Skip to main content
Top

2019 | OriginalPaper | Chapter

Privacy Preserving Ranked Multi Keyword Context Sensitive Fuzzy Search Over Encrypted Cloud Data

Authors : Anu Khurana, Rama Krishna Challa, Navdeep Kaur

Published in: Futuristic Trends in Network and Communication Technologies

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The privacy preserving search feature is very useful for a cloud user to retrieve the desired encrypted documents easily, securely and cost effectively in the cloud. However, a search query issued by the user may sometimes have mis-typos i.e. wrongly typed words. The mis-typos could occur because of the addition or drop of letter(s) from the word or by swapping of characters in a word. At times such mis-typos may have many spelling suggestions against them within a given threshold, of which only a few makes sense as per the context of the query. Also the mistyped word may sometimes result in another valid word from the dictionary or the word list and hence the mis-spelt word may go unnoticed. Recent works in cloud address the issue of fuzzy search. However, these approaches do not suggest a word suitable as per the context and co-occurrence with other words of the query for such mis-typos. This paper presents a privacy preserving scheme ‘Context Sensitive Fuzzy Search’ (CSFS) in a cloud computing environment that address these issues. CSFS uses Levenshtein distance and neighbor co-occurrence statistics computed from encrypted query click logs and suggest(s) word(s) from the generated suggestions and set distance as per their co-occurring frequency with other words of the query. The results achieved show that the spelling suggestions listed are as per the context of the query and have high recall value.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy (2000) Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy (2000)
4.
go back to reference Goh, E.-J.: Secure Indexes*. Cryptology ePrint Archive: Report 2003/216 (2004) Goh, E.-J.: Secure Indexes*. Cryptology ePrint Archive: Report 2003/216 (2004)
8.
9.
go back to reference Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM CC 2006 (2006) Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM CC 2006 (2006)
10.
go back to reference Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of ICDCS 2010 (2010) Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of ICDCS 2010 (2010)
11.
go back to reference Cao, N., Wang, C., Li, M.: Privacy- preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 829–837 (2011) Cao, N., Wang, C., Li, M.: Privacy- preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 829–837 (2011)
12.
go back to reference Xu, Z., Kang, W., Li, R., Yow, K., Xu, C.Z.: Efficient multi-keyword ranked query on encrypted data in the cloud. In: Proceedings of ICPADS (2012) Xu, Z., Kang, W., Li, R., Yow, K., Xu, C.Z.: Efficient multi-keyword ranked query on encrypted data in the cloud. In: Proceedings of ICPADS (2012)
13.
go back to reference Yang, C., Zhang, W., Xu, J., Xu, J., Yu, N.: A fast privacy-preserving multi-keyword search scheme on cloud data. In: Proceedings of International Conference on Computing and Processing (Hardware/Software), pp. 104–110 (2012) Yang, C., Zhang, W., Xu, J., Xu, J., Yu, N.: A fast privacy-preserving multi-keyword search scheme on cloud data. In: Proceedings of International Conference on Computing and Processing (Hardware/Software), pp. 104–110 (2012)
14.
go back to reference Handa, R., Rama Krishna, C.: A cluster based multi-keyword search on outsourced encrypted cloud data. In: Proceedings of 2nd IEEE International Conference on Computing for Sustainable Global Development, pp. 115–120 (2015) Handa, R., Rama Krishna, C.: A cluster based multi-keyword search on outsourced encrypted cloud data. In: Proceedings of 2nd IEEE International Conference on Computing for Sustainable Global Development, pp. 115–120 (2015)
15.
go back to reference Handa, R., Rama Krishna, C.: An efficient cluster-based multi-keyword search on encrypted cloud data. CSI Commun. 39(3), 20–27. CSI (2015) Handa, R., Rama Krishna, C.: An efficient cluster-based multi-keyword search on encrypted cloud data. CSI Commun. 39(3), 20–27. CSI (2015)
16.
go back to reference Mangal, G., Rama Krishna, C., Handa, R.: Dynamic cluster based privacy-preserving multikeyword search over encrypted cloud data. In: Proceedings of 6th IEEE International Conference on Cloud System and Big Data Engineering, Noida, India, pp. 146–151 (2016) Mangal, G., Rama Krishna, C., Handa, R.: Dynamic cluster based privacy-preserving multikeyword search over encrypted cloud data. In: Proceedings of 6th IEEE International Conference on Cloud System and Big Data Engineering, Noida, India, pp. 146–151 (2016)
17.
go back to reference Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE INFOCOM, pp. 1–5 (2010) Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE INFOCOM, pp. 1–5 (2010)
18.
go back to reference Ahsan, M.A.M., Sabilah, M., Wahab, A.: An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In: Proceedings of International Conference on Research and Innovation in Information Systems (ICRIIS) (2017) Ahsan, M.A.M., Sabilah, M., Wahab, A.: An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In: Proceedings of International Conference on Research and Innovation in Information Systems (ICRIIS) (2017)
19.
go back to reference Ding, S., Li, Y., Zhang, J., Chen, L., Wang, Z., Xu, Q.: An efficient and privacy preserving ranked fuzzy keywords search over encrypted cloud data. In: Proceedings of IEEE International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), USA (2016) Ding, S., Li, Y., Zhang, J., Chen, L., Wang, Z., Xu, Q.: An efficient and privacy preserving ranked fuzzy keywords search over encrypted cloud data. In: Proceedings of IEEE International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), USA (2016)
20.
go back to reference Chen, J., et al.: EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data. IEEE Trans. Serv. Comput. PP(99) (2017) Chen, J., et al.: EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data. IEEE Trans. Serv. Comput. PP(99) (2017)
21.
go back to reference Khan, N.S., Rama Krishna, C., Khurana, A.: Secure ranked fuzzy multikeyword search over outsourced encrypted cloud data. In: Proceedings of 5th IEEE International Conference on Computer and Communication Technology, Allahabad, pp. 241–249 (2014) Khan, N.S., Rama Krishna, C., Khurana, A.: Secure ranked fuzzy multikeyword search over outsourced encrypted cloud data. In: Proceedings of 5th IEEE International Conference on Computer and Communication Technology, Allahabad, pp. 241–249 (2014)
22.
go back to reference Saini, V., Challa, R.K., Khan, Neelam S.: An efficient multi-keyword synonym-based fuzzy ranked search over outsourced encrypted cloud data. In: Choudhary, Ramesh K., Mandal, J.K., Auluck, N., Nagarajaram, H.A. (eds.) Advanced Computing and Communication Technologies. AISC, vol. 452, pp. 433–441. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-1023-1_43CrossRef Saini, V., Challa, R.K., Khan, Neelam S.: An efficient multi-keyword synonym-based fuzzy ranked search over outsourced encrypted cloud data. In: Choudhary, Ramesh K., Mandal, J.K., Auluck, N., Nagarajaram, H.A. (eds.) Advanced Computing and Communication Technologies. AISC, vol. 452, pp. 433–441. Springer, Singapore (2016). https://​doi.​org/​10.​1007/​978-981-10-1023-1_​43CrossRef
23.
go back to reference Liu, C., Zhu, L., Wang, M., Tan, Y.: Search pattern leakage in searchable encryption: attacks and new construction. J. Inf. Sci. Int. J. 265, 176–188 (2014) Liu, C., Zhu, L., Wang, M., Tan, Y.: Search pattern leakage in searchable encryption: attacks and new construction. J. Inf. Sci. Int. J. 265, 176–188 (2014)
Metadata
Title
Privacy Preserving Ranked Multi Keyword Context Sensitive Fuzzy Search Over Encrypted Cloud Data
Authors
Anu Khurana
Rama Krishna Challa
Navdeep Kaur
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-3804-5_16

Premium Partner