Efficient Retrieval of Encrypted Data by Multi-Keyword Search in Cloud Storage

Authors

  • Amrita L. Nagpurkar  BE, Department of Computer Science and Engineering, Shrimati Rajshree Mulak College of Engineering, Nagpur, Maharashtra, India
  • Nidhi C. Yadav  BE, Department of Computer Science and Engineering, Shrimati Rajshree Mulak College of Engineering, Nagpur, Maharashtra, India
  • Shrutika R. Hiwase  BE, Department of Computer Science and Engineering, Shrimati Rajshree Mulak College of Engineering, Nagpur, Maharashtra, India
  • Mayuri V. Deshmukh  BE, Department of Computer Science and Engineering, Shrimati Rajshree Mulak College of Engineering, Nagpur, Maharashtra, India
  • Jaysika M. Adikane  BE, Department of Computer Science and Engineering, Shrimati Rajshree Mulak College of Engineering, Nagpur, Maharashtra, India
  • Jyoti D. Tank  BE, Department of Computer Science and Engineering, Shrimati Rajshree Mulak College of Engineering, Nagpur, Maharashtra, India

Keywords:

Cloud computing, Encryption, Inner product similarity, Single Keyword Search, Multi-keyword search, ranking.

Abstract

As of late, development of private and semi-private data has grown up quickly on data arrange; instruments to pursuit such data have bombed in security safeguarding. The security saving seeking is assuming imperative part in the field of data systems to perform different information mining operations on encoded information put away in different stockpiling frameworks. It is additionally vital and testing undertaking to secure the secrecy of private information shared among specialist co-ops and information proprietors. Existing framework gives one conceivable arrangement that is protection safeguarding ordering (PPI). In this framework, archives are put away in plain content shape on private server that is security is traded off. So to improve this framework to make it more secure and effective, first we store the records on server in scrambled shape and after that utilization Key Distribution Center (KDC) for permitting decoding of information gotten from private server, at customer side. We likewise actualize TF-IDF, which gives the effective positioning of results, to enhance the client look involvement. At last we direct the broad tests on dataset, to assess the execution of our proposed framework. Exploratory outcomes will demonstrate that the proposed framework is superior to anything existing one, as far as, protection safeguarding, proficient and secure inquiry on scrambled appropriated archives.

References

  1. Qin Liuy, Guojun Wangyz, and Jie Wuz,”Secure and privacy preserving keyword searching for cloud storage services”, ELSEVIER Journal of Network and computer Applications, March 2011
  2. Ming Li et al.,” Authorized Private Keyword Search over Encrypted Data in Cloud Computing,IEEE proc. International conference on distributed computing systems, June 2011,pages 383-392
  3. Cong Wang et al.,”Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 23, no. 8, August 2012
  4. Kui Ren et al., “Towards Secure and Effective Data utilization in Public Cloud”, IEEE Transactions on Network, volume 26, Issue 6, November / December 2012
  5. Ming Li et al.,”Toward Privacy-Assured and Searchable Cloud Data Storage Services”, IEEE Transactions on Network, volume 27, Issue 4, July/August 2013
  6. Wei Zhou et al., “K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing “Journal of Software Engineering and Applications, Scientific Research , Issue 6, Volume 29-32,January2013
  7. J. Baek et al., “Public key encryption with keyword search revisited", in ICCSA 2008, vol. 5072 of Lecture Notes in Computer Science, pp. 1249 - 1259, Perugia, Italy, 2008. Springer Berlin/Heidelberg.
  8. H. S. Rhee et al., “Trapdoor security in a searchable public-key encryption scheme with a designated tester," The Journal of Systems and Software, vol. 83, no. 5, pp. 763-771, 2010.
  9. Peng Xu et al., Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack”,IEEE Transactions on computers, vol. 62, no. 11, November 2013
  10. Ning Cao et al.,” Privacy-Preserving Multi- Keyword Ranked Search over Encrypted Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, jan 2014
  11. D. X. D. Song, D. Wagner, and A. Perrig, ”Practical techniques for searches on encrypted data,” in Proc. S & P, BERKELEY, CA, 2000, pp. 44.
  12. C. Wang, N. Cao, K. Ren, and W. J. Lou, Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
  13. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, ”Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” in Proc. ASIACCS, Hangzhou, China, 2013, pp. 71-82.
  14. R. X. Li, Z. Y. Xu, W. S. Kang, K. C. Yow, and C. Z. Xu, Efficient multi-keyword ranked query over encrypted data in cloud computing, Futur. Gener. Comp. Syst., vol. 30, pp. 179-190, Jan. 2014.
  15. Gurdeep Kaur, Poonam Nandal, “Ranking Algorithm of Web Documents using Ontology”, IOSR Journal of Computer Engineering (IOSR-JCE) eISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VIII (May-Jun. 2014), PP 52-55

Downloads

Published

2019-02-28

Issue

Section

Research Articles

How to Cite

[1]
Amrita L. Nagpurkar, Nidhi C. Yadav, Shrutika R. Hiwase, Mayuri V. Deshmukh, Jaysika M. Adikane, Jyoti D. Tank, " Efficient Retrieval of Encrypted Data by Multi-Keyword Search in Cloud Storage, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 5, Issue 5, pp.46-55, February-2019.