Privacy Preserving Many-Sided Shield in Cloud Environment

Abstract

In the current cloud computing scenario keyword-based search over encrypted outsourced data has become an important tool. The majority of the existing techniques are focusing on multi-keyword exact match or single keyword fuzzy search. However, those existing techniques find less practical significance in real world applications compared with the multi-keyword fuzzy search technique over encrypted data. The first attempt to construct such a multi-keyword fuzzy search scheme was reported by Wang et al., who used locality-sensitive hashing functions and Bloom filtering to meet the goal of multi-keyword fuzzy search. Nevertheless, Wang’s scheme was only effective for a one letter mistake in keyword but was not effective for other common spelling mistakes. Moreover, Wang’s scheme was vulnerable to server out-of-order problems during the ranking process and did not consider the keyword weight. In this project, based on Wang et al.’s scheme, we propose an efficient multi-keyword fuzzy ranked search scheme based on Wang et al.’s scheme that is able to address the aforementioned problems. First, we develop a new method of keyword transformation based on the uni-gram, which will simultaneously improve the accuracy and creates the ability to handle other spelling mistakes. In addition, keywords with the same root can be queried using the stemming algorithm. Furthermore, we consider the keyword weight when selecting an adequate matching file set. Experiments using real-world data show that our scheme is practically efficient and achieve high accuracy.

Country : India

1 Anu.T. S.2 Prof. P. Gopika

  1. PG Student, Dept. of Computer Science and Engineering, EASA College of Engineering and Technology, Tamilnadu, India
  2. Professor, Dept. of Computer Science and Engineering, EASA College of Engineering and Technology, Tamilnadu, India

IRJIET, Volume 8, Issue 2, February 2024 pp. 148-154

doi.org/10.47001/IRJIET/2024.802022

References

  1. B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud,” in Proc. IEEE INFOCOM, Apr./May 2014, pp. 2112–2120.
  2. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” in Proc. IEEE INFOCOM, Apr. 2011, pp. 829–837.
  3. W. Sun et al., “Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” in Proc. 8th ASIACCS, 2013, pp. 71–82.
  4. Z. Xu, W. Kang, R. Li, K. C. Yow, and C.-Z. Xu, “Efficient multikeyword ranked query on encrypted data in the cloud,” in Proc. 18th IEEE Int. Conf. Parallel Distrib. Syst., Dec. 2012, pp. 244–251.
  5. Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multi keyword ranked search scheme over encrypted cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340–352, Feb. 2016, doi: 10.1109/TPDS.2015.2401003.
  6. Z. Fu, J. Shu, X. Sun, and D. Zhang, “Semantic keyword search based on trie over encrypted cloud data,” in Proc. 2nd Int. Workshop Security Cloud Comput., Kyoto, Japan, Jun. 2014, pp. 59–62.
  7. Z. Fu, J. Shu, X. Sun, and N. Linge, “Smart cloud search services: Verifiable keyword-based semantic search over encrypted cloud data,” IEEE Trans. Consum. Electron., vol. 60, no. 4, pp. 762–770, Nov. 2014.
  8. M. Chuah and W. Hu, “Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data,” in Proc. 31st Int. Conf. Distrib. Comput. Syst. Workshops (ICDCSW), Jun. 2011, pp. 273–281.
  9. C. Liu, L. Zhu, L. Li, and Y. Tan, “Fuzzy keyword search on encrypted  cloud storage data with small index,” in Proc. ICCCIS, Sep. 2011, pp. 269–273.
  10. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions,” in Proc. CCS, 2006, pp. 79–88.
  11. M. Kuzu, M. S. Islam, and M. Kantarcioglu, “Efficient similarity search over encrypted data,” in Proc. 28th IEEE Int. Conf. Data Eng., Washington, DC, USA, Apr. 2012, pp. 1156–1167.
  12. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword search over encrypted data in cloud computing,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1–5.
  13. Dr. Anna Saro Vijendran D. Nethra Pingala Suthishni "A Novel Approach for Intrusion Detection Using DSR Protocol in Mobile Ad hoc Networks" Journal of Advanced Research in Dynamical & Control Systems (JARDCS), VOLUME: 11.
  14. DR.K.PRABAVATHY K.S.SENTHILKUMAR "An Adaptive Scheme In Under Water Sensor Network With Eavarp-Clique "INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH MARCH 2020.
  15. E. Chandra Blessie, S. Gnanapriya "Robustious Feature Selection Based Genetic Algorithm (RFS-GA) For Cross Domain Opinion MINING", International Journal of Recent Technology and Engineering (IJRTE), ISSN: 2277-3878, Volume-8, Issue-2, July 2019.