Enhanced Security Strategy over Secure Multicast Ranked Search in Secure Cloud Data

International Journal of Computer Science and Engineering
© 2015 by SSRG - IJCSE Journal
Volume 2 Issue 11
Year of Publication : 2015
Authors : T.Lava Kumar, B.Bharath Kumar

pdf
How to Cite?

T.Lava Kumar, B.Bharath Kumar, "Enhanced Security Strategy over Secure Multicast Ranked Search in Secure Cloud Data," SSRG International Journal of Computer Science and Engineering , vol. 2,  no. 11, pp. 1-5, 2015. Crossref, https://doi.org/10.14445/23488387/IJCSE-V2I11P101

Abstract:

Cloud Computing is the emerging technology in the Data Services platform. The networked systems that connected through the systematic nature for the cloud interpretation from the client level to the cloud level usage defines with the ranked search methodology called as Multi- Keyword Ranked Search (MRSE), the security level in the multicast ranked search remains unhold due to various extrinsic attacks that causes the information lose. To prevent this attack, we propose a Dynamic Security Strategy (DSS) through which the entire information which is placed inside the cloud storage is set to be secure. The proposed scheme Security Enhanced Multi-Keyword Ranked Search (SMRSE) gives the total forecast information through which the Multi-Keyword ranked search done with BTree operation. The Experimental Results shows the proposed scheme is highly recommended alternate for the search schemes.

Keywords:

Multi- Keyword Ranked Search (MRSE), Dynamic Security Strategy (DSS), Security Enhanced Multi-Keyword Ranked Search (SMRSE).

References:

[1] Y. Hwang and P. Lee, “Public Key Encryption with ConjunctiveKeyword Search and Its Extension to a Multi-User System,”Pairing,vol. 4575, pp. 2-22, 2007.
[2] J. Katz, A. Sahai, and B. Waters, “Predicate Encryption SupportingDisjunctions, Polynomial Equations, and Inner Products,”Proc.27th Ann. Int’l Conf. Theory and Applications of CryptographicTechniques (EUROCRYPT),2008.
[3] A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters,“Fully Secure Functional Encryption: Attribute-Based Encryptionand (Hierarchical) Inner Product Encryption,” Proc. 29th Ann.Int’l Conf. Theory and Applications of Cryptographic Techniques(EUROCRYPT ’10), 2010.
[4] E. Shen, E. Shi, and B. Waters, “Predicate Privacy in EncryptionSystems,” Proc. Sixth Theory of Cryptography Conf. Theory ofCryptography (TCC),2009.
[5] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized Private KeywordSearch over Encrypted Data in Cloud Computing,” Proc. 31stInt’l Conf. Distributed Computing Systems (ICDCS ’10), pp. 383-392, June 2011.
[6] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure RankedKeyword Search over Encrypted Cloud Data,”Proc. IEEE 30th Int’lConf. Distributed Computing Systems (ICDCS ’10),2010.
[7] C. Wang, N. Cao, K. Ren, and W. Lou, “Enabling Secure andEfficient Ranked Keyword Search over Outsourced Cloud Data,”IEEE Trans. Parallel and Distributed Systems,vol. 23, no. 8, pp. 1467-1479, Aug. 2012.232
[8] W.K. Wong, D.W. Cheung, B. Kao, and N. Mamoulis, “SecurekNN Computation on Encrypted Databases,” Proc. 35th ACMSIGMOD Int’l Conf. Management of Data (SIGMOD),pp. 139-152,2009.
[9] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable,and Fine-Grained Data Access Control in Cloud Computing,”Proc. IEEE INFOCOM,2010.
[10] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy- PreservingPublic Auditing for Data Storage Security in Cloud Computing,”Proc. IEEE INFOCOM,2010.
[11] S. Zerr, E. Demidova, D. Olmedilla, W. Nejdl, M. Winslett, andS. Mitra, “Zerber: r-Confidential Indexing for DistributedDocuments,”Proc. 11th Int’l Conf. Extending Database Technology(EDBT ’08), pp. 287-298, 2008.
[12] S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r: Top-kRetrieval from a Confidential Index,” Proc. 12th Int’l Conf.Extending Database Technology (EDBT ’09),pp. 439-449, 2009.
[13] Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, “Cryptography from Anonymity,”Proc. IEEE 47th Ann. Symp. Foundationsof CS,pp. 239-248, 2006.
[14] J. Zobel and A. Moffat, “Exploring the Similarity Space,” ACMSIGIR Forum,vol. 32, pp. 18-34, 1998.
[15] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secureand Dependable Storage Services in Cloud Computing,” IEEETrans. Services Computing,vol. 5, no. 2, pp. 220-232, Apr.- June 2012.
[16] W.W. Cohen, “Enron Email Data Set,” http://www.cs.cmu.edu/~enron/, 2013.