Skip to main content

2019 | OriginalPaper | Buchkapitel

Privacy Preserving Ranked Multi Keyword Context Sensitive Fuzzy Search Over Encrypted Cloud Data

verfasst von : Anu Khurana, Rama Krishna Challa, Navdeep Kaur

Erschienen in: Futuristic Trends in Network and Communication Technologies

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The privacy preserving search feature is very useful for a cloud user to retrieve the desired encrypted documents easily, securely and cost effectively in the cloud. However, a search query issued by the user may sometimes have mis-typos i.e. wrongly typed words. The mis-typos could occur because of the addition or drop of letter(s) from the word or by swapping of characters in a word. At times such mis-typos may have many spelling suggestions against them within a given threshold, of which only a few makes sense as per the context of the query. Also the mistyped word may sometimes result in another valid word from the dictionary or the word list and hence the mis-spelt word may go unnoticed. Recent works in cloud address the issue of fuzzy search. However, these approaches do not suggest a word suitable as per the context and co-occurrence with other words of the query for such mis-typos. This paper presents a privacy preserving scheme ‘Context Sensitive Fuzzy Search’ (CSFS) in a cloud computing environment that address these issues. CSFS uses Levenshtein distance and neighbor co-occurrence statistics computed from encrypted query click logs and suggest(s) word(s) from the generated suggestions and set distance as per their co-occurring frequency with other words of the query. The results achieved show that the spelling suggestions listed are as per the context of the query and have high recall value.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy (2000) Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy (2000)
4.
Zurück zum Zitat Goh, E.-J.: Secure Indexes*. Cryptology ePrint Archive: Report 2003/216 (2004) Goh, E.-J.: Secure Indexes*. Cryptology ePrint Archive: Report 2003/216 (2004)
8.
Zurück zum Zitat Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)MathSciNetCrossRef Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)MathSciNetCrossRef
9.
Zurück zum Zitat Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM CC 2006 (2006) Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of ACM CC 2006 (2006)
10.
Zurück zum Zitat Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of ICDCS 2010 (2010) Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of ICDCS 2010 (2010)
11.
Zurück zum Zitat Cao, N., Wang, C., Li, M.: Privacy- preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 829–837 (2011) Cao, N., Wang, C., Li, M.: Privacy- preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 829–837 (2011)
12.
Zurück zum Zitat Xu, Z., Kang, W., Li, R., Yow, K., Xu, C.Z.: Efficient multi-keyword ranked query on encrypted data in the cloud. In: Proceedings of ICPADS (2012) Xu, Z., Kang, W., Li, R., Yow, K., Xu, C.Z.: Efficient multi-keyword ranked query on encrypted data in the cloud. In: Proceedings of ICPADS (2012)
13.
Zurück zum Zitat Yang, C., Zhang, W., Xu, J., Xu, J., Yu, N.: A fast privacy-preserving multi-keyword search scheme on cloud data. In: Proceedings of International Conference on Computing and Processing (Hardware/Software), pp. 104–110 (2012) Yang, C., Zhang, W., Xu, J., Xu, J., Yu, N.: A fast privacy-preserving multi-keyword search scheme on cloud data. In: Proceedings of International Conference on Computing and Processing (Hardware/Software), pp. 104–110 (2012)
14.
Zurück zum Zitat Handa, R., Rama Krishna, C.: A cluster based multi-keyword search on outsourced encrypted cloud data. In: Proceedings of 2nd IEEE International Conference on Computing for Sustainable Global Development, pp. 115–120 (2015) Handa, R., Rama Krishna, C.: A cluster based multi-keyword search on outsourced encrypted cloud data. In: Proceedings of 2nd IEEE International Conference on Computing for Sustainable Global Development, pp. 115–120 (2015)
15.
Zurück zum Zitat Handa, R., Rama Krishna, C.: An efficient cluster-based multi-keyword search on encrypted cloud data. CSI Commun. 39(3), 20–27. CSI (2015) Handa, R., Rama Krishna, C.: An efficient cluster-based multi-keyword search on encrypted cloud data. CSI Commun. 39(3), 20–27. CSI (2015)
16.
Zurück zum Zitat Mangal, G., Rama Krishna, C., Handa, R.: Dynamic cluster based privacy-preserving multikeyword search over encrypted cloud data. In: Proceedings of 6th IEEE International Conference on Cloud System and Big Data Engineering, Noida, India, pp. 146–151 (2016) Mangal, G., Rama Krishna, C., Handa, R.: Dynamic cluster based privacy-preserving multikeyword search over encrypted cloud data. In: Proceedings of 6th IEEE International Conference on Cloud System and Big Data Engineering, Noida, India, pp. 146–151 (2016)
17.
Zurück zum Zitat Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE INFOCOM, pp. 1–5 (2010) Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE INFOCOM, pp. 1–5 (2010)
18.
Zurück zum Zitat Ahsan, M.A.M., Sabilah, M., Wahab, A.: An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In: Proceedings of International Conference on Research and Innovation in Information Systems (ICRIIS) (2017) Ahsan, M.A.M., Sabilah, M., Wahab, A.: An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In: Proceedings of International Conference on Research and Innovation in Information Systems (ICRIIS) (2017)
19.
Zurück zum Zitat Ding, S., Li, Y., Zhang, J., Chen, L., Wang, Z., Xu, Q.: An efficient and privacy preserving ranked fuzzy keywords search over encrypted cloud data. In: Proceedings of IEEE International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), USA (2016) Ding, S., Li, Y., Zhang, J., Chen, L., Wang, Z., Xu, Q.: An efficient and privacy preserving ranked fuzzy keywords search over encrypted cloud data. In: Proceedings of IEEE International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), USA (2016)
20.
Zurück zum Zitat Chen, J., et al.: EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data. IEEE Trans. Serv. Comput. PP(99) (2017) Chen, J., et al.: EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data. IEEE Trans. Serv. Comput. PP(99) (2017)
21.
Zurück zum Zitat Khan, N.S., Rama Krishna, C., Khurana, A.: Secure ranked fuzzy multikeyword search over outsourced encrypted cloud data. In: Proceedings of 5th IEEE International Conference on Computer and Communication Technology, Allahabad, pp. 241–249 (2014) Khan, N.S., Rama Krishna, C., Khurana, A.: Secure ranked fuzzy multikeyword search over outsourced encrypted cloud data. In: Proceedings of 5th IEEE International Conference on Computer and Communication Technology, Allahabad, pp. 241–249 (2014)
22.
Zurück zum Zitat Saini, V., Challa, R.K., Khan, Neelam S.: An efficient multi-keyword synonym-based fuzzy ranked search over outsourced encrypted cloud data. In: Choudhary, Ramesh K., Mandal, J.K., Auluck, N., Nagarajaram, H.A. (eds.) Advanced Computing and Communication Technologies. AISC, vol. 452, pp. 433–441. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-1023-1_43CrossRef Saini, V., Challa, R.K., Khan, Neelam S.: An efficient multi-keyword synonym-based fuzzy ranked search over outsourced encrypted cloud data. In: Choudhary, Ramesh K., Mandal, J.K., Auluck, N., Nagarajaram, H.A. (eds.) Advanced Computing and Communication Technologies. AISC, vol. 452, pp. 433–441. Springer, Singapore (2016). https://​doi.​org/​10.​1007/​978-981-10-1023-1_​43CrossRef
23.
Zurück zum Zitat Liu, C., Zhu, L., Wang, M., Tan, Y.: Search pattern leakage in searchable encryption: attacks and new construction. J. Inf. Sci. Int. J. 265, 176–188 (2014) Liu, C., Zhu, L., Wang, M., Tan, Y.: Search pattern leakage in searchable encryption: attacks and new construction. J. Inf. Sci. Int. J. 265, 176–188 (2014)
Metadaten
Titel
Privacy Preserving Ranked Multi Keyword Context Sensitive Fuzzy Search Over Encrypted Cloud Data
verfasst von
Anu Khurana
Rama Krishna Challa
Navdeep Kaur
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-3804-5_16