Skip to main content
Top

2021 | OriginalPaper | Chapter

Tree-Based Multi-Keyword Rank Search Scheme Supporting Dynamic Update and Verifiability upon Encrypted Cloud Data

Authors : Pawan Kumar Tanwar, Ajay Khunteta, Vishal Goar, Manoj Kuri

Published in: Advances in Information Communication Technology and Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to large scale use and many applications of cloud maximum data, owners upload the information at cloud space to save time and local disk space. Here, the authors provided a TBMKRS (Tree-Based Multi-Keyword Rank Search) scheme which also supports dynamic update (insert/delete) and verifiability of encrypted information upon cloud. For the evaluation of performance and analysis of result, the Enron data set have been used by the authors.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Moffat A, Zobel J (1998) Exploring the similarity space, ACM SIGIR, pp 18–34 Moffat A, Zobel J (1998) Exploring the similarity space, ACM SIGIR, pp 18–34
2.
go back to reference Li H, Hou YT, Lou W, Liu X, Sun W (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE conference on computer Comm, pp 2110–2118, April 2015 Li H, Hou YT, Lou W, Liu X, Sun W (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE conference on computer Comm, pp 2110–2118, April 2015
3.
go back to reference Perrig A, Song D, Wagner D (2000) Practical techniques for searches on encrypted data, In: Proceeding of IEEE symposium on Sec. and Priv., pp 44–55 Perrig A, Song D, Wagner D (2000) Practical techniques for searches on encrypted data, In: Proceeding of IEEE symposium on Sec. and Priv., pp 44–55
4.
go back to reference Lou W, Ren K, Cao N, Wang C, Wang Q, Li J (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Conf. on Info. Comm., pp 441–445 Lou W, Ren K, Cao N, Wang C, Wang Q, Li J (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Conf. on Info. Comm., pp 441–445
5.
go back to reference Shen X, Zhou L, Liang X, Luan T, Yang Y, Li H (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Secur Comput, 312–325 Shen X, Zhou L, Liang X, Luan T, Yang Y, Li H (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Secur Comput, 312–325
6.
go back to reference Papamanthou C, Kamara S (2013) Parallel and dynamic searchable symmetric encryption. In: Sadeghi A-R (ed) FC. LNCS, vol 7859, pp 258–274. Springer, Heidelberg Papamanthou C, Kamara S (2013) Parallel and dynamic searchable symmetric encryption. In: Sadeghi A-R (ed) FC. LNCS, vol 7859, pp 258–274. Springer, Heidelberg
7.
go back to reference Waters B, Staddon J, Golle P (2004) Secure conjunctive keyword search over encrypted data. In: Jakobsson M, Yung M, Zhou J (eds) ACNS 2004, vol 3089. LNCS. Springer, Heidelberg, pp 31–45 Waters B, Staddon J, Golle P (2004) Secure conjunctive keyword search over encrypted data. In: Jakobsson M, Yung M, Zhou J (eds) ACNS 2004, vol 3089. LNCS. Springer, Heidelberg, pp 31–45
8.
go back to reference Huang F., Sun X., Fu Z., Shu J., Ren, K., Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transaction on Parallel Distributed System, 2546–2559, 2016 Huang F., Sun X., Fu Z., Shu J., Ren, K., Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transaction on Parallel Distributed System, 2546–2559, 2016
9.
go back to reference Mitzenmacher M, Chang YC (2005) Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, YA., Keromytis JM (eds) ACNS, LNCS, vol 3531, pp 442–455. Springer, Heidelberg Mitzenmacher M, Chang YC (2005) Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, YA., Keromytis JM (eds) ACNS, LNCS, vol 3531, pp 442–455. Springer, Heidelberg
10.
go back to reference Lou W, Ren K, Li M, Wang C, Cao N (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst, 222–233 Lou W, Ren K, Li M, Wang C, Cao N (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst, 222–233
11.
go back to reference Persiano, G, Ostrovsky R., Crescenzo G., Boneh, D., Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg, 2004 Persiano, G, Ostrovsky R., Crescenzo G., Boneh, D., Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg, 2004
12.
go back to reference Tanwar PK, Goar V, Khunteta A (2018) Design and analysis of search algorithm with B-tree and commutative key RSA for dynamic updation in Cloud Computing. Int J Curr Adv Res 7(7(H)): 14414–14418 Tanwar PK, Goar V, Khunteta A (2018) Design and analysis of search algorithm with B-tree and commutative key RSA for dynamic updation in Cloud Computing. Int J Curr Adv Res 7(7(H)): 14414–14418
13.
go back to reference Tanwar PK, Goar V, Khunteta A (2017) Performance evaluation of multi keyword ranked search schema called BDMRS-CM & EDMRS-BM in cloud computing. Int J Eng Sci 24:42–51 Tanwar PK, Goar V, Khunteta A (2017) Performance evaluation of multi keyword ranked search schema called BDMRS-CM & EDMRS-BM in cloud computing. Int J Eng Sci 24:42–51
14.
go back to reference Tanwar PK, Goar V, Khunteta A (2016) Design of new multi keyword ranked search scheme and validation for cloud computing. In: Proceedings of AICTC—2016, Bikaner, India Tanwar PK, Goar V, Khunteta A (2016) Design of new multi keyword ranked search scheme and validation for cloud computing. In: Proceedings of AICTC—2016, Bikaner, India
15.
go back to reference Hou YT, Lou W, Song W, Wang B (2015) Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In: Computer communications, pp 2092–2100 Hou YT, Lou W, Song W, Wang B (2015) Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In: Computer communications, pp 2092–2100
16.
go back to reference Goh EJ (2003) Secure indexes Cryptology ePrint Archive, Report 2003/216 Goh EJ (2003) Secure indexes Cryptology ePrint Archive, Report 2003/216
17.
go back to reference Lou W, Ren K, Li J, Cao N, Wang C (2010) Secure ranked keyword search over encrypted cloud data. In: Proceedings of the 2010 IEEE 30th international conference on distributed computing systems, pp 253–262 Lou W, Ren K, Li J, Cao N, Wang C (2010) Secure ranked keyword search over encrypted cloud data. In: Proceedings of the 2010 IEEE 30th international conference on distributed computing systems, pp 253–262
18.
go back to reference Waters B, Boneh D (2007) Conjunctive, subset, and range queries on encrypted data. In: Vadhan SP (ed) TCC LNCS, vol 4392, pp 535–554. Springer, Heidelberg Waters B, Boneh D (2007) Conjunctive, subset, and range queries on encrypted data. In: Vadhan SP (ed) TCC LNCS, vol 4392, pp 535–554. Springer, Heidelberg
19.
go back to reference Wang Q, Wang X, Sun X, Xia Z (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 340–352 Wang Q, Wang X, Sun X, Xia Z (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 340–352
20.
go back to reference Zou Q, Lai RW, Chow SS, Du M, Wang Q, He M (2016) Searchable encryption over feature rich data. IEEE Trans Dependable Secur Comput Zou Q, Lai RW, Chow SS, Du M, Wang Q, He M (2016) Searchable encryption over feature rich data. IEEE Trans Dependable Secur Comput
21.
go back to reference Ren K, Sun X, Guan C, Wu X, Fu Z (2017) Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur, 2706–2716 Ren K, Sun X, Guan C, Wu X, Fu Z (2017) Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur, 2706–2716
22.
go back to reference Sun W et al (2014) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst, 3025–3035 Sun W et al (2014) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst, 3025–3035
23.
go back to reference Chen C et al (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst, 951–963 Chen C et al (2016) An efficient privacy-preserving ranked keyword search method. IEEE Trans Parallel Distrib Syst, 951–963
24.
go back to reference Roeder T, Papamanthou C, Kamara S (2012) Dynamic searchable symmetric encryption. In: ACM Conf. on Comp. and Comm. Sec., pp 965–976 Roeder T, Papamanthou C, Kamara S (2012) Dynamic searchable symmetric encryption. In: ACM Conf. on Comp. and Comm. Sec., pp 965–976
25.
go back to reference Deng RH, Wan Z (2017) V P search: achieving verifiability for privacy-preserving multi keyword search over encrypted cloud data. IEEE Trans Dependable Secur Comput, 99 Deng RH, Wan Z (2017) V P search: achieving verifiability for privacy-preserving multi keyword search over encrypted cloud data. IEEE Trans Dependable Secur Comput, 99
26.
go back to reference Chow C, Lai RWF et al (2017) Parallel and dynamic structured encryption. In: Deng R, Weng J, Ren K, Yegneswaran V (eds) Secure communication 2016. LNICST, vol 198, pp 219–238. Springer, Cham Chow C, Lai RWF et al (2017) Parallel and dynamic structured encryption. In: Deng R, Weng J, Ren K, Yegneswaran V (eds) Secure communication 2016. LNICST, vol 198, pp 219–238. Springer, Cham
Metadata
Title
Tree-Based Multi-Keyword Rank Search Scheme Supporting Dynamic Update and Verifiability upon Encrypted Cloud Data
Authors
Pawan Kumar Tanwar
Ajay Khunteta
Vishal Goar
Manoj Kuri
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5421-6_38