Cryptography is the practice of transforming data to indecipherable by a third party, unless a particular piece of secret information is made available to them. Data encryption has been paid a great attention to protect data. As data sizes are growing, so does the need for efficient data search while being encrypted to protect it during transmission and storage. This research is based on our previous and continuous work to speed up and enhance global heuristic search on an encrypted data. This research is using chained hashing approach to reduce the search time and decrease the collision rate which most search techniques suffers from. The results were very encouraging and will be discussed in the experimental results section.

1.
G.
Sammour
,
J.
Qaryouti
,
M.
Shareef
and
K.
Kaabneh
, “
Heuristic Search on Encrypted Data (HSED)
”,
Department of Computer Science, Amman Arab University for Graduate Studies
,
AMMAN, JORDAN
,
2005
.
2.
Halloush
, “
Applying Advanced Searching Techniques to Encrypted Data
”, Master Tesis,
Al-Balqa Applied University
,
Jordan
,
2007
.
3.
Yan-Cheng
Chang
and
Michael
Mitzenmacher
, “Privacy Preserving Keyword Searches on Remote Encrypted Data”,
Division of Engineering and Applied Sciences
,
Harvard University
,
Cambridge, MA 02138, USA
4.
Michael J.
Freedman
,
Yuval
Ishai
,
Benny
Pinkas
, and
Omer
Reingold
, “
Keyword Search and Oblivious Pseudorandom Functions
”,
New York University
.
5.
Affef
, “
Privacy-enhanced searches on encrypted emails using secure extendable hash tree
”,
CS
,
Amman Arabia
,
1998
.
6.
Eu-Jin
Goh
,
Secure Indexes
, May 5,
2004
7.
Steven M.
Bellovin
and
William R.
Cheswick
, “
Privacy-Enhanced Searches Using Encrypted Bloom Filters
”,
Lumeta
.
8.
Brent R.
Waters
,
Dirk
Balfanz
,
Glenn
Durfee
, and
D. K.
Smetters
, “
Building an Encrypted and Searchable Audit Log
”,
Princeton University, Computer Science Department
,
Princeton, NJ 08544
.
9.
Dawn Xiaodong Song David Wagner Adrian Perrig
, “
Practical Techniques for Searches on Encrypted Data
”,
University of California
,
Berkeley
.
10.
Philippe
Golle
and
Jessica
Staddon
and
Brent
Waters
, “
Secure Conjunctive Keyword Search Over Encrypted Data
”,
Palo Alto Research Center
,
3333 Coyote Hill Road, Palo Alto, CA 94304, USA
.
11.
Thomas H.
Cormen
,
Introduction to Algorithms
, Second edition,
North America
,
Mc-Grow Hill
,
2003
.
12.
Roman
Fail
,
Cryptography and User Management, Foundstone Professional Services, Java in action
.
13.
Bowne
,
Symmetric Cryptography Algorithms, Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures
.
14.
Fred
Moore
,
President, Data Encryption Strategies
,
Horison, Inc
, http://www.horison.com
15.
Allam
Apparao
,
Network Security, Data and Computer Communications
.
This content is only available via PDF.