Abstract
Due to large scale use and many applications of cloud maximum data, owners upload the information at cloud space to save time and local disk space. Here, the authors provided a TBMKRS (Tree-Based Multi-Keyword Rank Search) scheme which also supports dynamic update (insert/delete) and verifiability of encrypted information upon cloud. For the evaluation of performance and analysis of result, the Enron data set have been used by the authors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Moffat A, Zobel J (1998) Exploring the similarity space, ACM SIGIR, pp 18–34
Li H, Hou YT, Lou W, Liu X, Sun W (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE conference on computer Comm, pp 2110–2118, April 2015
Perrig A, Song D, Wagner D (2000) Practical techniques for searches on encrypted data, In: Proceeding of IEEE symposium on Sec. and Priv., pp 44–55
Lou W, Ren K, Cao N, Wang C, Wang Q, Li J (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Conf. on Info. Comm., pp 441–445
Shen X, Zhou L, Liang X, Luan T, Yang Y, Li H (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Secur Comput, 312–325
Papamanthou C, Kamara S (2013) Parallel and dynamic searchable symmetric encryption. In: Sadeghi A-R (ed) FC. LNCS, vol 7859, pp 258–274. Springer, Heidelberg
Waters B, Staddon J, Golle P (2004) Secure conjunctive keyword search over encrypted data. In: Jakobsson M, Yung M, Zhou J (eds) ACNS 2004, vol 3089. LNCS. Springer, Heidelberg, pp 31–45
Huang F., Sun X., Fu Z., Shu J., Ren, K., Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transaction on Parallel Distributed System, 2546–2559, 2016
Mitzenmacher M, Chang YC (2005) Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, YA., Keromytis JM (eds) ACNS, LNCS, vol 3531, pp 442–455. Springer, Heidelberg
Lou W, Ren K, Li M, Wang C, Cao N (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst, 222–233
Persiano, G, Ostrovsky R., Crescenzo G., Boneh, D., Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg, 2004
Tanwar PK, Goar V, Khunteta A (2018) Design and analysis of search algorithm with B-tree and commutative key RSA for dynamic updation in Cloud Computing. Int J Curr Adv Res 7(7(H)): 14414–14418
Tanwar PK, Goar V, Khunteta A (2017) Performance evaluation of multi keyword ranked search schema called BDMRS-CM & EDMRS-BM in cloud computing. Int J Eng Sci 24:42–51
Tanwar PK, Goar V, Khunteta A (2016) Design of new multi keyword ranked search scheme and validation for cloud computing. In: Proceedings of AICTC—2016, Bikaner, India
Hou YT, Lou W, Song W, Wang B (2015) Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In: Computer communications, pp 2092–2100
Goh EJ (2003) Secure indexes Cryptology ePrint Archive, Report 2003/216
Lou W, Ren K, Li J, Cao N, Wang C (2010) Secure ranked keyword search over encrypted cloud data. In: Proceedings of the 2010 IEEE 30th international conference on distributed computing systems, pp 253–262
Waters B, Boneh D (2007) Conjunctive, subset, and range queries on encrypted data. In: Vadhan SP (ed) TCC LNCS, vol 4392, pp 535–554. Springer, Heidelberg
Wang Q, Wang X, Sun X, Xia Z (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 340–352
Zou Q, Lai RW, Chow SS, Du M, Wang Q, He M (2016) Searchable encryption over feature rich data. IEEE Trans Dependable Secur Comput
Ren K, Sun X, Guan C, Wu X, Fu Z (2017) Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur, 2706–2716
Sun W et al (2014) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst, 3025–3035
Chen C et al (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst, 951–963
Roeder T, Papamanthou C, Kamara S (2012) Dynamic searchable symmetric encryption. In: ACM Conf. on Comp. and Comm. Sec., pp 965–976
Deng RH, Wan Z (2017) V P search: achieving verifiability for privacy-preserving multi keyword search over encrypted cloud data. IEEE Trans Dependable Secur Comput, 99
Chow C, Lai RWF et al (2017) Parallel and dynamic structured encryption. In: Deng R, Weng J, Ren K, Yegneswaran V (eds) Secure communication 2016. LNICST, vol 198, pp 219–238. Springer, Cham
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tanwar, P.K., Khunteta, A., Goar, V., Kuri, M. (2021). Tree-Based Multi-Keyword Rank Search Scheme Supporting Dynamic Update and Verifiability upon Encrypted Cloud Data. In: Goar, V., Kuri, M., Kumar, R., Senjyu, T. (eds) Advances in Information Communication Technology and Computing. Lecture Notes in Networks and Systems, vol 135. Springer, Singapore. https://doi.org/10.1007/978-981-15-5421-6_38
Download citation
DOI: https://doi.org/10.1007/978-981-15-5421-6_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5420-9
Online ISBN: 978-981-15-5421-6
eBook Packages: EngineeringEngineering (R0)