An Encrypted and Dynamic Multi-Keyword Ranked Search in Cloud Storage

Authors

  • Alisha Damodare  BE Students, Department of Information Technology, Rajiv Gandhi College of Engineering and Research, Nagpur, Maharashtra, India
  • Prajakta Lanjewar  BE Students, Department of Information Technology, Rajiv Gandhi College of Engineering and Research, Nagpur, Maharashtra, India
  • Neha Bhoyar  BE Students, Department of Information Technology, Rajiv Gandhi College of Engineering and Research, Nagpur, Maharashtra, India
  • Manasi Bire  BE Students, Department of Information Technology, Rajiv Gandhi College of Engineering and Research, Nagpur, Maharashtra, India
  • Vaishnavi Ajankar  BE Students, Department of Information Technology, Rajiv Gandhi College of Engineering and Research, Nagpur, Maharashtra, India
  • Prof. Manish. M. Goswami   Assistant Professor, Department of Information Technology, Rajiv Gandhi College of Engineering and Research, Nagpur, Maharashtra, India

Keywords:

Cloud computing, Encryption, Inner product similarity, Single Keyword Search, Multi-keyword search, ranking.

Abstract

Recently, advancement of private and semi-private information has grown up rapidly on information mastermind; instruments to interest such information have bombarded in security protecting. The security sparing looking for is expecting basic part in the field of information frameworks to perform diverse data mining activities on encoded data set away in various storing systems. It is furthermore fundamental and testing undertaking to secure the mystery of private data shared among master communities and data proprietors. Existing system gives one possible course of action that is security protecting requesting (PPI). In this structure, chronicles are secured fit as a fiddle on private server that is security is exchanged off. So to enhance this system to influence it more to secure and viable, first we store the records on server fit as a fiddle and after that usage Key Distribution Center (KDC) for allowing deciphering of data gotten from private server, at client side. We moreover complete TF-IDF, which gives the compelling situating of results, to improve the customer look inclusion. Finally we coordinate the wide tests on dataset, to survey the execution of our proposed structure. Exploratory results will show that the proposed system is better than anything existing one, to the extent, insurance protecting, capable and secure request on mixed appropriated files.

References

  1. Qin Liuy, Guojun Wangyz, and Jie Wuz,”Secure and privacy preserving keyword searching for cloud storage services”, ELSEVIER Journal of Network and computer Applications, March 2011
  2. Ming Li et al.,” Authorized Private Keyword Search over Encrypted Data in Cloud Computing,IEEE proc. International conference on distributed computing systems, June 2011,pages 383-392
  3. Cong Wang et al.,”Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 23, no. 8, August 2012
  4. Kui Ren et al., “Towards Secure and Effective Data utilization in Public Cloud”, IEEE Transactions on Network, volume 26, Issue 6, November / December 2012
  5. Ming Li et al.,”Toward Privacy-Assured and Searchable Cloud Data Storage Services”, IEEE Transactions on Network, volume 27, Issue 4, July/August 2013
  6. Wei Zhou et al., “K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing “Journal of Software Engineering and Applications, Scientific Research , Issue 6, Volume 29-32,January2013
  7. J. Baek et al., “Public key encryption with keyword search revisited", in ICCSA 2008, vol. 5072 of Lecture Notes in Computer Science, pp. 1249 - 1259, Perugia, Italy, 2008. Springer Berlin/Heidelberg.
  8. H. S. Rhee et al., “Trapdoor security in a searchable public-key encryption scheme with a designated tester," The Journal of Systems and Software, vol. 83, no. 5, pp. 763-771, 2010.
  9. Peng Xu et al., Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack”,IEEE Transactions on computers, vol. 62, no. 11, November 2013
  10. Ning Cao et al.,” Privacy-Preserving Multi- Keyword Ranked Search over Encrypted Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, jan 2014
  11. D. X. D. Song, D. Wagner, and A. Perrig, ”Practical techniques for searches on encrypted data,” in Proc. S & P, BERKELEY, CA, 2000, pp. 44.
  12. C. Wang, N. Cao, K. Ren, and W. J. Lou, Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
  13. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, ”Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” in Proc. ASIACCS, Hangzhou, China, 2013, pp. 71-82.
  14. R. X. Li, Z. Y. Xu, W. S. Kang, K. C. Yow, and C. Z. Xu, Efficient multi-keyword ranked query over encrypted data in cloud computing, Futur. Gener. Comp. Syst., vol. 30, pp. 179-190, Jan. 2014.
  15. Gurdeep Kaur, Poonam Nandal, “Ranking Algorithm of Web Documents using Ontology”, IOSR Journal of Computer Engineering (IOSR-JCE) eISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VIII (May-Jun. 2014), PP 52-55

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Alisha Damodare, Prajakta Lanjewar, Neha Bhoyar, Manasi Bire, Vaishnavi Ajankar, Prof. Manish. M. Goswami , " An Encrypted and Dynamic Multi-Keyword Ranked Search in Cloud Storage, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.1510-1519, January-February-2018.