@article{scholars20299, doi = {10.1007/s12652-022-03889-8}, number = {1}, volume = {15}, note = {cited By 2}, title = {Privacy-preserving multi-keyword hybrid search over encrypted data in cloud}, year = {2024}, pages = {261--274}, journal = {Journal of Ambient Intelligence and Humanized Computing}, publisher = {Springer Science and Business Media Deutschland GmbH}, author = {Singh, N. and Kumar, J. and Singh, A. K. and Mohan, A.}, issn = {18685137}, abstract = {Data outsourcing to the cloud is gaining popularity day by day in cloud computing. It requires a dynamic architecture that avoids loopholes and stops intruders from entering the cloud environment. To retrieve the enciphered documents from the cloud, the latest technique that is enrolled effectively is multi-keyword fuzzy search. The proposed research work uses this technique along with the n-gram corpus algorithm that helps to achieve relevancy score and sub-linear search time. This algorithmic combination is able to predict the privacy ranking measure of the retrieved data. To validate the opposed approach, simulation analysis has been performed to preserve user-oriented privacy in a cloud environment. The ranking precision of the proposed method is compared with{\^A} (Fu et al. in IEEE Trans Inf Forensics Secur 12(8):1874{\^a}??1884. https://doi.org/10.1109/TIFS.2017.2692728, 2017) which uses a stemming algorithm and a matching algorithm based on the inner product. The results express the efficiency of the proposed approach by showing a relative improvement in security precision up to 55. {\^A}{\copyright} The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130814564&doi=10.1007\%2fs12652-022-03889-8&partnerID=40&md5=6248d9e86ad8f9817a53cdcd5c92471c}, keywords = {Cloud computing, Cloud environments; Cloud-computing; Data outsourcing; Data retrieval; Encrypted data; Fuzzy searches; Hybrid search; Multi keywords; Multi-keyword ranking; Privacy preserving, Privacy-preserving techniques} }