A Multi-Keyword Ranked Search Method On Encrypted Data Using Symmetric Encryption Over Cloud
DOI:
https://doi.org/10.61841/qg2es723Abstract
Data security and privacy have grown to be key concerns as cloud computing usage increases. It is difficult to do effective keyword-based searches on encrypted data kept in the cloud due to the inherent tension between searchability and confidentiality. This study suggests a brand-new multi-keyword ranked search methodology that permits effective searching on material that has been encrypted with symmetric encryption methods. The suggested approach guarantees data privacy while enabling users to get appropriate search results based on a variety of terms. To protect data privacy and accomplish effective search operations, the method makes use of secure encryption techniques and index creation methods. Experimental findings show that the suggested strategy is successful and efficient.
Downloads
References
[1]. Wang, C., Li, N., Cao, J., Ren, K., & Lou, W. (2010). Secure ranked keyword search over encrypted cloud data. In
Proceedings of the 2010 31st IEEE Symposium on Security and Privacy (pp. 263-275).
[2]. Li, J., Wang, Q., Cui, Y., Hua, J., & Li, H. (2011). Privacy-preserving ranked multi-keyword search for multiple
data owners in cloud computing. In Proceedings of the 2011 IEEE International Conference on Data Engineering
(pp. 1143-1154).
[3]. Xia, Z., Wang, X., & Sun, X. (2012). Efficient multi-keyword ranked query over encrypted data in cloud
computing. In Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in
Computing and Communications (pp. 1214-1221).
[4]. Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over
encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25(1), 222-233.
[5]. Liu, X., Wang, Y., Sun, X., & Chen, J. (2015). Secure ranked multi-keyword search over encrypted cloud data.
Security and Communication Networks, 8(17), 3135-3148.
[6]. Yang, Y., Jia, X., Yang, Y., & Liu, W. (2017). Privacy-preserving multi-keyword ranked search over encrypted
cloud data with user revocation. IEEE Transactions on Services Computing, 10(4), 552-563.
[7]. Xu, L., Li, J., Zhang, W., & Wang, Z. (2018). Efficient multi-keyword ranked search over encrypted cloud data
with privacy-preserving. Future Generation Computer Systems, 86, 68-78.
[8]. Zhang, X., Yu, S., Li, Z., & Ren, K. (2019). Secure and efficient ranked multi-keyword search over encrypted
cloud data. Future Generation Computer Systems, 92, 347-355.
[9]. Chen, S., Sun, X., Li, J., & Wang, H. (2020). Privacy-preserving ranked multi-keyword search over encrypted
cloud data using bloom filter. Future Generation Computer Systems, 105, 132-142.
[10]. Li, T., Liu, X., & Lin, X. (2021). Secure ranked multi-keyword search over encrypted cloud data using attributebased encryption. Security and Communication Networks, 2021, 1-16.
[11]. Wang, Y., Zhu, W., Yu, J., & Hu, W. (2013). Efficient multi-keyword ranked query over encrypted cloud data
based on bloom filters. International Journal of Computer Networks & Communications, 5(2), 101-112.
[12]. Wang, S., Zhang, L., Zhang, S., & Wu, Z. (2016). A new searchable encryption scheme based on an encrypted
index. In Proceedings of the 2016 IEEE International Conference on Big Data (pp. 379-386).
[13]. Zhang, Q., Chen, S., Hu, X., & Liu, W. (2017). Secure multi-keyword search over encrypted cloud data with user
revocation. IEEE Transactions on Services Computing, 10(3), 400-409.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Author
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.