Skip to main content
Log in

Split keyword fuzzy and synonym search over encrypted cloud data

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A substitute solution for various organizations of data owners to store their data in the cloud using storage as a service(SaaS). The outsourced sensitive data is encrypted before uploading into the cloud to achieve data privacy. The encrypted data is search based on keywords and retrieve interested files by data user using a lot of traditional Search scheme. Existing search schemes supports exact keyword match or fuzzy keyword search, but synonym based multi-keyword search are not supported. In the real world scenario, cloud users may not know the exact keyword for searching and they might give synonym of the keyword as the input for search instead of exact or fuzzy keyword due to lack of appropriate knowledge of data. In this paper, we describe an efficient search approach for encrypted data called as Split Keyword Fuzzy and Synonym Search (S K F S). Multi-keyword ranked search with accurate keyword and Fuzzy search supports synonym queries are a major contribution of SKFS. The wildcard Technique is used to store the keywords securely within the index tree. Index tree helps to search faster, accurate and low storage cost. Extensive experimental results on real-time data sets shows, the proposed solution is effective and efficient for multi-keyword ranked search and synonym queries Fuzzy based search over encrypted cloud data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Balamuralikrishna T, Anuradha C, Raghavendrasai N (2013) Fuzzy keyword search over encrypted data in cloud computing. Asian J Comput Sci Inform Technol 1(3)

  2. Bijral S, Mukhopadhyay D (2014) Efficient fuzzy search engine with B-tree search mechanism, arXiv:1411.6773

  3. Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parall Distri Syst 25(1):222–233

    Article  Google Scholar 

  4. ChinnaSamy R, Sujatha S (2012) An efficient semantic secure keyword based search scheme in cloud storage services. In: Proceedings of the international conference on recent trends in information technology (ICRTIT), pp 488–491

  5. Chuah M, Hu W (2011) Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In: Proceedings of the 31st international conference on distributed computing systems workshops (ICDCSW), pp 273–281

  6. Fu Z, Sun X, Xia Z, Zhou L, Shu J (2013) Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing. In: Proceedings of the IEEE 32nd international performance computing and communications conference (IPCCC), pp 1–8

  7. Fu Z, Shu J, Sun X, Linge N (2014) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electron 60(4):762–770

    Article  Google Scholar 

  8. Fu Z, Shu J, Sun X, Zhang D (2014) Semantic keyword search based on trie over encrypted cloud data. In: Proceedings of the 2nd international workshop on security in cloud computing, pp 59–62

  9. Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172

    Article  Google Scholar 

  10. Jie W, Xiao Y, Ming Z, Yong W (2014) A novel dynamic ranked fuzzy keyword search over cloud encrypted data. In: Proceeding of the 12th international conference on dependable, autonomic and secure computing, pp 91–96

  11. Khan NS, Krishna CR, Khurana A (2014) Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data. In: Proceedings of the international conference on computer and communication technology (ICCCT), pp 241–249

  12. Ko J, Shin S, Eom S, Song M, Jung J, Shin DH, Lee KH, Jang Y (2014) Keyword based semantic search for mobile data. In: Proceedings of the IEEE 15th international conference on mobile data management (MDM), vol 1, pp 245–248

  13. Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp 1–5

  14. Moh TS, Ho KH (2014) Efficient semantic search over encrypted data in cloud computing. In: Proceedings of the international conference on high performance computing & simulation (HPCS), pp 382–390

  15. National Science Foundation Research Awards Abstracts 1990-2003. http://kdd.ics.uci.edu/databases/nsfabs/nsfawards.html (2013)

  16. Raghavendra S, Geeta CM, Shaila K, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2015) MSSS: most significant single-keyword search over encrypted cloud data. In: Proceedings of the 6th annual intrernational conference on ICT: BigData, Cloud and Security

  17. Raghavendra S, Girish S, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2015) IGSK: index generation on split keyword for search over cloud data. In: 2015 international conference on computing and network communications (CoCoNet’15), pp 380–386

  18. Raghavendra S, Girish S, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2015) MSIGT: Most significant index generation technique for cloud environment. In: 12th IEEE India international Conference on e 3- c 3(INDICON 2015). IEEE

  19. Raghavendra S, Girish S, Geeta CM, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2016) DRSMS: Domain and range specific multi-keyword search over encrypted cloud data. Intern J Comput Sci Inform Sec 14(5)

  20. Shekokar N, Sampat K, Chandawalla C, Shah J (2015) Implementation of fuzzy keyword search over encrypted data in cloud computing. Procedia Comput Sci 45:499–505

    Article  Google Scholar 

  21. Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security, pp 71–82

  22. Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2014) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parall Distri Syst 25(11):3025–3035

    Article  Google Scholar 

  23. Tuo H, Wenping M (2013) An effective fuzzy keyword search scheme in cloud computing. In: Proceedings of the 5th international conference on intelligent networking and collaborative systems (INCoS), pp 786–789

  24. Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings IEEE INFOCOM, pp 2112–2120

  25. Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parall Distri Syst 23 (8):1467–1479

    Article  Google Scholar 

  26. Wang C, Ren K, Yu S, Raje KM (2012) Achieving usable and Privacy-Assured similarity search over outsourced cloud data. In: Proceedings IEEE INFOCOM. IEEE, pp 451–459

  27. Wang C, Wang Q, Ren K (2011) Towards secure and effective utilization over encrypted cloud data. In: Proceedings of the 31st international conference on distributed computing systems workshops (ICDCSW), pp 282–286

  28. Wang D, Fu S, Xu M (2013) A privacy-preserving fuzzy keyword search scheme over encrypted cloud data. In: Proceedings of the 5th international conference on cloud computing technology and science (CloudCom), vol 1, pp 663–670

  29. Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2013) Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. J Comput Sci Inform Syst 10(2):667–684

    Article  Google Scholar 

  30. Xia Q, Ni J, Kanpogninge AJBA, Gee JC (2015) Searchable public-key encryption with data sharing in dynamic groups for mobile cloud storage. J Univ Comput Sci 21(3):440–453

    Google Scholar 

  31. Xia Z, Zhu Y, Sun X, Wang J (2013) A similarity search scheme over encrypted cloud images based on secure transformation. Intern J Future Gene Commun Netw 6(6):71–80

    Article  Google Scholar 

  32. Xu P, Jin H, Wu Q, Wang W (2013) Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266–2277

    Article  MathSciNet  MATH  Google Scholar 

  33. Xu Q, Shen H, Sang Y, Tian H (2013) Privacy-preserving ranked fuzzy keyword search over encrypted cloud data. In: Proceedings of the international conference on parallel and distributed computing, applications and technologies (PDCAT), pp 239–245

  34. Yuan D, Yang Y, Liu X, Li W, Cui L, Xu M, Chen J (2013) A highly practical approach toward achieving minimum data sets storage cost in the cloud. IEEE Trans Parall Distri Syst (6):1234–1244

  35. Zhou W, Liu L, Jing H, Zhang C, Yao S, Wang S (2013) K-gram based fuzzy keyword search over encrypted cloud computing. J Softw Eng Appl 6(1):29–32

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raghavendra S.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Raghavendra S, Girish S, Geeta C. M. et al. Split keyword fuzzy and synonym search over encrypted cloud data. Multimed Tools Appl 77, 10135–10156 (2018). https://doi.org/10.1007/s11042-017-5055-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-5055-5

Keywords

Navigation