Efficient Semantic Interrogation Scheme over Cryptographic Data in Cloud

Cloud based computing is a skill which provide communications for large scale storage of data, along with its refine and assigning. The security and retreat become main concern for uploading sensitive data without any information leak. This can be achieved by the cloud servers by integrating the encryption techniques into it, which becomes a major objection to guide the efficient keyword based questions and the encrypted data of the matching results. The searching can be an interrogation technique which is either based on a single keyword or multi-keyword as input. In this paper, a fresh algorithm known as Multi-Keyword Interrogation Scheme (MKIS) algorithm is recommended. It lessens the maintenance overhead to a greater scope when the keyword dictionary expansion occurs dynamically. The experimental results show that MKIS presents excellent performance when compared with the existing schemes. The proposed technique is presented in 2 aspects: many-keyword graded the look to attain exact look for output and meaning-based explore to maintain synonym questions. Search Terms— Cloud based computing, Multi-keyword interrogation, Data encryption, Security preserving, semantic grilling.

[1]  Kunal V. Raipurkar,et al.  Improve data security in cloud environment by using LDAP and two way encryption algorithm , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).

[2]  Shangping Wang,et al.  A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment , 2019, IEEE Access.

[3]  Jianfeng Ma,et al.  Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing , 2020, IEEE Transactions on Services Computing.

[4]  P. Pandiaraja,et al.  Efficient Multi-keyword Search over Encrypted Data in Untrusted Cloud Environment , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).

[5]  Saiful Islam,et al.  A Simple and Secured Cryptography System of Cloud Computing , 2019, 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE).

[6]  K. Vanitha,et al.  Preventing malicious packet dropping nodes in MANET using IFHM based SAODV routing protocol , 2018, Cluster Computing.

[7]  Mohammad Ali Akhaee,et al.  Secure and privacy preserving keyword searching cryptography , 2014, 2014 11th International ISC Conference on Information Security and Cryptology.

[8]  Chang Xue-Zhou,et al.  Network Data Encryption Strategy for Cloud Computing , 2015, 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation.

[9]  Xingming Sun,et al.  Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing , 2015, IEICE Trans. Commun..

[10]  Ming-Der Shieh,et al.  A Security Proxy to Cloud Storage Backends Based on an Efficient Wildcard Searchable Encryption , 2018, 2018 IEEE 8th International Symposium on Cloud and Service Computing (SC2).

[11]  D. Kishore Babu,et al.  PROTECTED STEADFAST DEDUPLICATION IN CROSSBREED CLOUD TECHNIQUE , 2018, 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on.

[12]  Vishal V. Mahale,et al.  Secure Data sharing in Distributed Cloud Environment , 2018, 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on.

[13]  Sanjay Jadhav,et al.  Confidentiality-conserving Multi-keyword Ranked Search Above Encrypted Cloud Data , 2016 .

[14]  Muttukrishnan Rajarajan,et al.  R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data , 2019, IEEE Access.

[15]  Amit Chaturvedi,et al.  A review of efficient data utilization schemes in cloud computing , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[16]  Xiangyang Zhu,et al.  A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data , 2017, 2017 3rd International Conference on Big Data Computing and Communications (BIGCOM).

[17]  Ling Liu,et al.  Searchable Encryption for Healthcare Clouds: A Survey , 2018, IEEE Transactions on Services Computing.

[18]  Yuansong Qiao,et al.  Chaotic Searchable Encryption for Mobile Cloud Storage , 2018, IEEE Transactions on Cloud Computing.

[19]  Aruna Guruvaya Mogarala,et al.  Security and Privacy Designs Based Data Encryption in Cloud Storage and Challenges: A Review , 2018, 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[20]  P. M. Chouragade,et al.  Systematic Hierarchy Based Secured Access Control in Cloud Storage , 2017, 2017 International Conference on Recent Trends in Electrical, Electronics and Computing Technologies (ICRTEECT).