Skip to main content
Erschienen in: Soft Computing 8/2020

08.05.2019 | Focus

A privacy-preserving multi-keyword search approach in cloud computing

verfasst von: Ahmed M. Manasrah, Mahmoud Abu Nasir, Maher Salem

Erschienen in: Soft Computing | Ausgabe 8/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing provides the users with the ability to outsource their data to a third-party cloud storage for cost-effective management of resources and on-demand network access. However, outsourcing the data to a third-party location may raise concerns about data privacy. To maintain the user’s privacy, users tend to encrypt their sensitive data before outsourcing it. Encrypting the data will preserve its privacy, but at the same time, it makes the searching process for a specific keyword a time-consuming and challenging process, mainly if the encryption key is not provided. On the other hand, the data owner should be able to perform multiple keyword searches to retrieve specific documents that are relevant to the search query. This paper proposes a new privacy-preserving multi-keyword search approach for the cloud outsourced data. The objective of the proposed approach is to allow the data owners and the authorized users to retrieve the most relevant data with minimum computation and communication overhead, and reduced false positives (irrelevant documents) and searching time. To evaluate the proposed approach, the NSF research dataset is used. Results demonstrate that the proposed method achieves better searching time and overall performance of the cloud environment regarding computation and communication overhead as well as false positives in comparison with other approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Adjedj M, Bringer J, Chabanne H, Kindarji B (2009) Biometric identification over encrypted data made feasible. In: Information systems security. Springer, Berlin, pp 86–100 Adjedj M, Bringer J, Chabanne H, Kindarji B (2009) Biometric identification over encrypted data made feasible. In: Information systems security. Springer, Berlin, pp 86–100
Zurück zum Zitat Alguliev R, Aliguliyev R (2007) Experimental investigating the F-measure as similarity measure for automatic text summarization. Appl Comput Math 6:278–287 Alguliev R, Aliguliyev R (2007) Experimental investigating the F-measure as similarity measure for automatic text summarization. Appl Comput Math 6:278–287
Zurück zum Zitat Aljammal AH, Manasrah AM, Abdallah AE, Tahat NM (2017) A new architecture of cloud computing to enhance the load balancing. Int J Bus Inf Syst 25:393–405 Aljammal AH, Manasrah AM, Abdallah AE, Tahat NM (2017) A new architecture of cloud computing to enhance the load balancing. Int J Bus Inf Syst 25:393–405
Zurück zum Zitat Bellare M, Boldyreva A, O’Neill A (2007) Deterministic and efficiently searchable encryption. In: Advances in cryptology—CRYPTO 2007. Springer, Berlin, pp 535–552 Bellare M, Boldyreva A, O’Neill A (2007) Deterministic and efficiently searchable encryption. In: Advances in cryptology—CRYPTO 2007. Springer, Berlin, pp 535–552
Zurück zum Zitat Blei DM, Ng AY, Jordan MI (2003) Latent Dirichlet allocation. J Mach Learn Res 3:993–1022MATH Blei DM, Ng AY, Jordan MI (2003) Latent Dirichlet allocation. J Mach Learn Res 3:993–1022MATH
Zurück zum Zitat Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Advances in cryptology—Eurocrypt 2004. Springer, Berlin, pp 506–522 Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Advances in cryptology—Eurocrypt 2004. Springer, Berlin, pp 506–522
Zurück zum Zitat Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222–233CrossRef Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25:222–233CrossRef
Zurück zum Zitat Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: Applied cryptography and network security. Springer, Berlin, pp 442–455 Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: Applied cryptography and network security. Springer, Berlin, pp 442–455
Zurück zum Zitat Chase M, Kamara S (2010) Structured encryption and controlled disclosure. In: Advances in cryptology—ASIACRYPT 2010. Springer, Berlin, pp 577–594 Chase M, Kamara S (2010) Structured encryption and controlled disclosure. In: Advances in cryptology—ASIACRYPT 2010. Springer, Berlin, pp 577–594
Zurück zum Zitat Chaves R, Kuzmanov G, Sousa L, Vassiliadis S (2006) Rescheduling for optimized SHA-1 calculation. In: International workshop on embedded computer systems. Springer, Berlin, pp 425–434 Chaves R, Kuzmanov G, Sousa L, Vassiliadis S (2006) Rescheduling for optimized SHA-1 calculation. In: International workshop on embedded computer systems. Springer, Berlin, pp 425–434
Zurück zum Zitat Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya AY (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27:951–963CrossRef Chen C, Zhu X, Shen P, Hu J, Guo S, Tari Z, Zomaya AY (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst 27:951–963CrossRef
Zurück zum Zitat Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 79–88 Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 79–88
Zurück zum Zitat Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, HersheyCrossRef Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, HersheyCrossRef
Zurück zum Zitat Handa R, Challa RK (2015) A cluster based multi-keyword search on outsourced encrypted cloud data. In: 2015 2nd International conference on computing for sustainable global development (INDIACom). IEEE, pp 115–120 Handa R, Challa RK (2015) A cluster based multi-keyword search on outsourced encrypted cloud data. In: 2015 2nd International conference on computing for sustainable global development (INDIACom). IEEE, pp 115–120
Zurück zum Zitat Jiang ZL et al (2018) Efficient two-party privacy preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing. In: Vaidya J, Li J (eds) Algorithms and architectures for parallel processing. Springer International Publishing, Cham, pp 447–460CrossRef Jiang ZL et al (2018) Efficient two-party privacy preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing. In: Vaidya J, Li J (eds) Algorithms and architectures for parallel processing. Springer International Publishing, Cham, pp 447–460CrossRef
Zurück zum Zitat Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. Advances in cryptology—EUROCRYPT 2008. Springer, Berlin, pp 146–162CrossRef Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. Advances in cryptology—EUROCRYPT 2008. Springer, Berlin, pp 146–162CrossRef
Zurück zum Zitat Krishna CR, Handa R (2016) Dynamic cluster based privacy-preserving multi-keyword search over encrypted cloud data. In: 2016 6th International conference on cloud system and big data engineering (Confluence). IEEE, pp 146–151 Krishna CR, Handa R (2016) Dynamic cluster based privacy-preserving multi-keyword search over encrypted cloud data. In: 2016 6th International conference on cloud system and big data engineering (Confluence). IEEE, pp 146–151
Zurück zum Zitat Li P, Li J, Huang Z, Gao C-Z, Chen W-B, Chen K (2017) Privacy-preserving outsourced classification in cloud computing. Cluster Comput 21:1–10 Li P, Li J, Huang Z, Gao C-Z, Chen W-B, Chen K (2017) Privacy-preserving outsourced classification in cloud computing. Cluster Comput 21:1–10
Zurück zum Zitat Manasrah AM (2017) Dynamic weighted VM load balancing for cloud-analyst. Int J Inf Comput Secur 9:5–19 Manasrah AM (2017) Dynamic weighted VM load balancing for cloud-analyst. Int J Inf Comput Secur 9:5–19
Zurück zum Zitat Manasrah AM, Al-Din BN (2016) Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study. Secur Commun Netw 9:1450–1461CrossRef Manasrah AM, Al-Din BN (2016) Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study. Secur Commun Netw 9:1450–1461CrossRef
Zurück zum Zitat Manasrah AM, Smadi T, ALmomani A (2016) A variable service broker routing policy for data center selection in cloud analyst. J King Saud Univ Comput Inf Sci 29:365–377 Manasrah AM, Smadi T, ALmomani A (2016) A variable service broker routing policy for data center selection in cloud analyst. J King Saud Univ Comput Inf Sci 29:365–377
Zurück zum Zitat Nagwani N (2015) Summarizing large text collection using topic modeling and clustering based on MapReduce framework. J Big Data 2:6CrossRef Nagwani N (2015) Summarizing large text collection using topic modeling and clustering based on MapReduce framework. J Big Data 2:6CrossRef
Zurück zum Zitat Nedjah N, Wyant RS, Mourelle L, Gupta B (2017) Efficient yet robust biometric iris matching on smart cards for data high security and privacy. Future Gener Comput Syst 76:18–32CrossRef Nedjah N, Wyant RS, Mourelle L, Gupta B (2017) Efficient yet robust biometric iris matching on smart cards for data high security and privacy. Future Gener Comput Syst 76:18–32CrossRef
Zurück zum Zitat Pasupuleti SK, Ramalingam S, Buyya R (2016) An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J Netw Comput Appl 64:12–22CrossRef Pasupuleti SK, Ramalingam S, Buyya R (2016) An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J Netw Comput Appl 64:12–22CrossRef
Zurück zum Zitat Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor BIG Data collection—processing and analysis in smart buildings. Future Gener Comput Syst 82:349–357CrossRef Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor BIG Data collection—processing and analysis in smart buildings. Future Gener Comput Syst 82:349–357CrossRef
Zurück zum Zitat Porter MF, Boulton R, Macfarlane A (2002) The english (porter2) stemming algorithm. Retrieved 18 2011 Porter MF, Boulton R, Macfarlane A (2002) The english (porter2) stemming algorithm. Retrieved 18 2011
Zurück zum Zitat Ramasubramanian C, Ramya R (2013) Effective pre-processing activities in text mining using improved porter’s stemming algorithm. Int J Adv Res Comput Commun Eng 2:4536–4538 Ramasubramanian C, Ramya R (2013) Effective pre-processing activities in text mining using improved porter’s stemming algorithm. Int J Adv Res Comput Commun Eng 2:4536–4538
Zurück zum Zitat Ramos J (2003) Using tf-idf to determine word relevance in document queries. In: Proceedings of the first instructional conference on machine learning, pp 133–142 Ramos J (2003) Using tf-idf to determine word relevance in document queries. In: Proceedings of the first instructional conference on machine learning, pp 133–142
Zurück zum Zitat Ranjan KA, Pasupulati SK, Ramaligam S (2017) Privacy-preserving multi-keyword search over the encrypted data for multiple users in cloud computing. In: International conference on inventive computing and informatics (ICICI). IEEE, pp 1079–1084 Ranjan KA, Pasupulati SK, Ramaligam S (2017) Privacy-preserving multi-keyword search over the encrypted data for multiple users in cloud computing. In: International conference on inventive computing and informatics (ICICI). IEEE, pp 1079–1084
Zurück zum Zitat Salton G, Buckley C (1988) Term-weighting approaches in automatic text retrieval. Inf Process Manag 24:513–523CrossRef Salton G, Buckley C (1988) Term-weighting approaches in automatic text retrieval. Inf Process Manag 24:513–523CrossRef
Zurück zum Zitat Salton G, Wong A, Yang C-S (1975) A vector space model for automatic indexing. Commun ACM 18:613–620CrossRef Salton G, Wong A, Yang C-S (1975) A vector space model for automatic indexing. Commun ACM 18:613–620CrossRef
Zurück zum Zitat Stergiou C, Psannis KE, Kim B-G, Gupta B (2018) Secure integration of IoT and cloud computing. Future Gener Comput Syst 78:964–975CrossRef Stergiou C, Psannis KE, Kim B-G, Gupta B (2018) Secure integration of IoT and cloud computing. Future Gener Comput Syst 78:964–975CrossRef
Zurück zum Zitat Takabi H (2014) Privacy aware access control for data sharing in cloud computing environments. In: Proceedings of the 2nd international workshop on security in cloud computing. ACM, pp 27–34 Takabi H (2014) Privacy aware access control for data sharing in cloud computing environments. In: Proceedings of the 2nd international workshop on security in cloud computing. ACM, pp 27–34
Zurück zum Zitat Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2012) A new efficient verifiable fuzzy keyword search scheme. JoWUA 3:61–71 Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2012) A new efficient verifiable fuzzy keyword search scheme. JoWUA 3:61–71
Zurück zum Zitat Witten IH, Frank E, Hall MA, Pal CJ (2016) Data mining: practical machine learning tools and techniques. Morgan Kaufmann, Los Altos Witten IH, Frank E, Hall MA, Pal CJ (2016) Data mining: practical machine learning tools and techniques. Morgan Kaufmann, Los Altos
Zurück zum Zitat Xu Y, Cui W, Peinado M (2015) Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In: 2015 IEEE symposium on security and privacy (SP). IEEE, pp 640–656 Xu Y, Cui W, Peinado M (2015) Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In: 2015 IEEE symposium on security and privacy (SP). IEEE, pp 640–656
Zurück zum Zitat Yin H, Zhang J, Xiong Y, Huang X, Deng T (2018) PPK-means: achieving privacy-preserving clustering over encrypted multi-dimensional cloud data. Electronics 7:310CrossRef Yin H, Zhang J, Xiong Y, Huang X, Deng T (2018) PPK-means: achieving privacy-preserving clustering over encrypted multi-dimensional cloud data. Electronics 7:310CrossRef
Zurück zum Zitat Zhao W, Ma H, He Q (2009) Parallel k-means clustering based on mapreduce. IEEE International Conference on Cloud Computing. Springer, Berlin, pp 674–679CrossRef Zhao W, Ma H, He Q (2009) Parallel k-means clustering based on mapreduce. IEEE International Conference on Cloud Computing. Springer, Berlin, pp 674–679CrossRef
Zurück zum Zitat Zhu X, Chen C, Tian X, Hu J (2015) HCSF: a hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search. In: 2015 IEEE 10th Conference on industrial electronics and applications (ICIEA). IEEE, pp 290–295 Zhu X, Chen C, Tian X, Hu J (2015) HCSF: a hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search. In: 2015 IEEE 10th Conference on industrial electronics and applications (ICIEA). IEEE, pp 290–295
Metadaten
Titel
A privacy-preserving multi-keyword search approach in cloud computing
verfasst von
Ahmed M. Manasrah
Mahmoud Abu Nasir
Maher Salem
Publikationsdatum
08.05.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 8/2020
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-04033-z

Weitere Artikel der Ausgabe 8/2020

Soft Computing 8/2020 Zur Ausgabe