Skip to main content

An Efficient Multi-keyword Text Search Over Outsourced Encrypted Cloud Data with Ranked Results

  • Conference paper
  • First Online:
Computational Intelligence in Data Mining

Abstract

Cloud computing offers efficient deployment options that motivate large enterprises to outsource the data to the cloud. However, outsourcing sensitive information may compromise the privacy of the data. To enable keyword-based search over encrypted data, we proposed a multi-keyword search scheme on a tree-based encrypted index data structure to retrieve information from encrypted cloud data. In this model, the document collection is clustered using a hierarchical k-means method. A vector space model was used to create an encrypted index and query vectors, and a depth-first search algorithm is proposed for efficient search mechanism. The results were ranked based on relevance score between the encrypted index and query vectors. Rigorous experiments show the performance and efficiency of the proposed methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Song, D.X., D. Wagner, and A. Perrig,: Practical techniques for searches on encrypted data. In Proceedings IEEE Symposium on Security & Privacy, 2000, pp. 44–55.

    Google Scholar 

  2. Goh, E.-J.: Secure Indexes. IACR Cryptology ePrint Archive, Vol. 2003, p. 216, 2003.

    Google Scholar 

  3. Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable Symmetric Encryption: Improved definitions and efficient constructions. In Proc. 13th ACM Conf. Computer and Communications Security, 2006, pp. 79–88.

    Google Scholar 

  4. Li, J., Wang, Q., Wang, C., Cao, N., Ren, R., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In IEEE Proceedings INFOCOM, 2010, pp. 1–5.

    Google Scholar 

  5. Kuzu, M., Islam, M. S., Kantarcioglu, M.: Efficient similarity search over encrypted data. In Proceedings IEEE 28th International Conference on Data Engineering, 2012, pp. 1156–1167.

    Google Scholar 

  6. Wang, C., Ren, K., Yu, S., Urs, K. M. R.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In Proceedings IEEE INFOCOM, 2012, pp. 451–459.

    Google Scholar 

  7. Wang, B., Yu, S., Lou, W., Hou, Y. T.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In Proceedings IEEE INFOCOM, 2014, pp. 2112–2120.

    Google Scholar 

  8. Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure Ranked Keyword Search over Encrypted Cloud Data. In Proceedings IEEE 30th International Conference Distributed Computing Systems (ICDCS 2010), 2010, pp. 253–262.

    Google Scholar 

  9. Wang, C., Cao, N., Ren, K., Lou, W.: Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data. IEEE Transaction on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1467–1479, 2012.

    Article  Google Scholar 

  10. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In Proceedings IEEE INFOCOM, 2011, pp. 829–837.

    Google Scholar 

  11. Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y. T., Li, H.: Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In Proceedings 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, 2013, pp. 71–82.

    Google Scholar 

  12. Orencik, C., Kantarcioglu, M., Savas, E.: A practical and secure multi-keyword search method over encrypted cloud data. In Proceedings IEEE 6th International Conference on Cloud Computing, 2013, pp. 390–397.

    Google Scholar 

  13. Zhang, W., Xiao, S., Lin, Y., Zhou, T., Zhou, S.: Secure ranked multi-keyword search for multiple data owners in cloud computing. In Dependable Systems and Networks (DSN), IEEE 44th Annual IEEE/IFIP International Conference, 2014, pp. 276–286.

    Google Scholar 

  14. Pang, H., Shen, J., Krishnan, R.: Privacy-preserving similarity-based text retrieval. ACM Transactions on Internet Technology, Vol. 10, no. 1, p. 4, 2010.

    Article  Google Scholar 

  15. Xia, Z., Wang, X., Sun, X., Wang, Q.: A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340–352, February 2016.

    Article  Google Scholar 

  16. Wong, W.K., Cheung, D.W.-L., Kao, B., Mamoulis, N.: Secure KNN computation on encrypted databases. In Proceedings of ACM SIGMOD International Conference on Management of Data, pp. 139–152, June 2009.

    Google Scholar 

  17. Steinbach, M., Karypis, G., Kumar, V.: A Comparison of Document Clustering Techniques. In KDD Workshop on Text Mining, vol. 400, no. 1, pp. 525–526, August 2000.

    Google Scholar 

  18. Manning, C.D., Raghavan, P., Schutze, H.: Introduction to Information Retrieval. Cambridge, UK, Cambridge University Press, 2008.

    Google Scholar 

  19. Zerr, S., Olmedilla, D., Nejdl, W., Siberski, W.: Zerber + r: Top-k retrieval from a confidential index. In Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, pp. 439–449, 2009.

    Google Scholar 

  20. BBC Datasets [Online]. Available: http://mlg.ucd.ie/datasets/bbc.html.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prabhat Keshari Samantaray .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Samantaray, P.K., Randhawa, N.K., Pati, S.L. (2019). An Efficient Multi-keyword Text Search Over Outsourced Encrypted Cloud Data with Ranked Results. In: Behera, H., Nayak, J., Naik, B., Abraham, A. (eds) Computational Intelligence in Data Mining. Advances in Intelligent Systems and Computing, vol 711. Springer, Singapore. https://doi.org/10.1007/978-981-10-8055-5_4

Download citation

Publish with us

Policies and ethics