727 research outputs found

    Semantic Search Approach in Cloud

    Get PDF
    With the approach of cloud computing, more and more information data are distributed to the public cloud for economic savings and ease of access. But, the encryption of privacy information is necessary to guarantee the security. Now a days efficient data utilization, and search over encrypted cloud data has been a great challenge. Solution of existing methods depends only on the keyword of submitted query and didn�t examine the semantics of keyword. Thus the search schemes are not intelligent and also omit some semantically related documents. To overcome this problem, we propose a semantic expansion based similar search solution over encrypted cloud data. The solution of this method will return not only the exactly matched files, but also the files including the terms semantically related to the query keyword. In this scheme, a corresponding file metadata is constructed for each file. After this, both the encrypted file metadata set and file collection are uploaded to the cloud server. With the help of metadata set file, the cloud server maintains the inverted index and create semantic relationship library (SRL) for the keywords set. After receiving a query request from user , this server firstly search out the keywords that are related to the query keyword according to SRL. After this, both the query keyword and the extensional words are used to retrieve the files to fulfill the user request. These files are returned in order according to the total relevance score. Our detailed security analysis shows that our method is privacy-preserving and secure than the previous searchable symmetric encryption (SSE) security definition. Experimental evaluation demonstrates the efficiency and effectives of the scheme

    Review on Different Searchable Encryption Schemes for Cloud Computing

    Get PDF
    Heavily available online data and its day to day expansion is need to be focus to store and retrieve it properly. This enforces the data owners tend to store their data into the cloud. This also suggest to handle the data properly and so release the burden of data storage and maintenance. But as the data owner and user, cloud server are not belong to same trusted domain, this may cause the outsourced to the risk. This enforce us to set the policy to avoid such risk factor. This gives us study scope to fine the different techniques to overcome such issue observed by different author. In this paper we try to underline the different solution, its limitation and results they achieved for retrieval of data securely and within less time. Definitely from this we will be able to propose our own solution

    Ontology Based Semantic Web Information Retrieval Enhancing Search Significance

    Get PDF
    The web contain huge amount of structured as well as unstructured data/information. This varying nature of data may yield a retrieval response that is expected to contain relevant response that is expected to contain relevant as well as irrelevant data while directing search. In order to filter out irrelevance in the search result, numerous methodologies have been used to extract more and more relevant search responses in retrieval. This work has adopted semantic search dealing directly with the knowledge base. The approach incorporates Query pattern evolution and semantic keyword matching with final detail to enhance significance of relevant data retrieval. The proposed method is implemented in open source computing tool environment and the result obtained thereof are compared with that of earlier used methodologies

    Efficient Multi - Keyword Ranked Search over Encrypted Cloud Computing

    Get PDF
    Cloud computing allow customer to store their data on remote site so it reduce burden on local complex data storing. But before storing sensitive data it can encrypted and this can overcome plaintext keyword search.AS large number of user and data on cloud and for search on that data allow multi keyword search also provide result similarity ranking for effective retrieval of data. From number of multi-keyword semantics to identify similarity between search query and data highly efficient rule of coordinate matching, i.e., as many matches as possible, and then use inner data similarity for quantitatively similarity measure. In this system, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE),and establish a set of strict privacy requirements for such a secure cloud data utilization system to be implemented in real. We first propose basic idea of different privacy preserving multi-keyword search technique along with search on data that store on cloud in encrypted form and maintaining the integrity of rank order in search result and the cloud server is untrusted. .By hiding the user’s identity, the confidentiality of user’s data is maintaine

    A Scalable Framework To Allow Users For Keyword Search With Access Control Over Encrypted Data

    Get PDF
    In certain conditions, the keywords that the client searches on are just semantically identified with the data instead of through a definite or fluffy match. Subsequently, semantic-based keywordsearch over encoded cloud data is the fate of central significance. Be that as it may, existing plans as a rule rely on a worldwide word reference, which influences the precision of indexed lists as well as purposes wastefulness in data refreshing. Also, albeit compound keywordsearch is basic by and by, the current methodologies just procedure them as single words, which split the first semantics and accomplish low exactness. To address these impediments, we at first propose a Compound Concept Semantic Similarity (CCSS) estimation strategy to gauge the semantic closeness between compound ideas. Next, by incorporating CCSS with Locality-Sensitive Hashing (LSH) capacity and the safe k-Nearest Neighbor conspire, a Semantic-based Compound Keyword Search (SCKS) plot is proposed. SCKS accomplishes semantic-based search as well as multi-keywordsearch and positioned keywordsearch. Furthermore, SCKS likewise disposes off the predefined worldwide library and can effectively bolster data update.

    Towards a secure and efficient search over encrypted cloud data

    Get PDF
    Includes bibliographical references.2016 Summer.Cloud computing enables new types of services where the computational and network resources are available online through the Internet. One of the most popular services of cloud computing is data outsourcing. For reasons of cost and convenience, public as well as private organizations can now outsource their large amounts of data to the cloud and enjoy the benefits of remote storage and management. At the same time, confidentiality of remotely stored data on untrusted cloud server is a big concern. In order to reduce these concerns, sensitive data, such as, personal health records, emails, income tax and financial reports, are usually outsourced in encrypted form using well-known cryptographic techniques. Although encrypted data storage protects remote data from unauthorized access, it complicates some basic, yet essential data utilization services such as plaintext keyword search. A simple solution of downloading the data, decrypting and searching locally is clearly inefficient since storing data in the cloud is meaningless unless it can be easily searched and utilized. Thus, cloud services should enable efficient search on encrypted data to provide the benefits of a first-class cloud computing environment. This dissertation is concerned with developing novel searchable encryption techniques that allow the cloud server to perform multi-keyword ranked search as well as substring search incorporating position information. We present results that we have accomplished in this area, including a comprehensive evaluation of existing solutions and searchable encryption schemes for ranked search and substring position search

    Privacy-aware relevant data access with semantically enriched search queries for untrusted cloud storage services

    Get PDF
    © 2016 Pervez et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to predefined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security
    • …
    corecore