Domain Dictionary-Based Metadata Construction for Search Over Encrypted Cloud Data

  • S. K. Mahreen
  • M. R. Warsi
  • S. K. Neelam
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 624)


With the massive increase in the amount of data generated every day and with the advent of the modern technology, cloud storage has become a need of the hour. Advancements in cloud computing led the data owners to outsource their intensive data to cloud servers like Amazon, Microsoft Azure, Google Drive, and so on. Cloud storage services permit users to store and/or accession of data in a cloud; irrespective of the time and geographical locations, in an on-demand basis using any device. However, entrusting the cloud service provider with the sensitive data raises the underlying security and privacy issues. In order to provide confidentiality, data are encrypted before safekeeping it on the cloud service provider (CSP). Although the encryption approach does strengthen the data security, it consequently effects the various operations to be performed on the data, most significant being data searching and retrieval. Various searchable encryption schemes are developed for search over outsourced encrypted data. Mostly these schemes perform index-based ranked search and employ frequency of search keyword in the document; hence, challenging the security and reducing efficiency. In this paper, we present a domain dictionary-based index generation scheme for search over encrypted data. We have proposed a novel concept of domain dictionary wherefrom a metadata-based index file is to be generated that is to be queried while performing searching operations.


Cloud Domain dictionary Index Metadata 


  1. 1.
    Neelam S. Khan and C. Rama Krishna. A Survey on Secure Ranked Keyword Search over Outsourced Encrypted Cloud Data. International Conference on Computer Networks and Information Technology (ICCNIT), March 20–21, 2014, NITTTR Chandigarh, pp. 347–357.Google Scholar
  2. 2.
    Mahreen S., Warsi M.R, Neelam S.: Secure Metadata based Search over Encrypted Cloud Data supporting Similarity Ranking: Unpublished.Google Scholar
  3. 3.
    Moh, T.S., Ho, K.H.: Efficient semantic search over encrypted data in cloud computing. In:International Conference on High Performance Computing and Simulation, pp. 382–390. Bologna (2014).
  4. 4.
    Saini V., Challa R.K., Khan N.S.: An Efficient Multi-keyword Synonym-Based Fuzzy Ranked Search Over Outsourced Encrypted Cloud Data. In: Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol. 452. Springer, Singapore (2016).
  5. 5.
    Sharon. E, N. Saravanan.: A Survey on Keyword Based Search over Outsourced Encrypted Data. In: International Journal of Engineering and Technology (IJET), vol. 5, pp. 905–909, (2013).Google Scholar
  6. 6.
    D. Song, D. Wagner, and A. Perrig.: Practical Techniques for Searches on Encrypted Data. In: Proceedings IEEE Symposium. Security and Privacy, (2000).Google Scholar
  7. 7.
    E.-J. Goh, “Secure Indexes,” Cryptology ePrint Archive, 2003.
  8. 8.
    Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of EUROCRYPT, pp. 457–473, (2005).Google Scholar
  9. 9.
    J. Bethencourt, A. Sahai, and B. Waters.: Ciphertext-policy Attribute based encryption. In: Proceedings of IEEE Symposium. on Security and Privacy, pp. 321–334, (2007).Google Scholar
  10. 10.
    L. Ballard, S. Kamara, and F. Monrose.: Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. In: Proceedings of Seventh Int’l Conference Information and Communication Security (ICICS ’05), (2005).Google Scholar
  11. 11.
    D. Boneh and B. Waters.: Conjunctive, Subset, and Range Queries on Encrypted Data. In: Proc. Fourth Conf. Theory Cryptography (TCC), pp. 535–554, (2007).Google Scholar
  12. 12.
    J. Katz, A. Sahai, and B. Waters.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Proc.27th Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT), (2008).Google Scholar
  13. 13.
    A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Proc. 29th Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT ’10), (2010).Google Scholar
  14. 14.
    A. Swaminathan, Y. Mao, G. M. Su, H. Gou, A. Varna, S. He, M. Wu, and D. Oard.: Confidentiality-Preserving Rank-Ordered Search. In: ACM Storage SS, pp. 7–12, (2007).Google Scholar
  15. 15.
    K. Li; W. Zhang; C. Yang; N. Yu.: Security Analysis on One to-Many Order Preserving Encryption-Based Cloud Data Search. In: IEEE Transactions on Information Forensics and Security, vol. 10, no. 9, pp. 1918–1926, (2015).Google Scholar
  16. 16.
    C. Wang, N. Cao, K. Ren, and W. J. Lou.: Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.In: IEEE Transaction on Parallel Distributed System, vol. 23, no. 8, pp. 1467–1479, (2012).Google Scholar
  17. 17.
    N. Cao, C. Wang, M. Li, K. Ren, and W. J. Lou.: Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data.In: IEEE INFOCOM, pp. 829–837, (2011).Google Scholar
  18. 18.
    Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy preserving multi-keyword search over encncrypted cloud data.In: IEEE Trans. Parallel Distrib. Syst. 25, 222–233, (2014).Google Scholar
  19. 19.
    Z. Xu, W. Kang, R. Li, K. Yow and C. Xu.: Efficient multi keyword rank query on encrypted cloud data. In: 18th IEEE International Conference on Parallel and Distributed Systems, pp. 244–251, (2012).Google Scholar
  20. 20.
    Khan Neelam, S., Challa, R.K.: Secure ranked fuzzy multi-keyword search over outsourced en-crypted cloud data. In: 5th IEEE International Conference on Computer and Communication Technology (ICCCT), Allahabad (2014).Google Scholar
  21. 21.
    Z. Fu, X. Sun, N. Linge, and L. Zhou.: Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query. In: IEEE Transaction Consumer Electronics, vol. 60, no. 1, pp. 164–172, (2014).Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer EngineeringAligarh Muslim UniversityAligarhIndia
  2. 2.Department of ITNIT SrinagarSrinagarIndia

Personalised recommendations