Hierarchical Multi-Keyword Ranked search for secured document retrieval in public clouds

For providing efficient data security, sensitive data has to be doubly encrypted in public clouds. Recent approaches to perform the two layer encryption the data owners carry out coarse grained encryption, whereas the cloud implements a fine-grained encryption on top of the owner encrypted data. But in this for searchable encryption points, it was done using Plaintext keyword search or Single keyword search or Boolean keyword search. When large amount of data users and documents in the cloud taken into concern, it is necessary to allow multiple keywords in the search request and return documents in the order of their relevance to these keywords. In this paper, for the first time, we define and solve the problem of privacy preserving and data retrieval from encrypted data in public clouds by Double Layer Encryption (DLE) and Hierarchical Multi-Keyword Ranked Search schema (HMRS). Through these two concepts our system assures the confidentiality of the data with ranking and secures the privacy of users from the cloud. On the real-world it shows proposed schemes indeed introduce fast retrieval, more security and less cost in computation and communication in Public Cloud.

[1]  Pil Joong Lee,et al.  Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System , 2007, Pairing.

[2]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[3]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[4]  Lucas Ballard,et al.  Achieving Efficient Conjunctive Keyword Searches over Encrypted Data , 2005, ICICS.

[5]  Elisa Bertino,et al.  Privacy Preserving Delegated Access Control in Public Clouds , 2014, IEEE Transactions on Knowledge and Data Engineering.

[6]  Ann Q. Gates,et al.  TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING , 2005 .

[7]  Elaine Shi,et al.  Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..

[8]  Cong Wang,et al.  Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[9]  Elisa Bertino,et al.  A privacy-preserving approach to policy-based content dissemination , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[10]  Sushil Jajodia,et al.  Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.

[11]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[12]  Elisa Bertino,et al.  Towards privacy preserving access control in the cloud , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[13]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[14]  Cong Wang,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[15]  Rafail Ostrovsky,et al.  Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.

[16]  Brent Waters,et al.  Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.

[17]  Michael Mitzenmacher,et al.  Privacy Preserving Keyword Searches on Remote Encrypted Data , 2005, ACNS.

[18]  Ann Q. Gates,et al.  TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS , 2005 .

[19]  M. Bellare,et al.  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.

[20]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.