Analysis of the Challenges Involved in Efficient and Secure Ranked Multi- Keyword Search over Encrypted Cloud Data

Analysis of the Challenges Involved in Efficient and Secure Ranked Multi- Keyword Search over Encrypted Cloud Data

  IJETT-book-cover           
  
© 2023 by IJETT Journal
Volume-71 Issue-9
Year of Publication : 2023
Author : Sheenam Malhotra, Williamjeet Singh
DOI : 10.14445/22315381/IJETT-V71I9P218

How to Cite?

Sheenam Malhotra, Williamjeet Singh, "Analysis of the Challenges Involved in Efficient and Secure Ranked Multi- Keyword Search over Encrypted Cloud Data," International Journal of Engineering Trends and Technology, vol. 71, no. 9, pp. 186-211, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I9P218

Abstract
Current IT-based applications primarily use the concept of on-demand network access to satisfy their resource requirements. Cloud computing has emerged as the most viable platform for delivering the above service due to its cost-efficient and secure service delivery model. Due to this increasing reliance on on-demand resource access, the research community is paying exponentially increased attention towards optimizing the cloud along with improving the deployed security model. A massive amount of work has been done in this field by researchers in the past few years, as every technology has certain challenges associated with it. Although it is secure, it still demands more work to be done in the fields of security, resource management, traffic management, energy efficiency and data retrieval. This paper gives a review of research done in the field of secure and efficient retrieval of encrypted cloud data, which is the hottest area of research these days. The main contribution of this review is to get the gist of data retrieval systems over the cloud and to bring awareness about the contribution of various researchers in this emerging and challenging area. The paper also provides a secure three-tier encryption algorithm to encrypt the index and data over the cloud. For security, the paper focuses on searchable encryption schemes. For efficiency, it focuses on indexing techniques, searching strategies for single and multi-keyword search and ranking and retrieval methods for encrypted data over the cloud.

Keywords
Cloud computing, Searchable encryption, Multi-keyword search, Cloud storage, Document ranking and retrieval

References
[1] Lucas Ballard, SenyKamara, and Fabian Monrose, “Achieving Efficient Conjunctive Keyword Searches Over Encrypted Data,” International Conference on Information and Communications Security, vol. 3783, pp. 414-426, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Cong Wang et al., “Secure Ranked Keyword Search over Encrypted Cloud Data,” IEEE 30th International Conference on Distributed Computing Systems, pp. 253-262, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Jinbao Wang et al., “Indexing Multi-Dimensional Data in a Cloud System,” Proceedings of the International Conference on Management of Data, pp. 591-602, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Anna Squicciarini, Smitha Sundareswaran, and Dan Lin, “Preventing Information Leakage from Indexing in the Cloud,” IEEE 3rd International Conference on Cloud Computing, pp. 188-195, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Mariana Raykova et al., “Usable, Secure, In: Private Search,” IEEE Security and Privacy, vol. 10, no. 5, pp. 53-60, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Seny Kamara, Charalampos Papamanthou, and Tom Roeder, “Dynamic Searchable Symmetric Encryption,” ACM Conference on Computer and Communications Security, vol. 19, no. 5, pp. 965-976, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Cengiz Örencik, and Erkay Savaş, “Efficient and Secure Ranked Multi-Keyword Search on Encrypted Cloud Data,” Proceedings of the 2012 Joint EDBT/ICDT Workshops, ACM, pp. 186-195, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Cong Wang et al., “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1467-1479, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Sandeep K. Sood, “A Combined Approach to Ensure Data Security in Cloud Computing,” Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831-1838, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Jyun-Yao Huang, and I-En Liao, “A Searchable Encryption Scheme for Outsourcing Cloud Storage,” IEEE International Conference on Communication, Networks and Satellite, pp. 142-146, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Dongyoung Koo, Junbeom Hur, and Hyunsoo Yoon, “Secure and Efficient Data Retrieval over Encrypted Data Using Attribute-Based Encryption in Cloud Storage,” Computers & Electrical Engineering, vol. 39, no. 1, pp. 34-46, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Cheng-Chi Lee, Pei-Shan Chung, and Min-Shiang Hwang, “A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments,” International Journal of Network Security, vol. 15, no. 4, pp. 231-240, 2013.
[Google Scholar] [Publisher Link]
[13] Mohsen Bafandehkar et al., “Comparison of ECC and RSA Algorithms in Resource Constrained Devices,” IEEE International Conference on IT Convergence and Security, pp. 1-3, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Zhangjie Fu et al., “Multi-Keyword Ranked Search Supporting Synonym Query Over Encrypted Data in Cloud Computing,” IEEE 32nd International Performance Computing and Communications Conference, pp. 1-8, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Wang Jianfeng et al., “Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing,” Computer Science and Information Systems, vol. 10, no. 2, pp. 667-684, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Mohsen Bafandehkar et al., “Comparison of ECC and RSA Algorithm in Resource Constrained Devices,” IEEE International Conference on IT Convergence and Security, pp. 1-3, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Wenhai Sun et al., “Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking,” Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 71-82, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Zhihua Xia et al., “An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data,” Advanced Science and Technology Letters, vol. 31, pp. 323-332, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Ning Cao et al., “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222-233, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Vishwanath S Mahalle, and Aniket K Shahade, “Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa&Aes) Encryption Algorithm,” International Conference on Power Automation and Communication, pp. 146-149, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Fangquan Cheng et al., “Highly Efficient Indexing for Privacy-Preserving Multi-Keyword Query Over Encrypted Cloud Data,” International Conference on Web-Age Information Management, pp. 348-359, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[22] MdIftekhar Salam et al., “Implementation of Searchable Symmetric Encryption for Privacy-Preserving Keyword Search on Cloud Storage,” Journal of Human-Centric Computing and Information Sciences, Springer, vol. 5, no. 19, pp. 1-16, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Bharath Kumar Samanthula, Wei Jiang, and Elisa Bertino, “Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data,” European Symposium on Research in Computer Security, vol. 8712, pp. 400-418, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Vasudha Arora, and S.S. Tyagi, “Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud Computing,” International Journal of Computer Applications, vol. 127, no. 12, pp. 46-51, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Zhangjie Fu et al., “Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search Over Encrypted Cloud Data Supporting Parallel Computing,” IEICE Transactions on Communications, vol. 98, no. 1, pp. 190-200, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Yang Yang, “Attribute-Based Data Retrieval with Semantic Keyword Search for E-Health Cloud,” Journal of Cloud Computing, vol. 4, no. 10, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Lei Xu, and Chungen Xu, “Efficient and Secure Data Retrieval Scheme Using Searchable Encryption in Cloud Storage,” International Symposium on Security and Privacy in Social Networks and Big Data, pp. 15-21, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Hongwei Li et al., “Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage,” IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 1, pp. 127-138, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[29] C. Saranya, G. Radha, and R. Subash, “Top K Result Retrieval in Searching the File Over the Encrypted Data in Cloud,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 3, no. 3, pp. 2226-2233, 2015.
[CrossRef]  [Publisher Link]
[30] Amrithasree Haridas, and L. Preethi, “A Survey on Data Retrieval Techniques over Encrypted Cloud Storage,” Second International Conference on Networks and Advances in Computational Technologies, pp. 117-129, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Sneha A. Mittal, and C. Rama Krishna, “Recent Developments in Searching over Encrypted Cloud Data,” 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), pp. 338-342, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Fei Han, Jing Qin, and Jiankun Hu, “Secure Searches in the Cloud: A Survey,” Journal of Future Generation Computer Systems, vol. 62, pp. 66-75, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[33] K. Sekar, and M. Padmavathamma, “Comparative Study of Encryption Algorithm Over Big Data in Cloud Systems,” 3rd International Conference on Computing for Sustainable Global Development, pp. 1571-1574, 2016.
[Google Scholar] [Publisher Link]
[34] U. Arjun, and S. Vinay, “A Short Review on Data Security and Privacy Issues in Cloud Computing,” International Conference on Current Trends in Advanced Computing, pp. 1-5, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Jian Liu, Jing-Li Han, and Zhao-Li Wang, “Searchable Encryption Scheme on the Cloud via Fully Homomorphic Encryption,” IEEE Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), pp. 108-111, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Abdelali El Bouchti, Samir Bahsani, and Tarik Nahhal, “Encryption as a Service for Data Healthcare Cloud Security,” IEEE Fifth International Conference on Future Generation Communication Technologies, pp. 48-54, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[37] G. PrabuKanna, and V. Vasudevan, “Enhancing the Security of User Data Using the Keyword Encryption and Hybrid Cryptographic Algorithm in Cloud,” IEEE International Conference on Electrical, Electronics, and Optimization Techniques, pp. 3688-3693, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Anuradha Meharwade, and G.A. Patil, “Efficient Keyword Search over Encrypted Cloud Data,” Procedia Computer Science, vol. 78, pp. 139-145, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Xin Zhou, Jun Zhang, and GuanYu Li, “Efficient Interval Indexing and Searching on Cloud,” International Conference on Web-Age Information Management, pp. 283-291, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[40] S. Sridhar, and S. Smys, “A Hybrid Multilevel Authentication Scheme for Private Cloud Environment,” IEEE 10th International Conference on Intelligent Systems and Control, pp. 1-5, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Chengliang Liang et al., “The Hybrid Encryption Algorithm of Lightweight Data in Cloud Storage,” IEEE 2nd International Symposium on Agent, Multi-Agent Systems and Robotics, pp. 160-166, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Ashutosh Mishra, T.M. Velayutham, and C.R.S. Kumar, “Fast Data Retrieval and Enhanced Data Security of Cloud Storage in Luby Transform,” Procedia Computer Science, vol. 85, pp. 86-91, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Jing He et al., “Dynamic Multidimensional Index for Large-Scale Cloud Data,” Journal of Cloud Computing, vol. 5, no. 10, pp. 1-11, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Zuojie Deng et al., “A Multi-User Searchable Encryption Scheme with Keyword Authorization in a Cloud Storage,” Future Generation Computer Systems, vol. 72, pp. 208-218, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Xiuxiu Jiang et al., “Enabling Efficient and Verifiable Multi-Keyword Ranked Search over Encrypted Cloud Data,” Information Sciences, vol. 403, pp. 22-41, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[46] Zhu Xiangyang et al., “An Efficient and Accurate Verifiable Privacy-Preserving Multi Keyword Text Search over Encrypted Cloud Data,” Security and Communication Networks, vol. 2017, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[47] Tuhena Sen, and Dev Kumar Chaudhary, “Contrastive Study of Simple Page Rank, HITS and Weighted PageRank Algorithms: Review,” IEEE 7th International Conference on Cloud Computing, Data Science & Engineering-Confluence, pp. 721-727, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Shahzaib Tahir et al., “A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data,” IEEE Transactions on Emerging Topics in Computing, vol. 7, no. 4, pp. 530-544, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[49] Nan Zhu et al., “A Content-based Indexing Scheme for Large-Scale Unstructured Data,” Third International Conference on Multimedia Big Data, pp. 205-212, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[50] Justin Zobel, and Alistair Moffat, “Exploring the Similarity Space,” ACM SIGIR Forum, vol. 32, no. 1, pp. 18–34, 1998.
[CrossRef] [Google Scholar] [Publisher Link]
[51] Sanjana M. Kavatagi, and Rashmi Rachh, “Implementation of Searchable Encryption using Key Aggregation for Group Data Sharing in Cloud,” SSRG International Journal of Computer Science and Engineering, vol. 4, no. 8, pp. 11-14,2017.
[CrossRef] [Google Scholar] [Publisher Link]
[52] Eu-Jin Goh, “Secure Indexes,” IACR Cryptology ePrint Archive, 2003.
[Google Scholar] [Publisher Link]
[53] Yan-Cheng Chang, and Michael Mitzenmacher, “Privacy Preserving Keyword Searches on Remote Encrypted Data,” Applied Cryptography and Network Security, pp. 442–455, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[54] J. Doug Tygar, Security with Privacy, ISAT 2002 Study, 2002. [Online]. Available: https://people.eecs.berkeley.edu/~tygar/papers/ISAT-final-briefing.pdf
[55] Dan Boneh et al., “Public Key Encryption that Allows PIR Queries,” Advances in Cryptology-CRYPTO, pp. 50–67, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[56] R. Ostrovsky, “Efficient Computation on Oblivious RAMs,” Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, pp. 514–523, 1990.
[CrossRef] [Google Scholar] [Publisher Link]
[57] Oded Goldreich, and Rafail Ostrovsky, “Software Protection and Simulation on Oblivious RAMs,” Journal of the ACM, vol. 43, no. 3, pp. 431–473, 1996.
[CrossRef] [Google Scholar] [Publisher Link]
[58] Chih Hung Wang, and Chia-Chun Hsu, “Integration of Hierarchical Access Control and Keyword Search Encryption in Cloud Computing Environment,” International Journal of Computer and Communication Engineering, vol. 3, no. 2, pp. 33–337, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[59] Qin Liu, Guojun Wang, and Jie Wu, “An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing,” Proceedings of the International Conference on Computational Science and Engineering, pp. 715–720, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[60] Dan Boneh, and Matt Franklin, “Identity-based Encryption from the Weil Pairing,” Proceedings of the Advances in Cryptology—CRYPTO 2001, vol. 2139, pp. 213–229, 2001.
[CrossRef] [Google Scholar] [Publisher Link]
[61] Zheng Tao Jiang, and Ling Liu, “Secure Cloud Storage Service with an Efficient DOKS Protocol,” Proceedings of the IEEE International Conference on Services Computing, pp. 208–215, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[62] Sushil Kumar Verma et al., “An Efficient Dictionary and Lingual Keyword based Secure Search Scheme in Cloud Storage,” International Journal of Computer Applications, vol. 68, no. 15, pp. 40–43, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[63] Yanbin Lu, “Privacy-Preserving Logarithmic-Time Search on Encrypted Data in Cloud,” 19th Annual Network and Distributed System Security Symposium, 2012.
[Google Scholar] [Publisher Link]
[64] Zhihua Xia et al., “A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation,” International Journal of Future Generation Communication and Networking, vol. 6, no. 6, pp. 71–80, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[65] X. Pang et al., “Multi-user Noisy Keyword Search over Encrypted Data,” Journal of Computational Information Systems, vol. 9, no. 5, pp. 1973–1981, 2013.
[Google Scholar] [Publisher Link]
[66] Michel Abdalla et al., “Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions,” Advances in Cryptology–CRYPTO, pp. 205–222, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[67] Guofeng Wang et al., “IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications,” IEEE Access, vol. 6, pp. 2908-2921, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[68] Yingfan Liu et al., “An Efficient Index Structure for Approximate Nearest Neighbor Search,” Proceedings of the VLDB Endowment, vol. 7, no. 9, pp. 745–756, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[69] Yufei Tao et al., “Quality and Efficiency in High Dimensional Nearest Neighbor Search,” Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 563-576, 2009.
[CrossRef] [Google Scholar] [Publisher Link]]
[70] Nan Zhu et al., “Marlin: Taming the Big Streaming Data in Large Scale Video Similarity Search,” IEEE International Conference on Big Data, pp. 1755-1764, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[71] Mathias Björkqvist et al., “Minimizing Retrieval Latency for Content Cloud,” Proceedings IEEE INFOCOM, pp. 1080-1088, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[72] Yingfan Liu et al., “An Efficient Index Structure for Approximate Nearest Neighbor Search,” Proceedings of the VLDB Endowment, vol. 7, no. 9, pp.745–756, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[73] Srinivas Mudepalli, V. Srinivasa Rao, and R. Kiran Kumar, “An Efficient Data Retrieval Approach using Blowfish Encryption on Cloud Ciphertext Retrieval in Cloud Computing,” International Conference on Intelligent Computing and Control Systems, pp. 267-271, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[74] AL-Museelem Waleed, and Li Chunlin, “User Privacy and Security in Cloud Computing,” International Journal of Security, and Its Applications, vol. 10, no. 2, pp. 341-352, 2016.
[CrossRef] [Publisher Link]
[75] K. Satyanarayana, “Multilevel Security for Cloud Storage using Encryption Algorithms,” International Journal of Engineering and Computer Science, vol. 5, no. 7, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[76] Maryam Savari, Mohammad Montazerolzohour, and Yeoh Eng Thiam, “Comparison of ECC and RSA Algorithm in Multipurpose Smart Card Application,” Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, pp. 49-53, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[77] Ahmed El-Yahyaoui, and Mohamed DafrEch-Chrif El Kettani, “A New Cryptographic Method for Cloud Computing,” 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech), pp. 1-8, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[78] Chaoqun Yu et al., “Research on Data Security Issues of Cloud Computing,” International Conference on Cyberspace Technology, pp. 1-6, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[79] Zhen Yang, Jiliang Tang, and Huan Liu, “Cloud Information Retrieval: Model Description and Scheme Design,” IEEE Access, vol. 6, pp. 15420-15430, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[80] Junjian Chen, “Cloud Storage Third-Party Data Security Scheme Based on Fully Homomorphic Encryption,” International Conference on Network and Information Systems for Computers, pp. 155-159, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[81] Xingliang Yuan et al., “Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring Via Compressive Sensing,” IEEE Transactions on Multimedia, vol. 8, no. 10, pp. 2002-2014, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[82] Xiaoyu Li et al., “Two-Factor Data Access Control with Efficient Revocation for Multi-Authority Cloud Storage Systems,” IEEE Access, vol. 5, pp. 393-405, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[83] Yang Hong et al., “Efficient R-Tree Based Indexing Scheme for Server-Centric Cloud Storage System,” IEEE Transactions on Knowledge and Data Engineering, vol. 28, no. 6, pp. 1503-1517, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[84] Ashok George, and A. Sumathi, “Efficient Data Storage and Retrieval in Cloud Environment Using Cuckoo Hashing and Latent Semantic Search,” Middle-East Journal of Scientific Research, vol. 23, no. 6, pp. 1053-1058, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[85] Wei Teng et al., “Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing,” IEEE Transactions on Cloud Computing, vol. 5, no. 4, pp. 617-627, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[86] R.W. Conway, W.L. Maxwell, and H.L. Morgan, “On the Implementation of Security Measures in Information Systems,” Communications of the ACM, vol. 15, no. 4, pp. 211-220, 1972.
[CrossRef] [Google Scholar] [Publisher Link]
[87] Dorothy E. Denning, “A Lattice Model of Secure Information Flow,” Communications of the ACM, vol. 19, no. 5, pp. 236-243, 1976.
[CrossRef] [Google Scholar] [Publisher Link]
[88] Bell D. Elliott, La Padula, and J. Leonard, “Secure Computer System: Unified Exposition and Multics Interpretation,” Defense Technical Information Center, 1976.
[CrossRef] [Google Scholar] [Publisher Link]
[89] K.J. Biba, “Integrity Considerations for Secure Computer Systems,” Defense Technical Information Center, 1977.
[Publisher Link]
[90] Kaiping Xue et al., “Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2062-2074, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[91] Ilya Sukhodolskiy, and Sergey Zapechnikov, “A Blockchain-Based Access Control System for Cloud Storage,” IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, pp. 1575-1578, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[92] Amlan Jyoti Choudhury et al., “A Strong User Authentication Framework for Cloud Computing,” IEEE Asia-Pacific Services Computing Conference, pp. 110-115, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[93] Adam Bates et al., “Towards Secure Provenance-Based Access Control in Cloud Environments,” Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 277-284, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[94] Dan Boneh et al., “Public Key Encryption with Keyword Search,” International Conference on the Theory and Applications of Cryptographic Techniques,”pp. 506-522, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[95] Rouzbeh Behnia, Attila Altay Yavuz, and Muslum Ozgur Ozmen, “High-Speed High-Security Public Key Encryption with Keyword Search,” IFIP Annual Conference on Data and Applications Security and Privacy, pp. 365-385, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[96] Zhangjie Fu et al., “Semantic Keyword Search Based on Trie over Encrypted Cloud Data,” Proceedings of the 2nd International Workshop on Security in Cloud Computing, pp. 59–62, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[97] Saripalli Vinod Manikanta, and Kondapalli Varaprasad, “A Secure Privacy Preserving Information Retrieval Model in Cloud Computing,” International Journal of Computer and Organization Trends, vol. 9, no. 1, pp. 16-19, 2019.
[Publisher Link]
[98] Jihoon Ko et al., “Keyword Based Semantic Search for Mobile Data,” IEEE 15th International Conference on Mobile Data Management, pp. 245–248, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[99] R. ChinnaSamy, and S. Sujatha, “An Efficient Semantic Secure Keyword Based Search Scheme in Cloud Storage Services,” International Conference on Recent Trends in Information Technology, pp. 488–491, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[100] Ping Li et al., “Privacy-Preserving Outsourced Classification in Cloud Computing,” Cluster Computing, vol. 21, pp.277-286, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[101] M.B. Smithamol, and Rajeswari Sridhar, “PECS: Privacy Enhanced Conjunctive Search Over Encrypted Data in the Cloud Supporting Parallel Search,” Computer Communications, vol. 126, pp. 50–63, 2018.
[CrossRef] [Google Scholar] [Publisher Link]