Abstract
Cloud computing enables the organizations to outsource their data by providing a service model called infrastructure as a service (IaaS). In a public cloud the infrastructure is owned and managed by a cloud service provider and is located in the provider’s control. To protect the privacy of sensitive data, documents have to be encrypted before outsourcing. When the number of encrypted documents increases exponentially, the search service and retrieval becomes critical. The process of retrieving the files containing the queried keyword further incurs unnecessary network traffic, which is absolutely undesirable in pay-as-you-use cloud paradigm. In this paper, a search scheme that provides both privacy protection and rank-ordered search capability with less overhead has been proposed. Search indexes and documents are first encrypted by the data owner and then stored onto the cloud server. Retrieval results on an encrypted data and security analysis under different attack models show that data privacy can be preserved while retaining very good retrieval performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proc. of S&P (2000)
Goh, E.J.: Secure indexes. Cryptology ePrint Archive (2003), http://eprint.iacr.org/2003/216
Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005)
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proc. of ACM CCS (2006)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004)
Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146–162. Springer, Heidelberg (2008)
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010)
Swaminathan, A., et al.: Confidentiality preserving rank-ordered search. In: ACM Workshop on Storage, Security, and Survivability, pp. 7–12 (2001)
http://www.slidefinder.net/I/Indexing_Tolerant_Dictionaries_Make_Class/6657298
Lu, W., Swaminathan, A., Varna, A.L., Wu, M.: Enabling Search over Encrypted Multimedia Databases. Media Forensics and Security (2009)
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. In: IEEE INFOCOM 2011, Shanghai, China (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ananthi, S., Sendil, M.S., Karthik, S. (2011). Privacy Preserving Keyword Search over Encrypted Cloud Data. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 190. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22709-7_47
Download citation
DOI: https://doi.org/10.1007/978-3-642-22709-7_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22708-0
Online ISBN: 978-3-642-22709-7
eBook Packages: Computer ScienceComputer Science (R0)