Efficient Information Retrieval of Encrypted Cloud Data with Ranked Retrieval
Over the past decade, there have been massive developments in technology such as self-driving cars, crypto currencies, streaming services, voice assistants etc. In each of the listed breakthroughs, Cloud Computing was involved. Cloud computing has offered a tremendous breakthrough in enterprise and business transformation bringing with it a previously unknown agility. Projects and databases hosted on the cloud have enabled users to work in unison without any hassle. Users who use cloud computing can upload their data to the cloud from anywhere and get access to the best possible service architecture and applications from a connected network of computer resources. However to ensure that the data of the users are stored safely on the cloud, the data has to be encrypted to protect privacy before outsourcing. Encryption of the user’s data leads to poor efficiency of data utilization due to the possibility of a large number of outsourced files. This amounts to a lack of control and access of the out-sourced data from the user’s position. Due to lack of efficient and practical cloud computing, the user’s lack of control is further magnified. To address this aspect of helping the user reign in control over their encrypted data when out-sourced on a cloud, we have developed a scheme to efficiently search over the encrypted data and retrieve ranked results.
KeywordsCloud computing Keyword search Secure data access
- 1.Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, S&P 2000, pp. 44–55. IEEE (2000)Google Scholar
- 2.Goh, E.-J., et al.: Secure indexes. IACR Cryptol. ePrint Arch. 2003, 216 (2003)Google Scholar
- 3.Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM (2006)Google Scholar
- 5.Ahmad, M., Xiang, Y.: Trust ticket deployment: a notion of a data owner’s trust in cloud computing. In: IEEE Security and Privacy, 16–18 November 2011Google Scholar