Abstract
Cloud computing is the latest paradigm which offers different cloud services by rearranging of resources and provides them on the bases of user’s demand. Users are using cheaper data storage and computation offered in the cloud environment, and they are also facing many problems about reliability, privacy-preserving, and optimized searching of their outsourced data. Proposed scheme “Privacy-preserving keyword search” allows users to encrypt their stored data while preserving some search capabilities and also seek few efforts to consider the reliability of the searchable encrypted data outsourced to the clouds. Client-side encryption and server-side searching of encrypted data without decryption in server-side enable more efficient and eliminate privacy issues between client and server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li J, Lin D, Squicciarini AC, Li J, Jia C (2017) Towards privacy-preserving storage and retrieval. IEEE Trans Cloud Comput 5(3):499–509
Chatterjee A, Sengupta I (2015) Searching and sorting of fully homomorphic encrypted data on cloud. In: IACR cryptology ePrint archive. IACR, p 981
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: IEEE symposium on security and privacy. S&P. IEEE, pp 44–55
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506–522
Liu Q, Wang G, Wu J (2009) An efficient privacy preserving keyword search scheme in cloud computing. In: International conference on IEEE computational science and engineering, 2009. CSE’09. IEEE, pp 715–720
Liu Q, Wang G, Wu J (2012) Secure and privacy preserving keyword searching for cloud storage services. J Netw Comput Appl 35(3):927–933
Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479
Khan MS, Wang C, Kulsoom A, Ullah Z (2013) Searching encrypted data on cloud. Int J Comput Sci Issues IJCSI 10(6):230
Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 222–233
Kaaniche N, Laurent M (2014) A secure client side deduplication scheme in cloud storage environments. In: 2th international conference on new technologies, mobility and security (NTMS). IEEE, pp 1–7
Sriperumbudur Tamil Nadu (2018) A block cipher algorithm to enhance the avalanche effect using dynamic key-dependent S-box and genetic operations. Int J Pure Appl Math 119(10):399–418
Kartheeban K, Durai Murugan A (2017) Privacy preserving data storage technique in cloud computing. In: IEEE international conference on intelligent techniques in control, optimization and signal processing (INCOS). IEEE, pp 1–6
Al-Mamun A, Rahman S, Ahmed Shaon T, Hossain M (2017) Security analysis of AES and enhancing its security by modifying S-box with an additional byte. Int J Comput Netw Commun IJCNC 9(2)
Shankarwar MU, Pawar AV (2015) Security and privacy in cloud computing: a survey. In: Proceedings of the 3rd international conference on frontiers of intelligent computing theory and applications (FICTA). Springer, pp. 1–11
Li J, Lin D, Squicciarini A, Jia C (2015) STRE: privacy-preserving storage and retrieval over multiple clouds. In: International conference on security and privacy in communication networks, pp 36–44)
Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 965–976
Kuzu M, Islam MS, Kantarcioglu M (2012) Efficient similarity search over encrypted data. In: IEEE 28th international conference on data engineering. IEEE, pp 1156–1167
Ananthi S, Sadish Sendil M, Karthik S (2011) Privacy preserving keyword search over encrypted cloud data. In: International conference on advances in computing and communications. Springer, pp 480–487
Owens D (2010) Securing elasticity in the cloud. Commun ACM 53(6):46–51
Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: International conference on applied cryptography and network security. Springer, pp 442–455
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, D., Singh, A. (2021). Privacy Preserving on Searchable Encrypted Data in Cloud. In: Hura, G.S., Singh, A.K., Siong Hoe, L. (eds) Advances in Communication and Computational Technology. ICACCT 2019. Lecture Notes in Electrical Engineering, vol 668. Springer, Singapore. https://doi.org/10.1007/978-981-15-5341-7_64
Download citation
DOI: https://doi.org/10.1007/978-981-15-5341-7_64
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5340-0
Online ISBN: 978-981-15-5341-7
eBook Packages: EngineeringEngineering (R0)