Privacy-preserving multi-keyword hybrid search over encrypted data in cloud

Data outsourcing to the cloud is gaining popularity day by day in cloud computing. It requires a dynamic architecture that avoids loopholes and stops intruders from entering the cloud environment. To retrieve the enciphered documents from the cloud, the latest technique that is enrolled effectively...

Full description

Saved in:
Bibliographic Details
Main Authors: Singh, N., Kumar, J., Singh, A.K., Mohan, A.
Format: Article
Published: Springer Science and Business Media Deutschland GmbH 2022
Online Access:http://scholars.utp.edu.my/id/eprint/33952/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130814564&doi=10.1007%2fs12652-022-03889-8&partnerID=40&md5=6248d9e86ad8f9817a53cdcd5c92471c
Tags: Add Tag
No Tags, Be the first to tag this record!
id oai:scholars.utp.edu.my:33952
record_format eprints
spelling oai:scholars.utp.edu.my:339522022-12-20T03:53:48Z http://scholars.utp.edu.my/id/eprint/33952/ Privacy-preserving multi-keyword hybrid search over encrypted data in cloud Singh, N. Kumar, J. Singh, A.K. Mohan, A. Data outsourcing to the cloud is gaining popularity day by day in cloud computing. It requires a dynamic architecture that avoids loopholes and stops intruders from entering the cloud environment. To retrieve the enciphered documents from the cloud, the latest technique that is enrolled effectively is multi-keyword fuzzy search. The proposed research work uses this technique along with the n-gram corpus algorithm that helps to achieve relevancy score and sub-linear search time. This algorithmic combination is able to predict the privacy ranking measure of the retrieved data. To validate the opposed approach, simulation analysis has been performed to preserve user-oriented privacy in a cloud environment. The ranking precision of the proposed method is compared with (Fu et al. in IEEE Trans Inf Forensics Secur 12(8):1874�1884. https://doi.org/10.1109/TIFS.2017.2692728, 2017) which uses a stemming algorithm and a matching algorithm based on the inner product. The results express the efficiency of the proposed approach by showing a relative improvement in security precision up to 55. © 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature. Springer Science and Business Media Deutschland GmbH 2022 Article NonPeerReviewed Singh, N. and Kumar, J. and Singh, A.K. and Mohan, A. (2022) Privacy-preserving multi-keyword hybrid search over encrypted data in cloud. Journal of Ambient Intelligence and Humanized Computing. ISSN 18685137 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130814564&doi=10.1007%2fs12652-022-03889-8&partnerID=40&md5=6248d9e86ad8f9817a53cdcd5c92471c 10.1007/s12652-022-03889-8 10.1007/s12652-022-03889-8 10.1007/s12652-022-03889-8
institution Universiti Teknologi Petronas
building UTP Resource Centre
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Petronas
content_source UTP Institutional Repository
url_provider http://eprints.utp.edu.my/
description Data outsourcing to the cloud is gaining popularity day by day in cloud computing. It requires a dynamic architecture that avoids loopholes and stops intruders from entering the cloud environment. To retrieve the enciphered documents from the cloud, the latest technique that is enrolled effectively is multi-keyword fuzzy search. The proposed research work uses this technique along with the n-gram corpus algorithm that helps to achieve relevancy score and sub-linear search time. This algorithmic combination is able to predict the privacy ranking measure of the retrieved data. To validate the opposed approach, simulation analysis has been performed to preserve user-oriented privacy in a cloud environment. The ranking precision of the proposed method is compared with (Fu et al. in IEEE Trans Inf Forensics Secur 12(8):1874�1884. https://doi.org/10.1109/TIFS.2017.2692728, 2017) which uses a stemming algorithm and a matching algorithm based on the inner product. The results express the efficiency of the proposed approach by showing a relative improvement in security precision up to 55. © 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
format Article
author Singh, N.
Kumar, J.
Singh, A.K.
Mohan, A.
spellingShingle Singh, N.
Kumar, J.
Singh, A.K.
Mohan, A.
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
author_facet Singh, N.
Kumar, J.
Singh, A.K.
Mohan, A.
author_sort Singh, N.
title Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
title_short Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
title_full Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
title_fullStr Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
title_full_unstemmed Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
title_sort privacy-preserving multi-keyword hybrid search over encrypted data in cloud
publisher Springer Science and Business Media Deutschland GmbH
publishDate 2022
url http://scholars.utp.edu.my/id/eprint/33952/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130814564&doi=10.1007%2fs12652-022-03889-8&partnerID=40&md5=6248d9e86ad8f9817a53cdcd5c92471c
_version_ 1753790759105986560
score 13.214268