Privacy Preservation in Multikey Word Based Text Retrieval in Cloud

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2017 by IJPTT Journal
Volume - 7 Issue - 3
Year of Publication : 2017
Authors : S.Balaji, M.Komathi, K.Karthika

Citation

S.Balaji, M.Komathi, K.Karthika "Privacy Preservation in Multikey Word Based Text Retrieval in Cloud". International Journal of P2P Network Trends and Technology (IJPTT), V7(3):15-19 May - Jun 2017, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.

Abstract

In recent times Mobile cloud computing has drawn attention of the researchers. In mobile cloud computing to attain efficient data storage it is possible to outsource the data. To ensure confidentiality and integrity of data we need to encrypt and send the data. While the data is secured it becomes complicated. To prevail over the challenge a multi keyword search in cloud is proposed. NLP based text mining process is involved to extract the multi keywords association and the encrypted data is split into blocks to store in the cloud storage. This increases the privacy of the out sourced data and implies unauthorized access is not viable.

References

[1] Q. Liu, C. C. Tan, J. Wu, and G. Wang, ``Effcient information retrieval for ranked queries in cost-effective cloud environments,`` in Proc. IEEE INFOCOM, Mar. 2012, pp2581_2585.
[2] Madan S.A. ,B.M. Patil,” Comparison of Privacy Preserving Single-Keyword Search and Multi-Keyword Ranked Search Techniques over Encrypted Cloud Data,”
[3] Q. Shen, X. Liang, X. Shen, X. Lin, and H. Y. Luo, ``Exploiting geo distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation,`` IEEE J. Biomed. Health Inform., vol. 18, no. 2, pp. 430_439, Mar. 2014.
[4] Kalika Kambale1, Swati Barsagade2,Nilima Bhujbal3,Swati Khilare4,”Multi-Keyword Ranked Search over Encrypted Cloud Data Manager”,vol.1,no.58,Mar.2015.
[5] W. Sun, et al., ``Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,`` in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Secur., 2013, pp. 71_82.
[6] H. Liang, L. X. Cai, D. Huang, X. Shen, and D. Peng, ``An SMDP-based service model for inter domain resource allocation in mobile cloud networks,`` IEEE Trans. Veh. Technol., vol. 61, no. 5, pp. 2222_2232, Jun. 2012.
[7] M. Naveed, M. Prabhakaran, and C. A. Gunter, ``Dynamic searchable encryption via blind storage,`` in Proc. IEEE Symp. Secur. Privacy, May 2014, pp. 639_654.
[8] W. Sun, et al., ``Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,`` in Proc. 8th ACM SIGSAC Symp. Inf., Comput. Commun. Secur., 2013, pp. 71_82.
[9] B.Wang, S.Yu,W. Lou, and Y. T. Hou, ``Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud,`` in Proc. IEEE INFOCOM, Apr./May 2014, pp. 2112_2120.
[10] W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, ``Protecting your right: Attribute-based keyword search with _ne-grained owner-enforced search authorization in the cloud,`` in Proc. IEEE INFOCOM, Apr./May 2014, pp. 226_234.

Keywords
Encryption, Natural Language Processing, Mining.