Skip to main content
Erschienen in: Soft Computing 16/2020

29.01.2020 | Methodologies and Application

FSS-SDD: fuzzy-based semantic search for secure data discovery from outsourced cloud data

verfasst von: M. Ananthi, R. Sabitha, S. Karthik, J. Shanthini

Erschienen in: Soft Computing | Ausgabe 16/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In current decade, cloud computing has become more prevalent and utilized for managing more sensitive data that are stored over cloud storage. While outsourcing the sensitive and private data on to the cloud, security is the major factor to be concentrated in efficient data search using keywords. As is auspicious, security of selective keyword search can be achieved using the powerful cryptographic technique called encryption. That is, the data that are to be outsourced have to be encrypted before storing it on cloud. Symmetric encryption is used between the data owner and the customer, whereas asymmetric encryption is used between the data owner and the cloud server. In such cases, the data discovery and retrieval have become more stimulating process. However, there are many methodologies developed for searching the encrypted outsourced data from the cloud. In this paper, the efficient data discovery process is focused and enhanced with the developed model called fuzzy-based semantic search for secure data discovery (FSS-SDD). A multi-valued logic called fuzzy logic is used, which has truth values of variables ranging between 0 and 1. It is used where the truth values range between completely true and completely false. The fuzzy logic-based semantic search improves the searching experience of the end user, by finding and retrieving the exact matching files for corresponding search files given by the user. Moreover, the model discovers the closely relevant matches using the semantic similarities, in cases, when the exact matches are not avail. For reducing the false positive rates, grading mechanism is enforced. Using the proposed FSS-SDD model, the processing overhead on new updates is effectively reduced and security in data retrieval is guaranteed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bao F, Deng R, Ding X, Yang Y (2008) Private query on encrypted data in multi-user settings. In: Proceedings of ISPEC’08 Bao F, Deng R, Ding X, Yang Y (2008) Private query on encrypted data in multi-user settings. In: Proceedings of ISPEC’08
Zurück zum Zitat Behm A, Ji S, Li C, Lu J (2009) Space-constrained gram-based indexing for efficient approximate string search. In: Proceedings of ICDE’09 Behm A, Ji S, Li C, Lu J (2009) Space-constrained gram-based indexing for efficient approximate string search. In: Proceedings of ICDE’09
Zurück zum Zitat Bellare M, Boldyreva A, O’Neill A (2007) Deterministic and efficiently searchable encryption. In: Proceedings of crypto 2007, volume 4622 of LNCS. Springer, Berlin Bellare M, Boldyreva A, O’Neill A (2007) Deterministic and efficiently searchable encryption. In: Proceedings of crypto 2007, volume 4622 of LNCS. Springer, Berlin
Zurück zum Zitat Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Proceedings of TCC’07, pp 535–554 Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Proceedings of TCC’07, pp 535–554
Zurück zum Zitat Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Proceedings of EUROCRYP’04 Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Proceedings of EUROCRYP’04
Zurück zum Zitat Cao N, Wang C, Li M, Ren K, Lou W (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, 2011, pp 829–837 Cao N, Wang C, Li M, Ren K, Lou W (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, 2011, pp 829–837
Zurück zum Zitat Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: Proceedings of ACNS’05 Chang Y-C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: Proceedings of ACNS’05
Zurück zum Zitat Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM CCS’06 Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM CCS’06
Zurück zum Zitat Duraipandian M, Vinothkanna MR (2019) Cloud based Internet of Things for smart connected objects. J ISMAC 1(02):111–119 Duraipandian M, Vinothkanna MR (2019) Cloud based Internet of Things for smart connected objects. J ISMAC 1(02):111–119
Zurück zum Zitat Feigenbaum J, Ishai Y, Malkin T, Nissim K, Strauss M, Wright RN (2001) Secure multiparty computation of approximations. In: Proceedings of ICALP’01 Feigenbaum J, Ishai Y, Malkin T, Nissim K, Strauss M, Wright RN (2001) Secure multiparty computation of approximations. In: Proceedings of ICALP’01
Zurück zum Zitat Hazarika B, Sing TJ (2015) Survey paper on cloud computing and cloud monitoring: basics. SSRG Int J Comput Sci Eng 2(1):10–15 Hazarika B, Sing TJ (2015) Survey paper on cloud computing and cloud monitoring: basics. SSRG Int J Comput Sci Eng 2(1):10–15
Zurück zum Zitat Ji S, Li G, Li C, Feng J (2009) Efficient interactive fuzzy keyword search. In: Proceedings of WWW’09 Ji S, Li G, Li C, Feng J (2009) Efficient interactive fuzzy keyword search. In: Proceedings of WWW’09
Zurück zum Zitat Li C, Lu J, Lu Y (2008) Efficient merging and filtering algorithms for approximate string searches. In: Proceedings of ICDE’08 Li C, Lu J, Lu Y (2008) Efficient merging and filtering algorithms for approximate string searches. In: Proceedings of ICDE’08
Zurück zum Zitat Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of the 29th IEEE international conference on computer communications, March 15–19, 2010, San Diego, USA, pp 1–5 Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of the 29th IEEE international conference on computer communications, March 15–19, 2010, San Diego, USA, pp 1–5
Zurück zum Zitat Li M, Yu S, Cao N, Lou W (2011) Authorized private keyword search over encrypted data in cloud computing. In: 31st international conference on distributed computing systems Li M, Yu S, Cao N, Lou W (2011) Authorized private keyword search over encrypted data in cloud computing. In: 31st international conference on distributed computing systems
Zurück zum Zitat Liu Q, Wang G, Wu J (2009) An efficient privacy preserving keyword search scheme in cloud computing. In: Proceedings of the international conference on computational science and engineering, August 29–31, 2009, Vancouver, Canada, vol 2, pp 715–720 Liu Q, Wang G, Wu J (2009) An efficient privacy preserving keyword search scheme in cloud computing. In: Proceedings of the international conference on computational science and engineering, August 29–31, 2009, Vancouver, Canada, vol 2, pp 715–720
Zurück zum Zitat Liu Q, Wang G, Wu J (2012) Secure and privacy preserving keyword searching for cloud storage services. J Netw Comput Appl 35:927–933CrossRef Liu Q, Wang G, Wu J (2012) Secure and privacy preserving keyword searching for cloud storage services. J Netw Comput Appl 35:927–933CrossRef
Zurück zum Zitat Manvi SS, Shyamb GK (2014) Resource management for infrastructure as a service (IaaS) in cloud computing: a survey. J Netw Comput Appl 41(1):424–440CrossRef Manvi SS, Shyamb GK (2014) Resource management for infrastructure as a service (IaaS) in cloud computing: a survey. J Netw Comput Appl 41(1):424–440CrossRef
Zurück zum Zitat Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor BIG Data collection–processing and analysis in smart buildings. Fut Gener Comput Syst 82:349–357CrossRef Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor BIG Data collection–processing and analysis in smart buildings. Fut Gener Comput Syst 82:349–357CrossRef
Zurück zum Zitat Praveena A, Syms S (2017) Ensuring data security in cloud based social network. In: International conference of electronics, communication and aerospace technology (ICECA), vol 2. IEEE, pp 289–295 Praveena A, Syms S (2017) Ensuring data security in cloud based social network. In: International conference of electronics, communication and aerospace technology (ICECA), vol 2. IEEE, pp 289–295
Zurück zum Zitat Song D, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings of IEEE symposium on security and privacy’00 Song D, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings of IEEE symposium on security and privacy’00
Zurück zum Zitat Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198CrossRef Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198CrossRef
Zurück zum Zitat Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23:1467–1479CrossRef Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23:1467–1479CrossRef
Zurück zum Zitat Xu Z, Kang W, Li R, Yow K, Xu C (2012) Efficient multi-keyword rank query on encrypted cloud data. In: Proceedings of 18th IEEE international conference on parallel and distributed systems, 2012, Singapore, pp 244–251 Xu Z, Kang W, Li R, Yow K, Xu C (2012) Efficient multi-keyword rank query on encrypted cloud data. In: Proceedings of 18th IEEE international conference on parallel and distributed systems, 2012, Singapore, pp 244–251
Metadaten
Titel
FSS-SDD: fuzzy-based semantic search for secure data discovery from outsourced cloud data
verfasst von
M. Ananthi
R. Sabitha
S. Karthik
J. Shanthini
Publikationsdatum
29.01.2020
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 16/2020
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-020-04701-5

Weitere Artikel der Ausgabe 16/2020

Soft Computing 16/2020 Zur Ausgabe