Advertisement

Efficient Information Retrieval of Encrypted Cloud Data with Ranked Retrieval

  • Arun Syriac
  • V. Anjana DeviEmail author
  • M. Gogul Kumar
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 35)

Abstract

Over the past decade, there have been massive developments in technology such as self-driving cars, crypto currencies, streaming services, voice assistants etc. In each of the listed breakthroughs, Cloud Computing was involved. Cloud computing has offered a tremendous breakthrough in enterprise and business transformation bringing with it a previously unknown agility. Projects and databases hosted on the cloud have enabled users to work in unison without any hassle. Users who use cloud computing can upload their data to the cloud from anywhere and get access to the best possible service architecture and applications from a connected network of computer resources. However to ensure that the data of the users are stored safely on the cloud, the data has to be encrypted to protect privacy before outsourcing. Encryption of the user’s data leads to poor efficiency of data utilization due to the possibility of a large number of outsourced files. This amounts to a lack of control and access of the out-sourced data from the user’s position. Due to lack of efficient and practical cloud computing, the user’s lack of control is further magnified. To address this aspect of helping the user reign in control over their encrypted data when out-sourced on a cloud, we have developed a scheme to efficiently search over the encrypted data and retrieve ranked results.

Keywords

Cloud computing Keyword search Secure data access 

References

  1. 1.
    Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of 2000 IEEE Symposium on Security and Privacy, S&P 2000, pp. 44–55. IEEE (2000)Google Scholar
  2. 2.
    Goh, E.-J., et al.: Secure indexes. IACR Cryptol. ePrint Arch. 2003, 216 (2003)Google Scholar
  3. 3.
    Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM (2006)Google Scholar
  4. 4.
    Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)CrossRefGoogle Scholar
  5. 5.
    Ahmad, M., Xiang, Y.: Trust ticket deployment: a notion of a data owner’s trust in cloud computing. In: IEEE Security and Privacy, 16–18 November 2011Google Scholar
  6. 6.
    Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Proceedings of Eurocrypt 2004. Lecture Notes in Computer Science, vol. 3027, pp. 506–522 (2004)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringSt. Joseph’s College of EngineeringChennaiIndia

Personalised recommendations