Skip to main content

Fast Information Retrieval over Encrypted Outsourced Cloud Data

  • Conference paper
  • First Online:
Data Science and Analytics (REDSET 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1230))

  • 802 Accesses

Abstract

The data used in cloud applications is directly exposed to the cloud service provider, and because of the potential compromise of the cloud, could also be learned by adversaries. When encrypted data is hosted on cloud provided that there are large amount of data files, utilization of encrypted data effectively becomes a very challenging task. In a cloud computing environment, where outsourced data of organizations is shared with a large number of users. These variety of users might be interested in retrieving certain specific data files during a given session. A popular and interesting way to do so is by using keyword-based search. These search techniques facilitate users to search and retrieve data files selectively in which the users are interested. These keyword-based searches are being widely used for plaintext searches. But data encryption poses a challenge to perform keyword search using existing paintext search methods to be used for encrypted outsourced data on cloud. In this paper, we have analyzed the searchable indexes that could be used to make a fast and effective search on encrypted outsourced data and proposed a scheme that could make fast and accurate searches over encrypted outsourced cloud data. Simulation results have revealed that the proposed scheme takes much less time in generating the searchable index as compared to already existing techniques. The vector space model being used earlier for keyword based searches on encrypted data, is relatively time consuming and hence leads to very high time complexity during relevance score calculations as well as index generation for large datasets. Hence the proposed scheme achieves a fast and secure relevance scoring for large number of datasets also and in much less time as compared to the vector space model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mell, P., Grance, T.: The NIST definition of cloud computing, National Institute of Standarads and technology, vol. 53, no. 6, pp. 1–50 (2009)

    Google Scholar 

  2. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings IEEE 30th International Conference on Distributed Computing Systems, ICDCS 2010, pp. 253–262 (2010)

    Google Scholar 

  3. Song, D., Wanger, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings IEEE symposium Security and Privacy, Washington DC, pp. 44–56 (2000)

    Google Scholar 

  4. Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)

    Article  Google Scholar 

  5. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Privacy-preserving multikeyword ranked search over encrypted cloud data. In: Proceedings IEEE INFOCOM (2010)

    Google Scholar 

  6. Yu, J., Lu, P., Zhu, Y., Xue, G., Li, M.: Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Trans. Dependable Secure Comput. 10(4), 239–250 (2013)

    Article  Google Scholar 

  7. Arora, V., Tyagi, S.S.: Analysis of symmetric searchable encryption over encrypted cloud data. Int. J. Comput. Appl. (0975-8887) 127(12), 46–51 (2015)

    Google Scholar 

  8. Joy, E.C., Indira, K.: Multi keyword ranked search over encrypted cloud data. Int. J. Appl. Eng. Res. 9(20), 7149–7176 (2014)

    Google Scholar 

  9. Singhal, A.: Modern information retrieval: a brief overview. IEEE Data Eng. Bull. 24(4), 35–43 (2001)

    Google Scholar 

  10. Manning, C.D., Raghavan, P., Schutze, H.: An Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008). ISBN: 0521865719. Online edition©

    Book  Google Scholar 

  11. Arora, V., Tyagi, S.S.: An efficient multi-keyword symmetric searchable encryption scheme for secure data outsourcing. Int. J. Comput. Netw. Inf. Secur. 8(11), 65–71 (2016)

    Google Scholar 

  12. NSF Research Awards Abstracts 1990–2003 (2013). http://kdd.ics.uciedu/databases/nsfabs/nsfawards.html

  13. Pallickara, S.L., Pallickara, S., Zupanski, M.: Towards efficient data search and subsetting of large-scale atmospheric datasets. Future Gener. Comput. Syst. 28(1), 112–118 (2012)

    Article  Google Scholar 

  14. Raghavendra S., Geeta C.M., Buyya R., Venugopal K.R., Iyengar S.S., Patnaik L. M.: MSIGT: most significant ındex generation technique for cloud environment. In: Proceedings of the 2015 Annual IEEE India Conference, INDICON 2015, Delhi, India, pp 17–20 (2015)

    Google Scholar 

  15. Alam, B., Doja, M.N., Mongia, S.: Analysis of security issues for cloud computing. Int. J. Comput. Sci. Inf. Secur. 11(9), 117–125 (2013)

    Google Scholar 

  16. van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24–43. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_2

    Chapter  Google Scholar 

  17. Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224–241. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_13

    Chapter  Google Scholar 

  18. Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1469 (2012)

    Article  Google Scholar 

  19. Gupta, B.B.: Analysis of various security issues and challenges in cloud computing environment: a survey. In: Gupta, B., Agrawal, D.P., Yamaguchi, S. (eds.) Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global, Hershey (2016). https://doi.org/10.4018/978-1-5225-0808-3.ch011

    Chapter  Google Scholar 

  20. Ibtihal, M., Driss, E.O., Hassan, N.: Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int. J. Cloud Appl. Comput. (IJCAC) 7(2), 27–40 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vasudha Arora .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arora, V., Mongia, S. (2020). Fast Information Retrieval over Encrypted Outsourced Cloud Data. In: Batra, U., Roy, N., Panda, B. (eds) Data Science and Analytics. REDSET 2019. Communications in Computer and Information Science, vol 1230. Springer, Singapore. https://doi.org/10.1007/978-981-15-5830-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5830-6_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5829-0

  • Online ISBN: 978-981-15-5830-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics