CFP last date
20 December 2024
Reseach Article

Searching Techniques over Encrypted Cloud Data

by Azza A. Abdo, Shereen Saleh, Passent Elkafrawy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 50
Year of Publication: 2019
Authors: Azza A. Abdo, Shereen Saleh, Passent Elkafrawy
10.5120/ijca2019918676

Azza A. Abdo, Shereen Saleh, Passent Elkafrawy . Searching Techniques over Encrypted Cloud Data. International Journal of Computer Applications. 181, 50 ( Apr 2019), 25-30. DOI=10.5120/ijca2019918676

@article{ 10.5120/ijca2019918676,
author = { Azza A. Abdo, Shereen Saleh, Passent Elkafrawy },
title = { Searching Techniques over Encrypted Cloud Data },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2019 },
volume = { 181 },
number = { 50 },
month = { Apr },
year = { 2019 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number50/30500-2019918676/ },
doi = { 10.5120/ijca2019918676 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:09:45.366015+05:30
%A Azza A. Abdo
%A Shereen Saleh
%A Passent Elkafrawy
%T Searching Techniques over Encrypted Cloud Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 50
%P 25-30
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, large amount of data can be stored in the cloud. To preserve the secrecy of the data, the data must be encrypted. Encryption techniques play a major role when data are outsourced to the cloud, so that only the authenticated users can access. This study focuses on different searching techniques over the encrypted data in cloud. In this paper a comparison between different kinds searchable encryption techniques according to the features of multiple keyword, amount of scale data, search complexity, accuracy, and, amount of storage.

References
  1. S. Zhang, X.Chen, and S.Wu: Analysis and Research of Cloud Computing instance, second International Conference on Future Network, China, IEEE, pp. 88-92, (2010).
  2. C.Gong , J.Liu , Q.Zhang , H.Chen , and Z.Gong :The Characteristics of Cloud Computing, 39th International Conference on Parallel Processing Workshops,pp. 275-279,(2010).
  3. S. Zhang, X.Chen, and S.Wu: Analysis and Research of Cloud Computing instance, second International Conference on Future Network, China, IEEE, pp. 88-92, (2010).
  4. C.Gong , J.Liu , Q.Zhang , H.Chen , and Z.Gong :The Characteristics of Cloud Computing, 39th International Conference on Parallel Processing Workshops,pp. 275-279,(2010).
  5. D.Song, D.Wagner, and A.Perrig :Practical Techniques for Searches on Encrypted Data, In Proc. Of IEEE Symposium on Security and Privacy ,pp. 44-55,(2000).
  6. E-J.Goh :Secure indexes, In Cryptology ePrint Archive on October 7th, pp. 1-18,(2003).
  7. D.Boneh, G.Di Crescenzo, R.Ostrovsky, and G.Persiano :Public Key Encryption with Keyword Search, In Proc. Of Euro Crypto’04, pp. 506-522,(2004).
  8. G.Duntao, H.Dawei, C.Haibin, and Y.Xiaoyuan :A new Public Key Encryption with Temporary Keyword Search, In International Conference on computer, Mechatronics, Control and Electronic Engineering(CMCE), (volume:4), pp.80-83,(2010).
  9. R.Curtmola, J.A.Garay, S.Kamara, and R.Ostrovsky :Searchable Symmetric Encryption: improved definitions and efficient constructions, In Proc. Of ACM CCS, pp. 79-88,(2006).
  10. Q.Liu, G.Wang, J.Wu :Secure and Privacy Preserving Keyword Searching for Cloud Storage Services , Journal of Network and Computer Applications, (volume:35),pp 927-933,(2011).
  11. B.Long, D.Gu,N.Ding, and H.Lu :On Improving the Performance of Public Key Encryption with Keyword Search , International Conference on Cloud and Service Computing(CSC), pp. 143-147,(2012).
  12. C.Wang, K.Ren, S.Yu, K.Mahendra, and R.Urs, :Achieving Usable and Privacy-assured Similarity Search over Outsourced Cloud Data , In Proc. IEEE INFOCOM , pp. 451-459,(2012).
  13. F.Tseng , R.Chen ,and B.lin: iPEKS : Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search, In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom) , pp. 452-458 ,(2013).
  14. S. Raghavendra, K. Meghana, P. A. Doddabasappa, C. M. Geeta, Rajkumar Buyya , K. R. Venugopal ,S.S.Iyengar and L.M.Patnaik: Index Generation and Secure Multi-User Access Control over an Encrypted Cloud Data. Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016).
  15. C.Liu, L.Zhu and J.Chen: Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud, Journal of Network and Computer Applications, Volume 86, 15 May 2017, Pages 3-14.
  16. N.Rahim, J.Ahmad, K.Muhammad, A-Kumar.Sangaiah and S-Wook.Baik: Privacy-preserving image retrieval for mobile devices with deep features on the cloud, Computer Communications, Volume 127, September 2018, Pages 75-85.
  17. J.Li , Q.Wang , N.Cao , K.Ren , and W.Lou :Fuzzy Keyword Search over Encrypted Data in Cloud Computing , In Proc. IEEE INFOCOM , pp. 1-5,(2010).
  18. C.Liu,L.Zhu,L.Li,and Y.Tan: Fuzzy Keyword Search on Encrypted Cloud Storage Data with Small Index, In IEEE International Conference on Cloud Computing and Intelligence Systems(CCIS) ,pp. 269-273,(2011).
  19. J.Wang, X.Chen, H.Ma, Q.Tang, and J.Li: A Verifiable Fuzzy Keyword Search Scheme over Encrypted Data, Journal of Internet Services and Information Security(JISIS) ,pp.49-58,(2013).
  20. W.Zhou , L.Liu , H.Jing , C.Zhang , S.Yao , and S.Wan :K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing , Journal of Software Engineering and Applications, pp. 29-32,(2013).
  21. X-jin SHI and S-ping HU, Fuzzy Multi-Keyword Query on Encrypted Data in the Cloud. 2016 4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, Cloud Computing, Data Science & Engineering.
  22. M A-Manazir Ahsan, F-Z.Chowdhury, M.Sabilah, A- W- Bin Abdul Wahab, and M –Y- Idna Bin Idris: An efficient fuzzy keyword matching technique for searching through encrypted cloud data, 2017 International Conference on Research and Innovation in Information Systems (ICRIIS).
  23. X. Ge , J.Yu , C.Hu , H.Zhang and R.Hao: Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing, IEEE Access ( Volume: 6 ) August 2018, Pages 45725 – 45739.
  24. P.Golle, J.Staddon, and B.R.Waters :Secure Conjunctive Keyword Search over Encrypted Data, In Proc. Of ACNS, pp. 31-45,(2004).
  25. N.M, and L.P :Improving the Efficiency of Data Retrieval in Secure Cloud , Advances in communication,network, and computing lecture notes of the institute for computer sciences, social informatics and telecommunications engineering ,pp. 238-241,(2012).
  26. J.Yu, J.Li, X.Wang, and W.Gao :Conjunctive Fuzzy Keyword Search over Encrypted Data in Cloud Computing ,TELKOMNIKA Indonesian Journal of Electrical Engineering , pp. 2104-2109,(2014).
  27. MB.Smithamol and R.Sridhar: PECS: Privacy Enhanced Conjunctive Search over Encrypted Data in the Cloud Supporting Parallel Search, Computer Communications, Volume 126, August 2018, Pages 50-63.
  28. C.Wang , N.Cao , J.Li , K.Ren , and W.Lou :Secure Ranked Keyword Search over Encrypted Cloud Data , In IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 253-262 , (2010).
  29. N.Cao , C.Wang , M.Li , K.Ren , and W.Lou :Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data, In Proc. IEEE INFOCOM , pp. 829-837 (2011).
  30. Z.Xu , W.Kang , R.Li , K.Yow , and CH-Zhong.Xu :Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud , IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS), pp. 244-251,(2012).
  31. P.Lu, J.Yu, X.Dong, G.Xue, and M.Li :Privacy- a ware Multi-keyword Top-k search over Untrust Data Cloud, In IEEE 18th international conference on Parallel and distributed systems(ICPADS), pp. 252-259,(2012).
  32. C.Yang, W.Zhang, J.Xu, and N.Yu : A fast privacy-preserving multi-keyword search scheme on cloud data, International Conference on Cloud and Service Computing (CSC), pp. 104-110,(2012) .
  33. K.Sengoden, and S.Paul : Improving the Efficiency of Ranked Keyword Search over Cloud Data, International Journal of Advanced Research in Computer Engineering &Technology(IJARCET) , pp. 881-883,(2013) .
  34. C.Orencik , M.Kantarcioglu , and E.Savas :A practical and Secure Multi-Keyword Search Method over Encrypted Cloud Data, IEEE sixth International Conference on Cloud Computing(CLOUD) , pp. 390-397,(2013) .
  35. B.Wang,S.Yu,W.Lou,and Y.Hou :Privacy Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud , IEEE INFOCOM ,IEEE Conference on Computer Communications , pp. 2112-2120,(2014).
  36. H.Poon, and A.Miri: Alow Storage Phase Search Scheme based on Bloom Filters for Encrypted Cloud Services, IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 253-259,(2015).
  37. X. Jiang J. Yu J. Yan, and R. Hao: Enabling Efficient and Verifiable Multi-keyword Ranked Search over Encrypted Cloud Data, Information Sciences,Volumes 403–404, September 2017, Pages 22-41.
  38. Y.Miao, J.Weng, X.Liu, K-Raymond.Choo, Z.Liu and H.Li: enabling verifiable multiple keywords search over encrypted cloud data, Information SciencesVolume 465, October 2018, Pages 21-37.
  39. Z.Fu , X.Sun , L.N , and L.Zhou :Achieving Effective Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query, In IEEE Transactions on Consumer Electronic , pp. 164-172,(2014) .
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Ranked search Fuzzy search Conjunctive search Multi-keyword search Semantic search.