CFP last date
20 January 2025
Reseach Article

A Survey on Multi-Keyword Ranked Search over Encrypted Cloud Data with Multile Data Owners

by Kalyani Sonawane, Rahul Dagade
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 162 - Number 11
Year of Publication: 2017
Authors: Kalyani Sonawane, Rahul Dagade
10.5120/ijca2017913393

Kalyani Sonawane, Rahul Dagade . A Survey on Multi-Keyword Ranked Search over Encrypted Cloud Data with Multile Data Owners. International Journal of Computer Applications. 162, 11 ( Mar 2017), 9-12. DOI=10.5120/ijca2017913393

@article{ 10.5120/ijca2017913393,
author = { Kalyani Sonawane, Rahul Dagade },
title = { A Survey on Multi-Keyword Ranked Search over Encrypted Cloud Data with Multile Data Owners },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 162 },
number = { 11 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume162/number11/27285-2017913393/ },
doi = { 10.5120/ijca2017913393 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:08:43.656086+05:30
%A Kalyani Sonawane
%A Rahul Dagade
%T A Survey on Multi-Keyword Ranked Search over Encrypted Cloud Data with Multile Data Owners
%J International Journal of Computer Applications
%@ 0975-8887
%V 162
%N 11
%P 9-12
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The promising benefit of cloud computing is outsourcing of data service, by which the data owners stores their data in the public data centers by economically saving their capital investment towards data management. Cloud Storage provides users with abundant storage space and makes it user friendly for immediate acquiring of data, which is the foundation of all kinds of cloud applications. Data outsourcing in the commercial public cloud also raise the problem for unauthorized data access and the cloud storage does not make sense if the outsourced data is not effectively utilized. The practical challenge is on how to make effective data access in the public cloud storage aiming at improvement of various searching techniques for increasing the data utilization. In this paper, an attempt is made to survey various searching techniques towards effective data utilization in cloud storage and is discussed in detail.

References
  1. Wei Zhang, Yaping Lin, Sheng Xiao, Jie Wu, Siwang Zhou, “Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing”, IEEE Transactions on Computers, Vol. 65, No. 5, May 2016.
  2. Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou, “Authorized Private Keyword Search over Encrypted Data in Cloud Computing”, 31st International Conference on Distributed Computing Systems, 2011.
  3. Cong Wang, Sherman S.M. Chow, Qian Wang, Kui Ren, Wenjing Lou, “Privacy-Preserving Public Auditing for Secure Cloud Storage”, IEEE Transactions on Computers, Vol. 62, No. 2, February 2013.
  4. Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li, “Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking”, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 11, November 2014.
  5. Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou, “Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data”, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 1, January 2014.
  6. Zhangjie Fu, Xingming Sun, Zhihua Xia, Lu Zhou, Jiangang Shu, “Multikeyword Ranked Search Supporting Synonym Query over Encrypted Data in Cloud Computing”, 2013.
  7. Zhangjie Fu, Xingming Sun, Nigel Linge, Lu Zhou, “Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query”, IEEE Transactions on Consumer Electronics, Vol. 60, No. 1, February 2014.
  8. Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li, “Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud”, IEEE Transactions on Parallel and Distributed Systems, Vol. 27, No. 4, April 2016.
  9. Zhangjie Fu, Jiangang Shu, Xingming Sun, Nigel Linge, “Smart Cloud Search Services: Verifiable Keyword-based Semantic Search over Encrypted Cloud Data”, IEEE Transactions on Consumer Electronics, Vol. 60, No. 4, November 2014.
  10. Zhihua Xia, Xinhui Wang, Xingming Sun, Qian Wang, “A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data”, IEEE Transactions on Parallel and Distributed Systems, Vol. 27, No. 2, February 2016.
  11. Hongwei Li, Yi Yang, Tom H. Luan, Xiaohui Liang, Liang Zhou, Xuemin (Sherman) Shen, “Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data”, IEEE Transactions on Dependable and Secure Computing, Vol. 13, No. 3, May/June 2016.
  12. Bing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou, “Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee”, 2015 IEEE Conference on Computer Communications(INFOCOM).
  13. Wenhai Sun, Xuefeng Liu, Wenjing Lou, Y. Thomas Hou, Hui Li, “Catch You If You Lie to Me: Efficient Verifiable Conjunctive Keyword Search over Large Dynamic Encrypted Cloud Data”, 2015 IEEE Conference on Computer Communications (INFOCOM).
  14. Hongwei Li, Dongxiao Liu, Kun Jia, Xiaodong Lin, “Achieving Authorized and Ranked Multi-keyword Search over Encrypted Cloud Data”, IEEE ICC 2015-Communication and Information Systems Security Symposium.
  15. Wei Zhang, Yaping Lin, “Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing”, VOL. 6, NO. 1, JANUARY 2015.
  16. R. Curtmola, J. A. Garay, S. Kamara, R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions”, In Proc. of ACM CCS 06, 2006.
  17. C. Wang, N. Cao, J. Li, K. Ren, W. Lou, “Secure ranked keyword search over encrypted cloud data”, in Proc. IEEE Distributed Computer System, Genoa, Italy, Jun. 2010, pp. 253262.
  18. Hongwei Li, Dongxiao Liu, Yuanshun Da11i, Tom H. Luan, Xuemin Shen, “Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage”, Transaction On Emerging Topics In Computing, 6 March, 2015.
  19. W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, “Secure kNN computation on encrypted databases”, in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2009, pp. 139-152.
  20. Zhangjie Fu, Kui Ren, Jiangang Shu, Xingming Sun, Fengxiao Huang, “Enabling Personalized Search Over Encrypted Outsourced Data With Efficiency Improvement”, IEEE Transactions on Parallel and Distributed Systems, Vol. 27, No. 9, September 2016.
  21. Dawn Xiaodong Song David Wagner Adrian Perrig, “Practical Techniques for Searches on Encrypted Data”, University of California, Berkeley.
  22. Shulan Wang, Junwei Zhou, Joseph K. Liu, Jianping Yu, Jianyong Chen, Weixin Xie, “An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing", IEEE Transactions on Information Forensics and Security, Vol. 11, No. 6, June 2016.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing data outsourcing cloud storage data utilization.