Keyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter

dc.contributor.authorVora, A.V.
dc.contributor.authorHegde, S.
dc.date.accessioned2026-02-05T09:30:02Z
dc.date.issued2019
dc.description.abstractOutsourcing of data is a very common scenario in the present-day world and quite often we need to outsource confidential data whose privacy is of utmost concern. Performing encryption before outsourcing the data is a simple solution to preserve privacy. Preferably a public-key encryption technique is used to encrypt the data. A demerit of encrypting data is that while requesting the data from the cloud we need to have some technique which supports search functionality on encrypted data. Without the searchable encryption technique, the cloud is forced to send the whole database, which is highly inefficient and impractical. To address this problem, we consider the email scenario, in which the sender of the email will encrypt email contents using receiver’s public key; hence, only the receiver can decrypt email contents. We propose a scheme that will have encrypted emails stored on the cloud and have capabilities that support searching through the encrypted database. This enables the cloud to reply to a request with a more precise response without compromising any privacy in terms of email contents and also in terms of access patterns. We provide a solution for the email scenario in which we can tag or associate emails with some keywords, and during retrieval, the email owner can request all the emails associated with a particular keyword. Although attempts are seen in the literature to solve this issue they do not have the flexibility of dissociating keywords from an email. Keyword dissociation is essential to modify the association between keywords and emails to enable better filtering of emails. Our technique also supports the functionality of keyword dissociation. The solution allows single-database private information retrieval writing in an oblivious way with sublinear communication cost. We have theoretically proved the correctness and security of our technique. © 2018, Springer-Verlag GmbH Germany, part of Springer Nature.
dc.identifier.citationInternational Journal of Information Security, 2019, 18, 3, pp. 305-319
dc.identifier.issn16155262
dc.identifier.urihttps://doi.org/10.1007/s10207-018-0418-0
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/24551
dc.publisherSpringer Verlag service@springer.de
dc.subjectData privacy
dc.subjectDatabase systems
dc.subjectDissociation
dc.subjectInformation retrieval
dc.subjectOutsourcing
dc.subjectPublic key cryptography
dc.subjectCuckoo filter
dc.subjectDatabase security
dc.subjectEncrypted data
dc.subjectOblivious modification
dc.subjectPrivate information retrieval
dc.subjectPublic-key encryption
dc.subjectElectronic mail
dc.titleKeyword-based private searching on cloud data along with keyword association and dissociation using cuckoo filter

Files

Collections