Privacy Preservation in Multikey Word Based Text Retrieval in Cloud
|
International Journal of P2P Network Trends and Technology (IJPTT) | |
© 2017 by IJPTT Journal | ||
Volume - 7 Issue - 3 |
||
Year of Publication : 2017 | ||
Authors : S.Balaji, M.Komathi, K.Karthika |
Citation
S.Balaji, M.Komathi, K.Karthika "Privacy Preservation in Multikey Word Based Text Retrieval in Cloud". International Journal of P2P Network Trends and Technology (IJPTT), V7(3):15-19 May - Jun 2017, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.
Abstract
In recent times Mobile cloud computing has drawn attention of the researchers. In mobile cloud computing to attain efficient data storage it is possible to outsource the data. To ensure confidentiality and integrity of data we need to encrypt and send the data. While the data is secured it becomes complicated. To prevail over the challenge a multi keyword search in cloud is proposed. NLP based text mining process is involved to extract the multi keywords association and the encrypted data is split into blocks to store in the cloud storage. This increases the privacy of the out sourced data and implies unauthorized access is not viable.
References
[1] Q. Liu, C. C. Tan, J. Wu, and G. Wang, ``Effcient information retrieval for ranked queries in cost-effective cloud environments,`` in Proc. IEEE INFOCOM, Mar. 2012, pp2581_2585.
[2] Madan S.A. ,B.M. Patil,” Comparison of Privacy Preserving Single-Keyword Search and Multi-Keyword Ranked Search Techniques over Encrypted Cloud Data,”
[3] Q. Shen, X. Liang, X. Shen, X. Lin, and H. Y. Luo, ``Exploiting geo distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation,`` IEEE J. Biomed. Health Inform., vol. 18, no. 2, pp. 430_439, Mar. 2014.
[4] Kalika Kambale1, Swati Barsagade2,Nilima Bhujbal3,Swati Khilare4,”Multi-Keyword Ranked Search over Encrypted Cloud Data Manager”,vol.1,no.58,Mar.2015.
[5] W. Sun, et al., ``Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,`` in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Secur., 2013, pp. 71_82.
[6] H. Liang, L. X. Cai, D. Huang, X. Shen, and D. Peng, ``An
SMDP-based service model for inter domain resource allocation in
mobile cloud networks,`` IEEE Trans. Veh. Technol., vol. 61, no. 5,
pp. 2222_2232, Jun. 2012.
[7] M. Naveed, M. Prabhakaran, and C. A. Gunter, ``Dynamic
searchable encryption via blind storage,`` in Proc. IEEE Symp.
Secur. Privacy, May 2014, pp. 639_654.
[8] W. Sun, et al., ``Privacy-preserving multi-keyword text search
in the cloud supporting similarity-based ranking,`` in Proc. 8th
ACM SIGSAC Symp. Inf., Comput. Commun. Secur., 2013, pp.
71_82.
[9] B.Wang, S.Yu,W. Lou, and Y. T. Hou, ``Privacy-preserving
multi-keyword fuzzy search over encrypted data in the cloud,`` in
Proc. IEEE INFOCOM, Apr./May 2014, pp. 2112_2120.
[10] W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, ``Protecting
your right: Attribute-based keyword search with _ne-grained
owner-enforced search authorization in the cloud,`` in Proc. IEEE
INFOCOM, Apr./May 2014, pp. 226_234.
Keywords
Encryption, Natural Language Processing, Mining.