Skip to main content
Log in

Searchable Encrypted Data File Sharing Method Using Public Cloud Service for Secure Storage in Cloud Computing

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Data owners are used to transmit the data using cloud computing in a low cost. The cloud computing is a popular technology to transmit the data through internet and will also act as third party users. Data owners outsource the data through the cloud server, which have to encrypt the data before outsourcing due to the security and privacy issues. After encrypting the data, users have to find out the respective data using the private key. All information has to be stored in the cloud storage unit. To optimize the cloud storage unit, safety transmission, minimize the cost and searching time, here we have proposed a new scheme as searchable encrypted data file sharing technique. This technique will allocate a keyword for every data during the encryption based on which the keyword matching will accept the data of respective users. The multi keyword search is been proposed for keyword searching. Experimental results analyze the overall performance and the proposed scheme has not only increased the efficiency but also decreased the searching time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Abolfazli, S., Sanaei, Z., Tabassi, A., Rosen, S., Gani, A., & Khan, S. U. (2015). Cloud adoption in Malaysia: Trends, opportunities, and challenges. Cloud Computing, IEEE, 2(1), 60–68.

    Article  Google Scholar 

  2. Akgün, M., Bayrak, A. O., Ozer, B., & Sağıroğlu, M. Ş. (2015). Privacy preserving processing of genomic data: A survey. Journal of Biomedical Informatics, 56, 103–111.

    Article  Google Scholar 

  3. Gajra, N., Khan, S. S., & Rane, P. (2015). Private cloud security: Secured user authentication by using enhanced hybrid algorithm. In 2015 IEEE Electrical insulation conference (EIC) (pp. 1–6). IEEE, 2015.

  4. Guo, C., Song, Q., Zhuang, R., & Feng, B. (2015). RSAE: Ranked keyword search over asymmetric encrypted cloud data. In 2015 IEEE fifth international conference on big data and cloud computing (BDCloud) (pp. 82–86). IEEE, 2015.

  5. Hasan, R., & Zawoad, S. (2015). Privacy in the cloud. In S. Zeadally, B. Mohamad (Eds.), Privacy in a digital, networked world, USA: Springer.

    Google Scholar 

  6. Hu, Y., Peng, C., & Bai, G. (2015). Sharing health data through hybrid cloud for self-management. In 2015 IEEE international conference on multimedia and expo workshops (ICMEW) (pp. 1–6). IEEE, 2015.

  7. Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., & Wong, D. S. (2015). L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing. Knowledge-Based Systems, 79, 18–26.

    Article  Google Scholar 

  8. Liu, Z., Weng, J., Li, J., Yang, J., Fu, C., & Jia, C. (2015). Cloud-based electronic health record system supporting fuzzy keyword search. Soft Computing, 1–13.

  9. Magalhães, D., Calheiros, R. N., Buyya, R., & Gomes, D. G. (2015). Workload modeling for resource usage analysis and simulation in cloud computing. Computers & Electrical Engineering, 47, 69–81.

    Article  Google Scholar 

  10. Ohmann, C., Canham, S., Danielyan, E., Robertshaw, S., Legré, Y., Clivio, L., & Demotes, J. (2015). ‘Cloud computing’ and clinical trials: report from an ECRIN workshop. Trials, 16(1), 1–4.

    Article  Google Scholar 

  11. Popescu, C. (2015). Autonomous systems for telemedicine. In 2015 Ninth international conference on complex, intelligent, and software intensive systems (CISIS) (pp. 297–301). IEEE, 2015.

  12. Preethi, B., Shahin, M., & RamaDevi, K. (2015). Synonym query using multi-keyword search using cloud computing. International Journal of Advanced Engineering, 1(3), 192–195.

    Google Scholar 

  13. Ranjan, R., Buyya, R., Nepal, S., & Georgakopulos, D. (2015). A note on resource orchestration for cloud computing. Concurrency and Computation: Practice and Experience, 27(9), 2370–2372.

    Article  Google Scholar 

  14. Raghavendra, S., Geeta, C. M., Shaila, K., Buyya, R., Venugopal, K. R., Iyengar, S. S., & Patnaik, L. M. (2015). MSSS: Most significant single-keyword search over encrypted cloud data. In 6th annual international conference on ICT: Big data, cloud and security (ICT-BDCS 2015) (pp. 43–48).

  15. Samad, J., Loke, S.W., Reed. K. (2015) Mobile Cloud Computing. In da Fonseca N. L. S. & Boutaba. R (Eds.), Cloud Services, Networking, and Management, John Wiley & Sons: Hoboken, NJ.

  16. Shankarwar, M. U. & Pawar, A. V. (2015). Security and privacy in cloud computing: A survey. In Proceedings of the 3rd international conference on frontiers of intelligent computing: Theory and applications (FICTA) 2014 (pp. 1–11). Springer.

  17. Xia, Q., Ni, J., Kanpogninge, A. J. B. A., & Gee, J. C. (2015). Searchable public-key encryption with data sharing in dynamic groups for mobile cloud storage. Journal of Universal Computer Science, 21(3), 440–453.

    Google Scholar 

  18. Xu, Y., Li, M., Hu, X., Wang, Y., & Zhang, H. (2016) Survey on privacy preserving for intelligent business recommendation in cloud In Q.-A. Zeng (Ed.,) Wireless communications, networking and applications, India: Springer.

    Google Scholar 

  19. Xue, H., Inati, S., Sørensen, T. S., Kellman, P., & Hansen, M. S. (2015). Distributed MRI reconstruction using gadgetron-based cloud computing. Magnetic Resonance in Medicine, 73(3), 1015–1025.

    Article  Google Scholar 

  20. Zickau, S., Beierle, F., & Denisow, I. (2015). Securing mobile cloud data with personalized attribute-based meta information. In 2015 3rd IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud) (pp. 205–210). IEEE, 2015.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Pitchai.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pitchai, R., Jayashri, S. & Raja, J. Searchable Encrypted Data File Sharing Method Using Public Cloud Service for Secure Storage in Cloud Computing. Wireless Pers Commun 90, 947–960 (2016). https://doi.org/10.1007/s11277-016-3273-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3273-1

Keywords

Navigation