Open Access Open Access  Restricted Access Subscription or Fee Access

Personalized Web Search Over Encrypted Databases

N. Venkataramana

Abstract


This paper involves the study of every user as the internet having an interest on his personalized personal search. To personal search the web content data on encrypted data bases and performing related data, collection data tasks while preserving data confidentiality is a desirable capability when a database is stored on a server maintained by a third-party service provider. This paper addresses the problem of enabling personalized web content-based collection data over encrypted and encoded web content stored in databases. Personal search front pages, along with web content documents, are first encrypted by the content owner and then stored onto the server. Through jointly applying cryptographic methods and procedures, such as RSA alg and cryptography methods and procedures, such as order preserving encryption and randomized hash functions, with image processing and related data collection data methods and procedures, secure front paging schemes are designed to provide both privacy protection and rank ordered personal search capability. Results on an encrypted color image server and database and security analysis of the secure front paging schemes under different attack models show that data confidentiality can be preserved while retaining very good collection data performance. This work has promising applications in secure web content management.

Keywords: Electric data image documents collection data, personal secure personal search, visual words power, min-hashing


Full Text:

PDF

References


Song DD, Wagner D, Perrig A. Practical methods and procesures for personal searches in encrypted data. IEEE Sym. on Repersonal Search in Security and Privacy. 2000; 44–55p.

Swaminathanan BA, Mao Y, Su G-M, et al. Confidentiality preserving rank-ordered personal search. Proceedings of the ACM Workshop on Storage, Security, and Survivability. 2007; 7(12).

Datta R, Joshi D, Li J, et al. Image collection data: Ideas, inuences, and trends of the new age. ACM Computing Surveys. 2008.

Shashank J, Kowshik P, Srinathan K, et al. Private content based image collection data. Proc. IEEE Conf. on Computer Vision and Pattern Recognition. 2008.

Mao Y, Wu M. A joint signal processing and cryptographic approach to webcontent encryption. IEEE Transactions. on Image Processing. 2006; 15: 2061–75p.

Grangetto M, Magli E, Olmo G. Webcontent selective encryption by means of randomized arithmetic coding. IEEE Transactions. on Webcontent. 2006; 8.

Kim H, Wen J, Villasenor JD. Secure arithmetic coding. IEEE Transactions on Signal Processing. 2007; 55.

Lowe D. Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision. 2004; 60(2): 91p.

Nist_er D, Stew_enius H. Scalable recognition with a vocabulary tree. Proc. IEEE Conf. on Computer Vision and Pattern Recognition. 2006.

Philbin J, Chum O, Isard M, et al. Object collection data with large vocabularies and fast spatial matching. Proc. IEEE Conf. on Computer Vision and Pattern Recognition. 2007.

Husrev T. Sencar, Ramkumar M, Ali N. Akansu. Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia. Elsevier; 2009.

Ray Liu KJ, Trappe Wade, Jane Wang Z, et al. Multimedia fingerprinting forensics for traitor tracing. EURASIP Book Series on Signal Processing and Communications. 2005; 4.

CoxI. J., Kilian J., Leighton T., et al. Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing. 1997; 6: 1673–87p.

Busch C, Funk W, Wolthusen S. Digital watermarking: From concepts to real-time video applications. IEEE Transactions on Computer Graphics and Applications. 1999; 19: 25–35p.

Podilchuk CI, Delp EJ. Digital watermarking: Algorithms and applications. IEEE Signal Process. Magazine. 2001; 18: 33–46p.

Meghanathan Natarajan, Nayak Lopamudra. Steganalysis algorithms for detecting the hidden information in image, audio and video cover media. Int. Journal of Network Security & Its Application (IJNSA). 2010; 2.

Huang HY, Fan CH, Hsu WH. An effective watermark embedding algorithm for high JPEG compression. Proceeding of 8th IEEE Int. Conf. Computer and Information Technology. 2008; 256–9p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/