Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special Section: Soft Computing and Intelligent Systems: Techniques and Applications
Guest editors: Sabu M. Thampi, El-Sayed M. El-Alfy, Sushmita Mitra and Ljiljana Trajkovic
Article type: Research Article
Authors: Handa, Rohita; * | Rama Krishna, C.a; 1 | Aggarwal, Naveenb; 2
Affiliations: [a] Department of Computer Science and Engineering, National Institute of Technical Teachers Training and Research, Chandigarh, India | [b] Department of Computer Science and Engineering, UIET, Panjab University, Chandigarh, India
Correspondence: [*] Corresponding author. Rohit Handa, Department of Computer Science and Engineering, National Institute of Technical Teachers Training and Research, Chandigarh, India. E-mail: [email protected].
Note: [1] Co-author: C. Rama Krishna, E-mail: [email protected]
Note: [2] Co-author: Naveen Aggarwal, E-mail: [email protected]
Abstract: With the advancement of cloud computing, data-owners prefer to outsource their confidential data to cloud as it provides storage facility at reduced administration and maintenance cost. When these confidential documents leave the user’s premises, security of the data becomes a prime concern, as cloud service provider (CSP) and end users are in different trust domains. To provide data privacy, it is preferred that the end user should encrypt the data before outsourcing to the cloud. Encryption provides security but makes data utilization a challenging task, i.e., searching encrypted documents is difficult. Various schemes exist in the literature but they are either restricted to single keyword search or are inefficient in terms of search time required. In this paper, we propose an efficient approach for secure information retrieval using the concept of bucketization. This reduces the average number of comparisons per query to sub-linear. Experimental analysis on Reuters-21578 data-set demonstrates that the proposed scheme provides a recall of 100% and precision of 98.45% while decreasing the search time by 98.85% using bucketization.
Keywords: Privacy-preserving, multi-keyword, conjunctive search, bucketization, cloud storage
DOI: 10.3233/JIFS-169430
Journal: Journal of Intelligent & Fuzzy Systems, vol. 34, no. 3, pp. 1345-1353, 2018
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]