Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
Data outsourcing to the cloud is gaining popularity day by day in cloud computing. It requires a dynamic architecture that avoids loopholes and stops intruders from entering the cloud environment. To retrieve the enciphered documents from the cloud, the latest technique that is enrolled effectively...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Published: |
Springer Science and Business Media Deutschland GmbH
2022
|
Online Access: | http://scholars.utp.edu.my/id/eprint/33952/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130814564&doi=10.1007%2fs12652-022-03889-8&partnerID=40&md5=6248d9e86ad8f9817a53cdcd5c92471c |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
oai:scholars.utp.edu.my:33952 |
---|---|
record_format |
eprints |
spelling |
oai:scholars.utp.edu.my:339522022-12-20T03:53:48Z http://scholars.utp.edu.my/id/eprint/33952/ Privacy-preserving multi-keyword hybrid search over encrypted data in cloud Singh, N. Kumar, J. Singh, A.K. Mohan, A. Data outsourcing to the cloud is gaining popularity day by day in cloud computing. It requires a dynamic architecture that avoids loopholes and stops intruders from entering the cloud environment. To retrieve the enciphered documents from the cloud, the latest technique that is enrolled effectively is multi-keyword fuzzy search. The proposed research work uses this technique along with the n-gram corpus algorithm that helps to achieve relevancy score and sub-linear search time. This algorithmic combination is able to predict the privacy ranking measure of the retrieved data. To validate the opposed approach, simulation analysis has been performed to preserve user-oriented privacy in a cloud environment. The ranking precision of the proposed method is compared with (Fu et al. in IEEE Trans Inf Forensics Secur 12(8):1874�1884. https://doi.org/10.1109/TIFS.2017.2692728, 2017) which uses a stemming algorithm and a matching algorithm based on the inner product. The results express the efficiency of the proposed approach by showing a relative improvement in security precision up to 55. © 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature. Springer Science and Business Media Deutschland GmbH 2022 Article NonPeerReviewed Singh, N. and Kumar, J. and Singh, A.K. and Mohan, A. (2022) Privacy-preserving multi-keyword hybrid search over encrypted data in cloud. Journal of Ambient Intelligence and Humanized Computing. ISSN 18685137 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130814564&doi=10.1007%2fs12652-022-03889-8&partnerID=40&md5=6248d9e86ad8f9817a53cdcd5c92471c 10.1007/s12652-022-03889-8 10.1007/s12652-022-03889-8 10.1007/s12652-022-03889-8 |
institution |
Universiti Teknologi Petronas |
building |
UTP Resource Centre |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Petronas |
content_source |
UTP Institutional Repository |
url_provider |
http://eprints.utp.edu.my/ |
description |
Data outsourcing to the cloud is gaining popularity day by day in cloud computing. It requires a dynamic architecture that avoids loopholes and stops intruders from entering the cloud environment. To retrieve the enciphered documents from the cloud, the latest technique that is enrolled effectively is multi-keyword fuzzy search. The proposed research work uses this technique along with the n-gram corpus algorithm that helps to achieve relevancy score and sub-linear search time. This algorithmic combination is able to predict the privacy ranking measure of the retrieved data. To validate the opposed approach, simulation analysis has been performed to preserve user-oriented privacy in a cloud environment. The ranking precision of the proposed method is compared with (Fu et al. in IEEE Trans Inf Forensics Secur 12(8):1874�1884. https://doi.org/10.1109/TIFS.2017.2692728, 2017) which uses a stemming algorithm and a matching algorithm based on the inner product. The results express the efficiency of the proposed approach by showing a relative improvement in security precision up to 55. © 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature. |
format |
Article |
author |
Singh, N. Kumar, J. Singh, A.K. Mohan, A. |
spellingShingle |
Singh, N. Kumar, J. Singh, A.K. Mohan, A. Privacy-preserving multi-keyword hybrid search over encrypted data in cloud |
author_facet |
Singh, N. Kumar, J. Singh, A.K. Mohan, A. |
author_sort |
Singh, N. |
title |
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud |
title_short |
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud |
title_full |
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud |
title_fullStr |
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud |
title_full_unstemmed |
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud |
title_sort |
privacy-preserving multi-keyword hybrid search over encrypted data in cloud |
publisher |
Springer Science and Business Media Deutschland GmbH |
publishDate |
2022 |
url |
http://scholars.utp.edu.my/id/eprint/33952/ https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130814564&doi=10.1007%2fs12652-022-03889-8&partnerID=40&md5=6248d9e86ad8f9817a53cdcd5c92471c |
_version_ |
1753790759105986560 |
score |
13.214268 |