banner

Aiding secure data retrieval incorporated with parallelization technique in cloud

Bharati P. Vasgi, S. M. Jaybhaye, Girija G. Chiddarwar

Abstract


Cloud data owners prefer to outsource data because of ease in maintenance. Data confidentiality of this outsourced sensitive data is a major task. The searchable encryption technique helps to carry out searches on encrypted data without decrypting it. In the data outsourcing environment, volume of data is increasing rapidly. Hence the time required to build the index and to carry out searches is also increasing exponentially. This makes it more difficult to build a system which is efficient, reliable and can cope up with growing data. In this paper, a parallelization technique to build the index on outsourced data is proposed. This technique minimizes the time required to construct the index. It also supports secure ranked retrieval using bucketization technique. The buckets are formed using Hadoop map reduce framework which achieves significant efficiency. The proposed method prune the keyword dataset, which helps in significant reduction in the size of index. Through extensive experiments using standard dataset, the performance of the system is validated. The experimental results show that the proposed system requires less time for index construction and hence improves retrieval efficiency.


Keywords


data outsourcing; searchable encryption; map-reduce; secure search; buketization; multi-owner; distributed index

Full Text:

PDF

References


1. Yang Y, Li H, Liu W, et al. Secure dynamic searchable symmetric encryption with constant document update cost. In: Proceedings of the 2014 IEEE Global Communications Conference; 08–12 December 2014; Austin, TX, USA. pp. 775–780.

2. Jung T, Mao X, Li XY, et al. Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation. In: Proceedings of the IEEE INFOCOM 2013; 14–19 April 2013; Turin, Italy. pp. 2634–2642.

3. Orencik C, Selcuk A, Savas E, Kantarcioglu M. Multi-Keyword search over encrypted data with scoring and search pattern obfuscation. International Journal of Information Security 2016; 15(3): 251–269. doi: 10.1007/s10207-015-0294-9

4. Strizhov M, Ray I. Multi-keyword similarity search over encrypted cloud data. In: Cuppens-Boulahia N, Cuppens F, Jajodia S, et al. (editors). ICT Systems Security and Privacy Protection, Proceedings of the 29th IFIP TC 11 International Conference (SEC 2014); 2–4 June 2014; Marrakech, Morocco. Springer Berlin, Heidelberg; 2014. Volume 428, pp. 52–65.

5. Cao N, Wang C, Li M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 2014; 25(1): 222–233. doi: 10.1109/TPDS.2013.45

6. Cash D, Jarecki S, Jutla C, et al. Highly-scalable searchable symmetric encryption with support for Boolean queries. In: Canetti R, Garay JA (editors). Advances in Cryptology—CRYPTO 2013, Proceedings of the 33rd Annual Cryptology Conference; 18–22 August 2013; Santa Barbara, CA, USA. Springer Berlin, Heidelberg; 2013. Volume 8042, pp. 353–373.

7. Chen Z, Wu C, Wang D, Li S. Conjunctive keywords searchable encryption with efficient pairing, constant ciphertext and short trapdoor. In: Chau M, Wang GA, Yue WT, Chen H (editors). Intelligence and Security Informatics, Proceedings of the 2012 Pacific-Asia Workshop on Intelligence and Security Informatics (PAISI 2012); 29 May 2012; Kuala Lumpur, Malaysia. Springer Berlin, Heidelberg; 2012. Volume 7299, pp. 176–189.

8. Van Liesdonk P, Sedghi S, Doumen J, et al. Computationally efficient searchable symmetric encryption. In: Jonker W, Petković M (editors). Secure Data Management, Proceedings of the 7th VLDB Workshop (SDM 2010); 17 September 2010; Singapore. Springer Berlin, Heidelberg; 2010. Volume 6358, pp. 87–100.

9. Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on Computer and communications security (CCS 2006); 30–3 November 2006; Alexandria, Virginia, USA. pp. 79–88.

10. Orencik C, Savaş E. An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distributed and Parallel Databases 2014; 32(1): 119–160. doi: 10.1007/s10619-013-7123-9

11. Vasgi BP, Kulkarni UV. Data security issues in outsourced environment: A survey. International Journal for Research in Engineering Application and Management (IJREAM) 2018; 3(10): 89–96. doi: 10.18231/2454-9150.2017.0083

12. Vasgi BP, Kulkarni UV. A secure and effective retrieval using hash-based mapping structure over encrypted cloud data. International Journal of Electrical Electronics and Computer Science Engineering 2017; 4(4): 65–74.

13. Wong WK, Cheung DWL, Kao B, Mamoulis N. Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data (SIGMOD 2009); 29–2 July 2009; Rhode Island, USA. pp. 139–152.

14. Shi E, Bethencourt J, Chan TH, et al. Multi-dimensional range query over encrypted data. Security and Privacy. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP 2007); 20–23 May 2007; Oakland, California, USA. pp. 350–364.

15. Hore B, Mehrotra S, Canim M, Kantarcioglu M. Secure multidimensional range queries over outsourced data. The VLDB Journal 2012; 21(3): 333–358. doi: 10.1007/s00778-011-0245-7

16. Baeza-Yates R, Ribeiro-Neto B. Modern Information Retrieval, 5th ed. Addison Wesley; 1999.

17. Boldyreva A, Chenette N, Lee Y, O’neill A. Order-preserving symmetric encryption. In: Joux A (editor). Advances in Cryptology—EUROCRYPT 2009, Proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques; 26–30 April 2009; Cologne, Germany. Springer Berlin, Heidelberg; 2009. Volume 5479, pp. 224–241.

18. Stallings W. Cryptography and Network Security: Principles and Practices, 7th ed. Pearson; 2016.

19. Katal A, Wazid M, Goudar RH. Big data: Issues, challenges, tools and good practices. In: Proceedings of the 2013 Sixth International Conference on Contemporary Computing (IC3); 8–10 August 2013; Noida, India. pp. 404–409.

20. Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In: Vadhan SP (editor). Theory of Cryptography, Proceedings of the 4th Theory of Cryptography Conference (TCC 2007); 21–24 February 2007; Amsterdam, The Netherlands. Springer Berlin, Heidelberg; 2007. pp. 535–554.

21. Manning CD, Raghavan P. Introduction to Information Retrieval. Cambridge University Press; 2008.

22. Vasgi, Bharati P., Girija G. Chiddarwar, and S. M. Jaybhaye. "Novel Frequency Based Natural Language Query Search in Cloud Computing." Computer Integrated Manufacturing Systems 29, no. 5 (2023): 1-5.

23. Wang C, Cao N, Ren K, Lou W. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on parallel and distributed systems 2012; 23(8): 1467–1479. doi: 10.1109/TPDS.2011.282

24. Wu X, Wei D, Bharati P, et al. Research on Network Security Situational Awareness Based on Crawler Algorithm. Security and Communication Networks 2022; (2022).




DOI: https://doi.org/10.32629/jai.v7i4.1085

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Bharati P. Vasgi, S. M. Jaybhaye, Girija G. Chiddarwar

License URL: https://creativecommons.org/licenses/by-nc/4.0/