Skip to main content
Secure Multi keyword Retrieval over Encrypted Cloud Data
International Journal of Computer Science and Information Technologies (2015)
  • Ms. Pradnya H. Unde
  • Ms. Arti Mohanpurkar
Now a day, Data owner incentivizes to outsource their data on the cloud to get more flexibility. Cloud computing provides data outsourcing and high quality accommodation. For data security, the data owner provides encryption on their data. The data owners outsource their data on the cloud through which they reduces a cost and computational overhead quandaries. Considering the sizably voluminous number of data users and documents in the cloud, it is obligatory to sanction multiple keywords in the search request and return documents in the order of their suggestion to these keywords. Cognate works on searchable encryption fixate on single keyword search or Boolean keyword search, and virtually not ever sort the look for results. In subsisting system, for the first instance, the conundrum of privacy-preserving multi-keyword ranked search over encrypted data in cloud computing (MRSE) is define and solve. A set of several privacy desiderata for such a bulwarked cloud data utilization system are defined by proposed work. The server side ranking is according to the order preserving encryption (OPE) ineluctably leaks data privacy. Leakage quandary is solved by utilizing two round searchable encryption scheme and it withal fortifies to top-k multi keyword retrieval. In two rounds searchable encryption scheme involves vector space model and Homomorphic encryption. These propose work results are eliminating the data leakage and data security issues.
  • Cloud,
  • ranking,
  • cloud computing,
  • privacy preservation,
  • data privacy,
  • vector space model,
  • Homomorphic encryption
Publication Date
July, 2015
Publisher Statement

Jiadi Yu, Peng Lu, Yanmin Zhu and Guangtao Xue, “Toward Secure Multikeyword Top-k Retrival Over Encrypted Cloud Data,” IEEE transaction on dependable and secure computing, vol. No. 4 July/august 2013.

Wenhai Sun, Bing Wang, Ning Cao, Ming Li and Wenjing Lou, “Verifiable Privacy – Preserving Multi-keyword Text Search in cloud supporting similarity-Based Ranking,” IEEE transaction on parallel and distributed system, vol. no. 11,November 2014.

Ning Cao, Cong Wang, Ming Li and Kui Ren, “Privacy Preserving Multi-keyword Ranked Search over Encrypted Cloud Data,” IEEE transcation on parallel and distributed system, vol. 25 no. 1, January 2014.

Singh, Kirat Pal, and Shivani Parmar. "Design of High Performance MIPS Cryptography Processor Based on T-DES Algorithm." arXiv preprint arXiv:1503.03166 (2015).

V. Andrikopoulos, T. Binz, F. Leymann, and S. Strauch, How to Adapt Applications for the Cloud Environment: Challenges and Solutions in Migrating Applications to the Cloud, Computing, vol. 95, no. 6, pp. 493-535, 2013.

M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and M. Zaharia, “A View of Cloud Computing,” Comm. ACM, vol. 53, no. 4, pp. 50-58, 2010.

Kirat Pal. "Techniques for Improving Design Performance of VLSI Circuits and Systems." Available at SSRN 2594227 (2014).

R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions,” Proc. ACM 13th Conf. Computer and Comm. Security (CCS), 2006.

C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,” Proc. IEEE 30th Int’l Conf. Distributed Computing Systems (ICDCS), 2010.

S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r: Top-k Retrieval from a Confidential Index,” Proc. 12th Int’l Conf. Extending Database Technology: Advances in Database Technology (EDBT), 2009.

M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, “Fully Homomorphic Encryption over the Integers,” Proc. 29th Ann. Int’l Conf. Theory and Applications of Cryptographic Techniques, H. Gilbert, pp. 24-43, 2010.

Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc IEEE INFOCOM, pp. 829-837, Apr, 2011.
Citation Information
Pradnya H. Unde and Arti Mohanpurkar. "Secure Multi keyword Retrieval over Encrypted Cloud Data" International Journal of Computer Science and Information Technologies (2015)
Available at:
Creative Commons license
Creative Commons License
This work is licensed under a Creative Commons CC_BY-NC International License.