A Comparative study of Secure Index Based on Context Based Fertility for Ranked Search over Encrypted Data

A. Hema Latha*, A. Natasha**, Vijay Kumar.G***, Diana Moses****, M. Kamala*****
*-*** UG Scholar, Department of Computer Science and Engineering, St. Peter's Engineering College, Hyderabad,Telangana, India.
****-***** Assistant Professor, Department of Computer Science and Engineering, St. Peter's Engineering College, Hyderabad, Telangana, India.
Periodicity:March - May'2018
DOI : https://doi.org/10.26634/jit.7.2.14646

Abstract

A comparative study of secure index based on Context Based Fertility (CBF) for ranked search over encrypted data is performed in this paper. In daily requirement, there is an increasing in need for secure searched encrypted data in cloud computing. This paper mainly provides an approach to overcome the attacks and challenges that are occurred in the process of encryption by mentioning various methodologies proposed till date. In accordance with the frequent updating of technology in today's world, the secure index based on CBF for ranked search over encrypted data with few goals like Multiple Ranked Keywords Search, Guaranteed Security, Data Confidentiality, Indexed Privacy, Keyword Privacy and Efficiency faces many challenges in fulfilling their goals.

Keywords

Encryption, Decryption, Searchable Encryption(SE), Symmetric Key, Asymmetric Key, Cryptography, SmartVue.

How to Cite this Article?

Latha,A.H., Natasha,A., Kumar,G.V. , Moses,M., and Kamala,M. (2018). A Comparative Study of Secure Index Based on Context Based Fertility for Ranked Search Overencrypted Data. i-manager’s Journal on Information Technology, 7(2), 44-50. https://doi.org/10.26634/jit.7.2.14646

References

[1]. Artheeswari, S., & Chandrasekaran, R. (2016). International Data Encryption Algorithm (IDEA) for data security in cloud. International Journal of Technology and Engineering, 8(1), 6-11.
[2]. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International Conference on the Theory and Applications of Cryptographic Techniques (pp. 506-522). Springer, Berlin, Heidelberg.
[3]. Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25(1), 222-233.
[4]. Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES- The Advanced Encryption Standard. Springer Science & Business Media.
[5]. Kaur, N., & Sodhi, S. (2016). Data Encryption Standard Algorithm (DES) for Secure Data Transmission. In International Conference on Advances in Emerging Technology (ICAET) (pp. 31-37).
[6]. Koo, D., Hur, J., & Yoon, H. (2013). Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Computers & Electrical Engineering, 39(1), 34-46.
[7]. Lu, W., Varna, A. L., & Wu, M. (2014). Confidentialitypreserving image search: A comparative study between homomorphic encryption and distance-preserving randomization. IEEE Access, 2, 125-141.
[8]. Meharwade, A., & Patil, G. A. (2016). Efficient keyword search over encrypted cloud data. Procedia Computer Science, 78, 139-145.
[9]. Miao, Y., Ma, J., Jiang, Q., Li, X., & Sangaiah, A. K. (2017). Verifiable keyword search over encrypted cloud data in smart city. Computers & Electrical Engineering, 65, 90-101.
[10]. Nicolett, M., & Kavanagh, K. M. (2011). Magic quadrant for security information and event management. Gartner RAS Core Research Note.
[11]. Pitchay, S. A., Alhiagem, W. A. A., Ridzuan, F., & Saudi, M. M. (2015). A proposed system concept on enhancing the encryption and decryption method for cloud computing. In Modelling and Simulation (UKSim), th 2015 17 UKSim-AMSS International Conference on (pp. 201-205). IEEE.
[12]. Rane, D. D. (2016). Superiority of Twofish over Blowfish. International Journal of Scientific Research and Management, 4(11), 4744-4746.
[13]. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.
[14]. Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 457-473). Springer, Berlin, Heidelberg.
[15]. Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on (pp. 44-55). IEEE.
[16]. Wang, C., Cao, N., Ren, K., & Lou, W. (2012). Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems, 23(8), 1467-1479.
[17]. Yao, H., Xing, N., Zhou, J., & Xia, Z. (2016). Secure index for resource-constraint mobile devices in cloud computing. IEEE Access, 4, 9119-9128.
[18]. Yin, H., Qin, Z., Ou, L., & Li, K. (2017). A query privacyenhanced and secure search scheme over encrypted data in cloud computing. Journal of Computer and System Sciences, 90, 14-27.
[19]. Yu, J., Lu, P., Zhu, Y., Xue, G., & Li, M. (2013). Toward secure multikeyword top-k retrieval over encrypted cloud data. IEEE Transactions on Dependable and Secure Computing, 10(4), 239-250.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.