Performance Study of Cryptography based Dynamic Multi-Keyword Searchable Security Algorithm in Cloud Using CRSA /B+ Tree

α
Prasanna B T
Prasanna B T
σ
C B Akki
C B Akki BE, M.Tech(CST), PhD
α Visvesvaraya Technological University

Send Message

To: Author

Performance Study of Cryptography based Dynamic Multi-Keyword Searchable Security Algorithm in Cloud Using CRSA /B+ Tree

Article Fingerprint

ReserarchID

CSTNWSFJ7T0

Performance Study of Cryptography based Dynamic Multi-Keyword Searchable Security Algorithm in Cloud Using CRSA /B+ Tree Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Today, Cloud computing is a buzz word in IT industry. Cloud, a shared pool of computing resources, allows access to needed resources on demand through internet and web applications. Since data is outsourced to third party, user needs to maintain the accountability of their data in cloud. Hence preserving the confidentiality and securing the sensitive data in cloud is a major concern. Many cryptographic techniques have been proposed by researchers to assure the confidentiality of the user’s data in cloud. But, the challenging task is to provide the secure search over this preserved data which has been encrypted so as to retrieve the effective data. Hence, we are proposing a system to have a secure search over the encrypted data on the cloud which preserves its confidentiality. In our system, a noble approach has been made using the Commutative-RSA algorithm, a cryptographic technique where the dual encryption takes place thus reducing the overall computation overhead. The search operation over the encrypted data is based on the tree search algorithm which supports multi-keyword search. Based on the relevance score, the more appropriate data is retrieved on the search operation. Using this approach, the information is not leaked when the encrypted data is searched by users and also the queries are handled in an efficient way. Finally, we demonstrate the effectiveness and efficiency of the proposed schemes through extensive experimental evaluation.

References

25 Cites in Article
  1. M Armbrust (2009). Above the Clouds: A Berkeley View of Cloud Computing.
  2. Seny Kamara,Kristin Lauter (2010). Cryptographic Cloud Storage.
  3. A Singhal (2001). Modern information retrieval: A brief overview.
  4. (2009). Security Guidance for Critical Areas of Focus in Cloud Computing.
  5. R Brinkman (2007). Searching in encrypted data.
  6. Ning Cao,Cong Wang,Ming Li,Kui Ren,Wenjing Lou (2014). Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data.
  7. Dawn Xiaoding,Song Wagner,D Perrig,A (2000). Practical techniques for searches on encrypted data.
  8. Jin Li,Qian Wang,Cong Wang,Ning Cao,Kui Ren,Wenjing Lou (2010). Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
  9. M Li (2011). Authorized Private Keyword Search over Encrypted Data in Cloud Computing.
  10. Dan Boneh,Giovanni Di Crescenzo,Rafail Ostrovsky,Giuseppe Persiano (2004). Public Key Encryption with Keyword Search.
  11. Cong Wang,Ning Cao,Jin Li,Kui Ren,Wenjing Lou (2010). Secure Ranked Keyword Search over Encrypted Cloud Data.
  12. Wenjun Lu; Varna,A,Min Wu (2014). Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization.
  13. Wai Wong,David Wai-Lok Cheung,Ben Kao,Nikos Mamoulis (2009). Secure kNN computation on encrypted databases.
  14. Kui Ren,Cong Wang,Qian Wang (2012). Security Challenges for the Public Cloud.
  15. Zhangjie Fu (2013). Multikeyword Ranked Search Supporting Synonym Query over Encrypted Data in Cloud Computing.
  16. Reza Curtmola,Juan Garay,Seny Kamara,Rafail Ostrovsky (2006). Searchable symmetric encryption.
  17. P Naresh,K Pavan Kumar,D Shareef (2013). Implementation of Secure Ranked Keyword Search by Using RSSE.
  18. Sahin Buyrukbilen,Spiridon Bakiras (2013). Privacy-Preserving Ranked Search on Public-Key Encrypted Data.
  19. B Bloom (1970). Space/time trade-offs in hash coding with allowable errors.
  20. Craig Gentry,Zulfikar Ramzan (2005). Single-Database Private Information Retrieval with Constant Communication Rate.
  21. Y Hou,H Li,W Lou,W Sun (2014). Privacypreserving keyword search over encrypted data in cloud computing, Insecure Cloud computing.
  22. Wenhai Sun,Bing Wang,Ning Cao,Ming Li,Wenjing Lou,Y Hou,Hui Li (2013). Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
  23. B Prasanna,C Akki (2014). A Survey on Homomorphic and Searchable Encryption Security Algorithms for Cloud Computing.
  24. B Prasanna,C Akki (2014). A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing.
  25. H Prakash (2011). Multimodal Biometric Recognition: Fusion of Modified Adaptive Bilinear Interpolation Data Samples of Face and Signature using Local Binary Pattern Features.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Prasanna B T. 2015. \u201cPerformance Study of Cryptography based Dynamic Multi-Keyword Searchable Security Algorithm in Cloud Using CRSA /B+ Tree\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 15 (GJCST Volume 15 Issue E1): .

Download Citation

Issue Cover
GJCST Volume 15 Issue E1
Pg. 17- 28
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
C.2.0
Version of record

v1.2

Issue date

March 25, 2015

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 8407
Total Downloads: 2188
2026 Trends
Related Research

Published Article

Today, Cloud computing is a buzz word in IT industry. Cloud, a shared pool of computing resources, allows access to needed resources on demand through internet and web applications. Since data is outsourced to third party, user needs to maintain the accountability of their data in cloud. Hence preserving the confidentiality and securing the sensitive data in cloud is a major concern. Many cryptographic techniques have been proposed by researchers to assure the confidentiality of the user’s data in cloud. But, the challenging task is to provide the secure search over this preserved data which has been encrypted so as to retrieve the effective data. Hence, we are proposing a system to have a secure search over the encrypted data on the cloud which preserves its confidentiality. In our system, a noble approach has been made using the Commutative-RSA algorithm, a cryptographic technique where the dual encryption takes place thus reducing the overall computation overhead. The search operation over the encrypted data is based on the tree search algorithm which supports multi-keyword search. Based on the relevance score, the more appropriate data is retrieved on the search operation. Using this approach, the information is not leaked when the encrypted data is searched by users and also the queries are handled in an efficient way. Finally, we demonstrate the effectiveness and efficiency of the proposed schemes through extensive experimental evaluation.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Performance Study of Cryptography based Dynamic Multi-Keyword Searchable Security Algorithm in Cloud Using CRSA /B+ Tree

Prasanna B T
Prasanna B T Visvesvaraya Technological University
C B Akki
C B Akki

Research Journals