.2013.282 (ISSN 1045-9219)

    Article  Google Scholar 

  • Sun W, Yu S, Lou W, Hou YT, Li H (2014b) Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: IEEE INFOCOM 2014—IEEE conference on computer communications, pp 226–234. https://doi.org/10.1109/INFOCOM.2014.6847943

  • Swami R, Das P (2017) Multi-keyword search based on top-k cosine similarity with co-ordinate matching. In: 2017 IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–6. IEEE

  • Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th international conference on distributed computing systems, pp 253–262. https://doi.org/10.1109/ICDCS.2010.34

  • Wang C, Cao N, Ren K, Lou W (2012a) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479. https://doi.org/10.1109/TPDS.2011.282 (ISSN 1045-9219)

    Article  Google Scholar 

  • Wang C, Ren K, Yu S, Urs KMR (2012b) Achieving usable and privacy-assured similarity search over outsourced cloud data. In: 2012 Proceedings IEEE INFOCOM, pp 451–459. https://doi.org/10.1109/INFCOM.2012.6195784

  • Wang C, Chow SSM, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375. https://doi.org/10.1109/TC.2011.245 (ISSN 0018-9340)

    Article  MathSciNet  Google Scholar 

  • Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: IEEE INFOCOM 2014—IEEE conference on computer communications, pp 2112–2120. https://doi.org/10.1109/INFOCOM.2014.6848153

  • Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352. https://doi.org/10.1109/TPDS.2015.2401003 (ISSN 1045-9219)

    Article  Google Scholar 

  • Xu Z, Kang W, Li R, Yow K, Xu C (2012) Efficient multi-keyword ranked query on encrypted data in the cloud. In: 2012 IEEE 18th international conference on parallel and distributed systems, pp 244–251. https://doi.org/10.1109/ICPADS.2012.42

  • Xu P, Jin H, Wu Q, Wang W (2013) Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277. https://doi.org/10.1109/TC.2012.215 (ISSN 0018-9340)

    Article  MathSciNet  Google Scholar 

  • Xu C, Ningning W, Liehuang Z, Kashif S, Chuan Z (2019) Achieving searchable and privacy-preserving data sharing for cloud-assisted e-healthcare system. IEEE Internet Things J 6(5):8345–8356

    Article  Google Scholar 

  • Yang Y, Liu X, Deng RH (2017) Multi-user multi-keyword rank search over encrypted data in arbitrary language. IEEE Trans Depend Secure Comput 17(2):320–334

    Article  Google Scholar 

  • Yin F, Zheng Y, Rongxing L, Tang X (2019) Achieving efficient and privacy-preserving multi-keyword conjunctive query over cloud. IEEE Access 7:165862–165872

    Article  Google Scholar 

  • Yu C, Chen C, Chao H (2017) Privacy-preserving multikeyword similarity search over outsourced cloud data. IEEE Syst J 11(2):385–394. https://doi.org/10.1109/JSYST.2015.2402437 (ISSN 1932-8184)

    Article  ADS  Google Scholar 

  • Zhang W, Lin Y, Xiao S, Liu Q, Zhou T (2014) Secure distributed keyword search in multiple clouds. In: 2014 IEEE 22nd international symposium of quality of service (IWQoS), pp 370–379. https://doi.org/10.1109/IWQoS.2014.6914342

  • Zhang W, Lin Y, Xiao S, Wu J, Zhou S (2016) Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans Comput 65(5):1566–1577. https://doi.org/10.1109/TC.2015.2448099

    Article  MathSciNet  Google Scholar 

  • Zhang S, Yao T, Liang W, Sandor VKA, Li K-C (2020) An efficient privacy-preserving multi-keyword query scheme in location based services. IEEE Access 8:154036–154049

    Article  Google Scholar 

  • Zheng Q, Xu S, Ateniese G (2014) Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014—IEEE conference on computer communications, pp 522–530. https://doi.org/10.1109/INFOCOM.2014.6847976

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jitendra Kumar.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, N., Kumar, J., Singh, A.K. et al. Privacy-preserving multi-keyword hybrid search over encrypted data in cloud. J Ambient Intell Human Comput 15, 261–274 (2024). https://doi.org/10.1007/s12652-022-03889-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-022-03889-8

Keywords

Navigation