Privacy Preserving Ranked Multi Keyword Context Sensitive Fuzzy Search Over Encrypted Cloud Data

  • Anu Khurana
  • Rama Krishna Challa
  • Navdeep Kaur
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 958)


The privacy preserving search feature is very useful for a cloud user to retrieve the desired encrypted documents easily, securely and cost effectively in the cloud. However, a search query issued by the user may sometimes have mis-typos i.e. wrongly typed words. The mis-typos could occur because of the addition or drop of letter(s) from the word or by swapping of characters in a word. At times such mis-typos may have many spelling suggestions against them within a given threshold, of which only a few makes sense as per the context of the query. Also the mistyped word may sometimes result in another valid word from the dictionary or the word list and hence the mis-spelt word may go unnoticed. Recent works in cloud address the issue of fuzzy search. However, these approaches do not suggest a word suitable as per the context and co-occurrence with other words of the query for such mis-typos. This paper presents a privacy preserving scheme ‘Context Sensitive Fuzzy Search’ (CSFS) in a cloud computing environment that address these issues. CSFS uses Levenshtein distance and neighbor co-occurrence statistics computed from encrypted query click logs and suggest(s) word(s) from the generated suggestions and set distance as per their co-occurring frequency with other words of the query. The results achieved show that the spelling suggestions listed are as per the context of the query and have high recall value.


Mis-typos Fuzzy Cloud computing Encrypted query click logs Co-occurrence 


  1. 1.
    White Paper Cisco Public: Cisco global cloud index: forecast and methodology, 2015–2020. Retrieved from (2016)
  2. 2.
  3. 3.
    Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy (2000)Google Scholar
  4. 4.
    Goh, E.-J.: Secure Indexes*. Cryptology ePrint Archive: Report 2003/216 (2004)Google Scholar
  5. 5.
    Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005). Scholar
  6. 6.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, Jan L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). Scholar
  7. 7.
    Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566–582. Springer, Heidelberg (2001). Scholar
  8. 8.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM CC 2006 (2006)Google Scholar
  10. 10.
    Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of ICDCS 2010 (2010)Google Scholar
  11. 11.
    Cao, N., Wang, C., Li, M.: Privacy- preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 829–837 (2011)Google Scholar
  12. 12.
    Xu, Z., Kang, W., Li, R., Yow, K., Xu, C.Z.: Efficient multi-keyword ranked query on encrypted data in the cloud. In: Proceedings of ICPADS (2012)Google Scholar
  13. 13.
    Yang, C., Zhang, W., Xu, J., Xu, J., Yu, N.: A fast privacy-preserving multi-keyword search scheme on cloud data. In: Proceedings of International Conference on Computing and Processing (Hardware/Software), pp. 104–110 (2012)Google Scholar
  14. 14.
    Handa, R., Rama Krishna, C.: A cluster based multi-keyword search on outsourced encrypted cloud data. In: Proceedings of 2nd IEEE International Conference on Computing for Sustainable Global Development, pp. 115–120 (2015)Google Scholar
  15. 15.
    Handa, R., Rama Krishna, C.: An efficient cluster-based multi-keyword search on encrypted cloud data. CSI Commun. 39(3), 20–27. CSI (2015)Google Scholar
  16. 16.
    Mangal, G., Rama Krishna, C., Handa, R.: Dynamic cluster based privacy-preserving multikeyword search over encrypted cloud data. In: Proceedings of 6th IEEE International Conference on Cloud System and Big Data Engineering, Noida, India, pp. 146–151 (2016)Google Scholar
  17. 17.
    Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE INFOCOM, pp. 1–5 (2010)Google Scholar
  18. 18.
    Ahsan, M.A.M., Sabilah, M., Wahab, A.: An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In: Proceedings of International Conference on Research and Innovation in Information Systems (ICRIIS) (2017)Google Scholar
  19. 19.
    Ding, S., Li, Y., Zhang, J., Chen, L., Wang, Z., Xu, Q.: An efficient and privacy preserving ranked fuzzy keywords search over encrypted cloud data. In: Proceedings of IEEE International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), USA (2016)Google Scholar
  20. 20.
    Chen, J., et al.: EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data. IEEE Trans. Serv. Comput. PP(99) (2017)Google Scholar
  21. 21.
    Khan, N.S., Rama Krishna, C., Khurana, A.: Secure ranked fuzzy multikeyword search over outsourced encrypted cloud data. In: Proceedings of 5th IEEE International Conference on Computer and Communication Technology, Allahabad, pp. 241–249 (2014)Google Scholar
  22. 22.
    Saini, V., Challa, R.K., Khan, Neelam S.: An efficient multi-keyword synonym-based fuzzy ranked search over outsourced encrypted cloud data. In: Choudhary, Ramesh K., Mandal, J.K., Auluck, N., Nagarajaram, H.A. (eds.) Advanced Computing and Communication Technologies. AISC, vol. 452, pp. 433–441. Springer, Singapore (2016). Scholar
  23. 23.
    Liu, C., Zhu, L., Wang, M., Tan, Y.: Search pattern leakage in searchable encryption: attacks and new construction. J. Inf. Sci. Int. J. 265, 176–188 (2014)Google Scholar
  24. 24.

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Anu Khurana
    • 1
  • Rama Krishna Challa
    • 2
  • Navdeep Kaur
    • 3
  1. 1.I.K. Gujral Punjab Technical UniversityKapurthalaIndia
  2. 2.Department of Computer Science and EngineeringNITTTRChandigarhIndia
  3. 3.Department of Computer Science and EngineeringSri Guru Granth Sahib World UniversityFatehgarh SahibIndia

Personalised recommendations