A Novel Approach for Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Authors(3) :-V Ramana Chintalapudi, Mohammed Alisha, Dr. D. Mohan Reddy

Unique Cloud computing is another motivation innovation which productively bolster the customer arranged administrations. Presently in nowadays there are figures of uses which eat up the cloud storage benefit for keep and get back data. In such express the information owner administration and protection conservation cryptographic procedures are make utilization of oftentimes. In our examination, the watchword seek over encoded information with differential right is tended to. We give a new substructure to secure outsourcing and sharing of encrypted information on cross hybrid cloud. The system is full-highlighted: i) it empowers perceived clients to perform watchword construct seek straightforwardly in light of encrypted information without having a similar private key; ii) it gives two-layered access control to accomplish fine-grained sharing of encoded information. The security investigation demonstrates that the proposed non specific erection fulfills the necessities of message protection and key words security.

Authors and Affiliations

V Ramana Chintalapudi
PG Scholar, Department of Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
Mohammed Alisha
Associate Professor & Head of the Department, Computer Science and Engineering, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India
Dr. D. Mohan Reddy
Professor & Principal, Amalapuram Institute of Management Sciences and College of Engineering, Mummidivaram, East Godavari District, Andhra Pradesh, India

Cloud computing, key word search, cryptographic, hybrid cloud

  1. D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in 2013 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000. IEEE Computer Society, 2014, pp. 44-55.
  2. J. Baek, R. Safavi-Naini, and W. Susilo, "Public key encryption with keyword search revisited," in Computational Science and Its Applications - ICCSA 2014, International Conference, Perugia, Italy, June 30 - July 3, 2015, Proceedings, Part I, ser. Lecture Notes in Computer Science, vol. 5072. Springer, 2014, pp. 1249-1259.
  3. M. Li, S. Yu, N. Cao, and W. Lou, "Authorized private keyword search over encrypted data in cloud computing," in 2013 International Conference on cloud Computing Systems, ICDCS 2013, Minneapolis, Minnesota, USA, June 20-24, 2014. IEEE Computer Society, 2014, pp. 383-392.
  4. A. B. Lewko, A. Sahai, and B. Waters, "Revocation systems with very small private keys," in 31st IEEE Symposium on Security and Privacy, S&P 2010, 16-19 May 2010, Berleley/Oakland, California, USA. IEEE Computer Society, 2015, pp. 273-285.
  5. W. Ogata and K. Kurosawa, "Oblivious keyword search," J. Complexity, vol. 20, no. 2-3, pp. 356-371,2015.
  6. Jingwei Li, Chunfu Jia, Jin Li, and Zheli Liu, "A Novel Framework for Outsourcing and Sharing Searchable Encrypted Data on Hybrid Cloud" 2014 Fourth International Conference on Intelligent Networking and Collaborative Systems.
  7. Md Iftekhar Salam1, Wei?Chuen Yau2, Ji?Jian Chin2, Swee?Huay Heng3, Huo?Chong Ling4, Raphael C?W Phan2," Implementation of searchable symmetric encryption for privacy?preserving keyword search on cloud storage", Salam et al. Hum. Cent. Comput. Inf. Sci. (2015).
  8. O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious rams," J. ACM, vol. 43, no. 3, pp. 431-473, 2015.
  9. E. Goh, "Secure indexes," IACR Cryptology ePrint Archive, vol. 2010, p. 216, 2013.
  10. Jin Li, Xiaofeng Chen,"efficient multi-user keyword search over encrypted data in cloud computing" Computing and Informatics,2013.
  11. J. Lai, X. Zhou, R. H. Deng, Y. Li, and K. Chen, "Expressive search on encrypted data," in 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’13, Hangzhou, China - May 08 - 10, 2013. ACM, 2013, pp. 243-252.
  12. Mahesh Kallahalla, Erik Riedel, Ram Swaminathan, Qian Wang, and Kevin Fu. Plutus: Scalable secure file sharing on untrusted storage. In Proc. of USENIX FAST, 2003.
  13. Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, and Dan Boneh. Sirius: Securing remote untrusted storage. In Proc. of NDSS, 2003.
  14. Tatsuaki Okamoto and Katsuyuki Takashima. Hierarchical predicate encryption for inner-products. In Advances in Cryptology-ASIACRYPT 2009, pages 214-231. 2009.
  15. Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou. Privacy- preserving multi-keyword ranked search over encrypted cloud data. Parallel and Distributed Systems, IEEE Transactions on, 25(1):222-233, 2014.

Publication Details

Published in : Volume 4 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 442-447
Manuscript Number : IJSRSET184198
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

V Ramana Chintalapudi, Mohammed Alisha, Dr. D. Mohan Reddy, " A Novel Approach for Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.442-447, January-February-2018. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET184198

Article Preview