Keyword Search Techniques over Encrypted Outsourcing Data

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2018 by IJETT Journal
Volume-65 Number-1
Year of Publication : 2018
Authors : Amira Sallam, Ahmed Moustafa, Ibrahim El-Henawy
DOI :  10.14445/22315381/IJETT-V65P205

Citation 

MLA Style: Amira Sallam, Ahmed Moustafa, Ibrahim El-Henawy "Keyword Search Techniques over Encrypted Outsourcing Data" International Journal of Engineering Trends and Technology 65.1 (2018): 20-24.

APA Style:Amira Sallam, Ahmed Moustafa, Ibrahim El-Henawy (2018). Keyword Search Techniques over Encrypted Outsourcing Data. International Journal of Engineering Trends and Technology, 65(1), 20-24.

Abstract
Cloud Computing Technology has been widely spread in many field, many institutions and individuals are needed to store their senistive data in cloud e.g.financial record, health records and personal information but these data must be private so it needed to encrypted before storing in cloud and needed to make search in this data .Thus achieving search over encrypted outsourced data becomes challanging problem.One of the most problem is finding effictivly similarty between keywords based on one technique of similarity measure. Typically, cloud server need to support with technique which helping to do keyword search over encrypted data correctly, take in consider achieving privacy ,accuracy and efficiency and storage cost .Many reaserches have been doing to solve this problem, we will covring different technique that used in keyword search over encrypted data.

Reference
[1] Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on parallel and distributed systems, 25(1):222–233, 2014.
[2] M Chuah andWHu. Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In Distributed Computing Systems Workshops (ICDCSW), 2011 31st International Conference on, pages 273–281. IEEE, 2011.
[3] Zhangjie Fu, Kui Ren, Jiangang Shu, Xingming Sun, and Fengxiao Huang. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE transactions on parallel and distributed systems, 27(9):2546–2559, 2016.
[4] Zhangjie Fu, Jiangang Shu, Xingming Sun, and Nigel Linge. Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Transactions on Consumer Electronics, 60(4):762–770, 2014.
[5] Zhangjie Fu, Xingming Sun, Zhihua Xia, Lu Zhou, and Jiangang Shu. Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing. In Performance Computing and Communications Conference (IPCCC), 2013 IEEE 32nd International, pages 1–8. IEEE, 2013.
[6] Zhangjie Fu, Lili Xia, Xingming Sun, Alex X Liu, and Guowu Xie. Semantic-aware searching over encrypted data for cloud computing. IEEE Transactions on Information Forensics and Security, 13(9):2359–2371, 2018.
[7] Eu-Jin Goh et al. Secure indexes. IACR Cryptology ePrint Archive, 2003:216, 2003.
[8] P Kalidas and R Chandrasekaran. Searchable encryption and fuzzy keyword search in cloud computing technology. International Journal, 3(7), 2013.
[9] Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou. Fuzzy keyword search over encrypted data in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1–5. IEEE, 2010.
[10] Jin Li, Qian Wang, Cong Wang, Ning Cao, Kui Ren, and Wenjing Lou. Fuzzy keyword search over encrypted data in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1–5. IEEE, 2010.
[11] S Raghavendra, S Girish, CM Geeta, Rajkumar Buyya, KR Venugopal, SS Iyengar, and LM Patnaik. Split keyword fuzzy and synonym search over encrypted cloud data. Multimedia Tools and Applications, 77(8):10135–10156, 2018.
[12] Dawn Xiaoding Song, DavidWagner, and Adrian Perrig. Practical techniques for searches on encrypted data. In Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on, pages 44–55. IEEE, 2000.
[13] Xingming Sun, Yanling Zhu, Zhihua Xia, and Lihong Chen. Privacy-preserving keyword-based semantic search over encrypted cloud data. International journal of Security and its Applications, 8(3):9–20, 2014.
[14] Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, and Xiaofeng Chen. A new efficient verifiable fuzzy keyword search scheme. JoWUA, 3(4):61–71, 2012.
[15] Wei Zhang, Sheng Xiao, Yaping Lin, Ting Zhou, and Siwang Zhou. Secure ranked multi-keyword search for multiple data owners in cloud computing. In Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on, pages 276–286. IEEE, 2014.
[16] Zhenjie Zhang, Marios Hadjieleftheriou, Beng Chin Ooi, and Divesh Srivastava. Bed-tree: an all-purpose index structure for string similarity search based on edit distance. In Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, pages 915–926. ACM, 2010.

Keywords
single encrypted keyword search,multi encrypted keyword search,cloud server,static search