Abstract
The data used in cloud applications is directly exposed to the cloud service provider, and because of the potential compromise of the cloud, could also be learned by adversaries. When encrypted data is hosted on cloud provided that there are large amount of data files, utilization of encrypted data effectively becomes a very challenging task. In a cloud computing environment, where outsourced data of organizations is shared with a large number of users. These variety of users might be interested in retrieving certain specific data files during a given session. A popular and interesting way to do so is by using keyword-based search. These search techniques facilitate users to search and retrieve data files selectively in which the users are interested. These keyword-based searches are being widely used for plaintext searches. But data encryption poses a challenge to perform keyword search using existing paintext search methods to be used for encrypted outsourced data on cloud. In this paper, we have analyzed the searchable indexes that could be used to make a fast and effective search on encrypted outsourced data and proposed a scheme that could make fast and accurate searches over encrypted outsourced cloud data. Simulation results have revealed that the proposed scheme takes much less time in generating the searchable index as compared to already existing techniques. The vector space model being used earlier for keyword based searches on encrypted data, is relatively time consuming and hence leads to very high time complexity during relevance score calculations as well as index generation for large datasets. Hence the proposed scheme achieves a fast and secure relevance scoring for large number of datasets also and in much less time as compared to the vector space model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mell, P., Grance, T.: The NIST definition of cloud computing, National Institute of Standarads and technology, vol. 53, no. 6, pp. 1–50 (2009)
Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings IEEE 30th International Conference on Distributed Computing Systems, ICDCS 2010, pp. 253–262 (2010)
Song, D., Wanger, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings IEEE symposium Security and Privacy, Washington DC, pp. 44–56 (2000)
Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)
Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Privacy-preserving multikeyword ranked search over encrypted cloud data. In: Proceedings IEEE INFOCOM (2010)
Yu, J., Lu, P., Zhu, Y., Xue, G., Li, M.: Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Trans. Dependable Secure Comput. 10(4), 239–250 (2013)
Arora, V., Tyagi, S.S.: Analysis of symmetric searchable encryption over encrypted cloud data. Int. J. Comput. Appl. (0975-8887) 127(12), 46–51 (2015)
Joy, E.C., Indira, K.: Multi keyword ranked search over encrypted cloud data. Int. J. Appl. Eng. Res. 9(20), 7149–7176 (2014)
Singhal, A.: Modern information retrieval: a brief overview. IEEE Data Eng. Bull. 24(4), 35–43 (2001)
Manning, C.D., Raghavan, P., Schutze, H.: An Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008). ISBN: 0521865719. Online edition©
Arora, V., Tyagi, S.S.: An efficient multi-keyword symmetric searchable encryption scheme for secure data outsourcing. Int. J. Comput. Netw. Inf. Secur. 8(11), 65–71 (2016)
NSF Research Awards Abstracts 1990–2003 (2013). http://kdd.ics.uciedu/databases/nsfabs/nsfawards.html
Pallickara, S.L., Pallickara, S., Zupanski, M.: Towards efficient data search and subsetting of large-scale atmospheric datasets. Future Gener. Comput. Syst. 28(1), 112–118 (2012)
Raghavendra S., Geeta C.M., Buyya R., Venugopal K.R., Iyengar S.S., Patnaik L. M.: MSIGT: most significant ındex generation technique for cloud environment. In: Proceedings of the 2015 Annual IEEE India Conference, INDICON 2015, Delhi, India, pp 17–20 (2015)
Alam, B., Doja, M.N., Mongia, S.: Analysis of security issues for cloud computing. Int. J. Comput. Sci. Inf. Secur. 11(9), 117–125 (2013)
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_2
Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224–241. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_13
Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1469 (2012)
Gupta, B.B.: Analysis of various security issues and challenges in cloud computing environment: a survey. In: Gupta, B., Agrawal, D.P., Yamaguchi, S. (eds.) Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global, Hershey (2016). https://doi.org/10.4018/978-1-5225-0808-3.ch011
Ibtihal, M., Driss, E.O., Hassan, N.: Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int. J. Cloud Appl. Comput. (IJCAC) 7(2), 27–40 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Arora, V., Mongia, S. (2020). Fast Information Retrieval over Encrypted Outsourced Cloud Data. In: Batra, U., Roy, N., Panda, B. (eds) Data Science and Analytics. REDSET 2019. Communications in Computer and Information Science, vol 1230. Springer, Singapore. https://doi.org/10.1007/978-981-15-5830-6_9
Download citation
DOI: https://doi.org/10.1007/978-981-15-5830-6_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5829-0
Online ISBN: 978-981-15-5830-6
eBook Packages: Computer ScienceComputer Science (R0)