Advances in Multimedia, Communication and Networking 2013
DOI: 10.14257/astl.2013.31.57
|View full text |Cite
|
Sign up to set email alerts
|

Secure keyword-based Ranked Semantic Search over Encrypted Cloud Data

Abstract: Abstract. With the advent of cloud computing, many organizations and individuals are interested in outsourcing their complex data management to the public cloud for economic savings and ease of access. As sensitive information may have to be encrypted before outsourcing, the data utilization service based on plaintext keyword search is not suitable for the encrypted cloud data. In this paper, we propose a solution for ranked semantic keyword search (RSS) over encrypted cloud data. With the design of semantic e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…The keywords of the query words are kept in a dictionary, and the identification of a particular keyword is performed on the basis of its location in the dictionary. 47 Let us considered that n number of keywords that are coming from DO are being sorted using MESE. During the sorting process, the position of the keywords in the dictionary was kept same.…”
Section: Ranking Through MLmentioning
confidence: 99%
See 1 more Smart Citation
“…The keywords of the query words are kept in a dictionary, and the identification of a particular keyword is performed on the basis of its location in the dictionary. 47 Let us considered that n number of keywords that are coming from DO are being sorted using MESE. During the sorting process, the position of the keywords in the dictionary was kept same.…”
Section: Ranking Through MLmentioning
confidence: 99%
“…In MRSE, the foremost step is to build a dictionary of incoming words from the data owner (DO). The keywords of the query words are kept in a dictionary, and the identification of a particular keyword is performed on the basis of its location in the dictionary 47 . Let us considered that n number of keywords that are coming from DO are being sorted using MESE.…”
Section: Proposed Workmentioning
confidence: 99%
“…Ranked searchable encryption schemes are explored in [11], [15], [16] over encrypted cloud data. The secure ranked keyword search schemes are stronger security definition compared to SSE.…”
Section: Literature Surveymentioning
confidence: 99%
“…The secure ranked keyword search schemes are stronger security definition compared to SSE. The Order Persevering Mapping(OPM) technique is used in [11], [15], [16] for ranking the searched file over encrypted cloud data. The OPM technique protects the sensitive score information from the cloud provider.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation