5 CONCLUSION
In this paper, 9 security requirements are defined to
create a highly secure data retrieval system that uti-
lizes cloud computing systems. These requirements
are: no index pattern, no query pattern, no documents
pattern, no index frequency, no query frequency, no
replay attack, query privacy, index privacy, and doc-
uments privacy. None of the techniques that have
been reported in the literature are able to satisfy all
of these 9 requirements. Moreover, some of the exist-
ing approaches use data mining techniques that may
decrease the efficiency of the data retrieval, such as
binary features, reduction of keywords, reduction of
features vector, classes normalization, etc. The pro-
posed technique is shown as being able to satisfy all of
the 9 security requirements along with the efficiency
requirement. It utilizes a multi-server setting to sep-
arate the leaked information. However, none of the
servers are able to infer any information from the data
that pass through it. The technique uses anonymous
authentication of the queries to prevent any unautho-
rized party from generating a query as well as pre-
venting the replay attacks. It also uses the Cosine
similarity measure to calculate the similarity between
the TF vector of the query and the TF-IDF vectors of
the documents to rank them according to their simi-
larity to the query. This similarity measure is shown
as being effective and applicable in the proposed tech-
nique. Table 2 illustrates the position of the proposed
technique with regard to relevant researches available
in the literature. The technique can also be adapted to
support fuzzy-keywords retrieval property, which is a
future research topic for our group.
REFERENCES
Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Per-
siano, G. (2004). Public key encryption with keyword
search. In Cachin, C. and Camenisch, J., editors, Ad-
vances in Cryptology - EUROCRYPT 2004, volume
3027 of Lecture Notes in Computer Science, pages
506–522. Springer Berlin Heidelberg.
Cao, N., Wang, C., Li, M., Ren, K., and Lou, W. (2011).
Privacy-preserving multi-keyword ranked search over
encrypted cloud data. In INFOCOM, 2011 Proceed-
ings IEEE, pages 829–837.
Chen, L., Sun, X., Xia, Z., and Liu, Q. (2014). An effi-
cient and privacy-preserving semantic multi-keyword
ranked search over encrypted cloud data. Inter-
national Journal of Security and Its Applications,
8(2):323–332.
ChinnaSamy, R. and Sujatha, S. (2012). An efficient seman-
tic secure keyword based search scheme in cloud stor-
age services. In Recent Trends In Information Tech-
nology (ICRTIT), 2012 International Conference on,
pages 488–491.
Chuah, M. and Hu, W. (2011). Privacy-aware bedtree
based solution for fuzzy multi-keyword search over
encrypted data. In Distributed Computing Systems
Workshops (ICDCSW), 2011 31st International Con-
ference on, pages 273–281.
Dawoud, M. and Altilar, D. (2014). Privacy-preserving
search in data clouds using normalized homomorphic
encryption. In Euro-Par 2014: Parallel Processing
Workshops, volume 8806 of Lecture Notes in Com-
puter Science, pages 62–72. Springer International
Publishing.
Gopal, G. and Singh, M. (2012). Secure similarity based
document retrieval system in cloud. In Data Science
Engineering (ICDSE), 2012 International Conference
on, pages 154–159.
Hammouda, k. (2013). Web mining data - uw-can-dataset.
http://pami.uwaterloo.ca/ hammouda/webdata.
Kuzu, M., Islam, M. S., and Kantarcioglu, M. (2012). Ef-
ficient similarity search over encrypted data. In Pro-
ceedings of the 2012 IEEE 28th International Confer-
ence on Data Engineering, ICDE ’12, pages 1156–
1167, Washington, DC, USA. IEEE Computer Soci-
ety.
Lang, K. (1995). Newsweeder: Learning to filter netnews.
In Proceedings of the Twelfth International Confer-
ence on Machine Learning, pages 331–339.
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., and Lou, W.
(2010). Fuzzy keyword search over encrypted data in
cloud computing. In INFOCOM, 2010 Proceedings
IEEE, pages 1–5.
Li, M., Yu, S., Cao, N., and Lou, W. (2011). Autho-
rized private keyword search over encrypted data in
cloud computing. In Distributed Computing Sys-
tems (ICDCS), 2011 31st International Conference
on, pages 383–392.
Liu, Q., Wang, G., and Wu, J. (2009). An efficient pri-
vacy preserving keyword search scheme in cloud com-
puting. In Computational Science and Engineering,
2009. CSE ’09. International Conference on, vol-
ume 2, pages 715–720.
Orencik, C. and Savas, E. (2014). An efficient privacy-
preserving multi-keyword search over encrypted
cloud data with ranking. Distributed and Parallel
Databases, 32(1):119–160.
Rajaraman, A. and Ullman, J. D. (2011). Data mining. In
Mining of Massive Datasets, pages 1–17. Cambridge
University Press. Cambridge Books Online.
Salton, G. and Buckley, C. (1988a). Term-weighting ap-
proaches in automatic text retrieval. In Information
Processing and Management, pages 513–523.
Salton, G. and Buckley, C. (1988b). Term-weighting ap-
proaches in automatic text retrieval. Inf. Process.
Manage., 24(5):513–523.
Song, D. X., Wagner, D., and Perrig, A. (2000). Practical
techniques for searches on encrypted data. In Security
and Privacy, 2000. S P 2000. Proceedings. 2000 IEEE
Symposium on, pages 44–55.
Privacy-preserving Data Retrieval using Anonymous Query Authentication in Data Cloud Services
179