Skip to main content

A Survey on Different Search Techniques Over Encrypted Data in Cloud

  • Conference paper
  • First Online:
Second International Conference on Networks and Advances in Computational Technologies

Abstract

Cloud computing technology allows us to outsource our data to the cloud. The main advantage of this technology is its storage capacity. To maintain privacy, everything should be encrypted before outsourcing into the cloud and only authorized users can retrieve their data. But this process is complicated in the case of encrypted data, because traditional data storage system works only on plain data. Therefore dedicated information retrieval systems were developed to handle the encrypted data. Different search methods over cloud data have been proposed for efficient information retrieval. The main objective of this paper is to provide an overview of some of the existing searching techniques on the encrypted data and make a comparative study.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mistry, S., Tandel, P.: A survey on context based search over encrypted cloud data techniques. In: Proceedings of the International Journal of Modern Trends in Engineering and Research (2015)

    Google Scholar 

  2. Ingale, S., Phulpagar, B.D.: A survey on different keyword-based search techniques over encrypted data. In: Proceedings of the (IJCSIT) International Journal of Computer Science and Information Technologies (2016)

    Google Scholar 

  3. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of the IEEE 30th International Conference on Distributed Computing Systems (ICDCS 10) (2010). https://doi.org/10.1109/ICDCS.2010.34

  4. Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Paral. Distri. Syst. 27, 340–352 (2015). https://doi.org/10.1109/TPDS.2015.2401003

    Article  Google Scholar 

  5. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Paral. Distri. Syst. 25, 222–233 (2014). https://doi.org/10.1109/TPDS.2013.45

    Article  Google Scholar 

  6. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of the IEEE INFOCOM, San Diego, CA (2010). https://doi.org/10.1109/INFCOM.2010.5462196

  7. Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Paral. Distri. Syst. 23, 1467–1479 (2012). https://doi.org/10.1109/TPDS.2011.282

    Article  Google Scholar 

  8. Fu, Z., Sun, X., Xia, Z., Zhou, L., Shu, J.: Multi keyword ranked search supporting synonym query over encrypted data in cloud computing. In: Proceedings of the IEEE 32nd International Performance Computing and Communications Conference (IPCCC2013), San Diego, CA (2013). https://doi.org/10.1109/PCCC.2013.6742783

  9. Moataz, T., Shikfa, A., Cuppens-Boulahia, N., Cuppens, F.: Semantic search over encrypted data. In: Proceedings of the 20th International Conference on Telecommunications (ICT) (2013). https://doi.org/10.1109/ICTEL.2013.6632121

  10. Woodworth, J.Z., Salehi, M.A., Raghavan, V.: S3C-An Architecture for space-efficient semantic search over encrypted data in the cloud. In: Proceedings of the IEEE International Conference on Big Data (Big Data) (2016). https://doi.org/10.1109/BigData.2016.7841040

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amrithasree Haridas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Haridas, A., Preethi, L. (2021). A Survey on Different Search Techniques Over Encrypted Data in Cloud. In: Palesi, M., Trajkovic, L., Jayakumari, J., Jose, J. (eds) Second International Conference on Networks and Advances in Computational Technologies. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-030-49500-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-49500-8_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-49499-5

  • Online ISBN: 978-3-030-49500-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics