Encrypted Data with Proficient Search Scheme on Mobile Cloud

Authors

  • S. Palani   Department of computer Applications SVCET, Chittoor, Andhra Pradesh, India
  • M. Yamuna   Department of computer Applications SVCET, Chittoor, Andhra Pradesh, India
  • N. Shalini   Department of computer Applications SVCET, Chittoor, Andhra Pradesh, India

Keywords:

multi-keyword ranked search, cloud computing, Greedy Depth-first Search algorithm.

Abstract

Cloud storage provides a convenient, massive, and scalable storage at low value; however knowledge privacy could be a major concern that forestalls users from storing files on the cloud trustfully. a technique of enhancing privacy from knowledge owner purpose of read is to write the files before outsourcing them onto the cloud and decipher the files when downloading them. Within the existing system we will search documents solely with the one keywords. Throughout this paper, we tend to tend to gift a secure multi-keyword class-conscious search theme over encrypted cloud knowledge that at a similar time supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and jointly the widely-used TF×IDF model unit combined inside the index construction and question generation. we have a bent to construct a special tree-based index structure and propose a Greedy Depth-first Search rule to supply economical multi-keyword graded search. The secure kNN rule is utilized to place in writing in code the index and question vectors, and within the in the meantime guarantee correct connectedness score calculation between encrypted index and question vectors. Therefore on resist math attacks, phantom terms unit of measurement further to the index vector for bright search results. Thanks to the employment of our special tree-based index structure, the planned theme is in a position to try to sub-linear search time and agitate the deletion and insertion of documents flexibly.

References

  1. Balachandra Reddy Kandukuri, Rama Krishna Paturi and Dr. AtanuRakshit, "Cloud security issues" In Services Computing, 2009. IEEE International Conference on, page 517520, 2009
  2. Boldreva A., Chenette N., Lee Y, O'neill A. (2009), "Order-preserving Symmetric encryption", Advances in Cryptology-EUROCRYPT 2009 Springer, Berlin/Heidelberg, pp. 224-241.
  3. Boneh D., Di G., Ostrovsky R., Persiano G. (2004), "Public key encryption with keyword search", Advances in Cryptology-Eurocrypt, Springer, Berlin/Heidelberg, pp 506-522.
  4. B.R kandukuri, R.Paturi V, and A.Rakshit, "cloud security issues",2009 IEEE International Conference on Services Computing, sep. 21-25, 2009, Bangalore, India, pp. 517-520.
  5. Campbell, Jeronimo, "Applied Virtualization Technology," Hillsboro, Intel Press (ISBN 09764832-3-8), 2006, pp. 69-73.
  6. Chandrahasan, R. Kalaichelvi, S. Shanmuga Priya, and L. Arockiam. "Research Challenges and Security Issues in Cloud Computing." International Journal of Computational Intelligence and Information Security 3.3 (2012): 42-48.
  7. Chun-Ting Huang, Zhongyuan Qin, C.-C. Jay Kuo., "Multimedia Storage Security in Cloud Computing: an Overview" 978-1-457701434- 4/11/$26.00,IEEE,2011.
  8. Cloud Security Alliance, "Top Threats to Cloud Computing v1.0," Prepared by the Cloud Security Alliance, March 2010, pp. 1-14.
  9. Cong.Wang and Kui Ren Wenjing Lou and Jin Li "Towards Publicity Auditable Secure Cloud Data Storage". Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, "Privacy Preserving Public Auditing for Data Storage Security in, cloud Computing", 2010.
  10. Cong Wang, Qian Wang, KuiRen and Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing", In Quality of Service, 2009. 17th International Workshop on, page 19, 2009.
  11. Dong Xin, et al."achieving secure and efficient data collaboration in cloud computing. "Quality of service, 2013 IEEE/ACM 21st International symposium on.IEEE, 2013.
  12. Dr.R.Manicka Chezian and C.bagyalakshmi "a survey on cloud data security Using encryption technique" in International journal of advanced research in computer engineering & technology , Volume 1, Issue 5, July 2012.
  13. Er.Rimmy Chuchra, Lovely Professional University,Phagwara, India, "Data Security in Cloud Computing", International Journal Nov.,2012.
  14. Feng-Tse Lin, Teng-San Shih, "Cloud Computing: The Emerging Computing Technology," ICIC Express Letters Part B: Applications (ISSN: 2185-2766), v1, September 2010, pp. 33-38.
  15. Foster, I. T., Zhao, Y., Raicu, I., & Lu, S. (2009). Cloud Computing and Grid Computing 360-Degree Compared CoRR. abs/0901.0131.
  16. G. Hughes, D. Al-Jumeily & A. Hussain," Supporting Cloud Computing Management through an Object Mapping Declarative Language", 2010 Developments in E-systems engineering.
  17. Hassan Takabi, James B. D. Joshi and Gail-JoonAhn, "Secure Cloud: Towards a Comprehensive Security Framework for Cloud Computing Environments" Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, p.393-398, July 19-23, 2010.
  18. John Harauz, Lori M. Kaufman and Bruce Potter, "Data security in the world of cloud computing" published by the IEEE computer and reliability societies in July/August 2009.
  19. Jouni Maenpaa, "Cloud Computing with the Azure Platform," TKK T-110.5190 Seminar on Internet Working, April 27, 2009.
  20. Kant, Dr Chander, and Yogesh Sharma. "Enhanced Security Architecture for Cloud Data Security." International Journal of Advanced Research in Computer Science and Software Engineering 3.5 (2013): 571-575

Downloads

Published

2018-03-30

Issue

Section

Research Articles

How to Cite

[1]
S. Palani, M. Yamuna, N. Shalini, " Encrypted Data with Proficient Search Scheme on Mobile Cloud, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 7, pp.360-365, March-April-2018.