SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 640
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted
Cloud Data
R. Prema1, K.S.D. Narendra Gupta2, K. Teja3
1Assistant Professor, Department of CSE, SCSVMV (Deemed to be University), Tamilnadu
2Student, Department of CSE, SCSVMV (Deemed to be university), Tamilnadu.
3Student, Department of CSE, SCSVMV (Deemed to be university), Tamilnadu
--------------------------------------------------------------------***--------------------------------------------------------------------
Abstract: - Due to the growing recognition of cloud
computing, an increasing number of facts proprietors are
stimulated to outsource their facts to cloud servers for
outstanding comfort and decreased fee in facts
management. However, touchy facts need to be encrypted
earlier than outsourcing for privateness requirements,
which obsoletes facts usage like key-word-primarily based
totally file retrieval.In this paper, we present a consistent
multi-key-phrase ranked are seeking scheme over
encrypted cloud facts, which simultaneously allows
dynamic update operations like deletion and insertion of
files.. Specifically, the vector area version and the widely-
used TF_IDF version are mixed withinside the index
production and question generation. We assemble a
unique tree-primarily based totally index shape and
endorse a “Greedy Depth-first Search” set of rules to offer
green multi-key-word ranked seek. The steady KNN set of
rules is applied to encrypt the index and question vectors,
and in the meantime make certain correct relevance
rating calculation among encrypted index and question
vectors. In order to withstand statistical attacks, phantom
phrases are brought to the index vector for blinding seek
results. Due to using our unique tree-primarily based
totally index shape, the proposed scheme can gain sub-
linear seek time and address the deletion and insertion of
files flexibly.
1. INTRODUCTION
Cloud computing is using computing assets (hardware and
software program) which can be introduced as a provider
over a network (commonly the Internet). The call comes
from the not unusualplace use of a cloud-fashioned image
as an abstraction for the complicated infrastructure it
incorporates in gadget diagrams. Cloud computing
entrusts faraway offerings with a user's records, software
program and computation. Cloud computing includes
hardware and software program assets made to be had at
the Internet as controlled third-celebration offerings.
These offerings commonly offer get admission to to
superior software program programs and high-cease
networks of server computers. The purpose of cloud
computing is to use conventional supercomputing, or high-
overall performance computing energy, generally utilized
by army and studies facilities, to carry out tens of trillions
of computations in keeping with second, in purchaser-
orientated programs along with monetary portfolios, to
supply customized information, to offer records garage or
to energy massive, immersive laptop games. The cloud
computing makes use of networks of massive businesses of
servers commonly strolling low-value purchaser PC
generation with specialised connections to unfold records-
processing chores throughout them. This shared IT
infrastructure incorporates massive swimming pools of
structures which can be related together. Often,
virtualization strategies are used to maximise the energy of
cloud
2. Literature Survey
1) Security challenges for the public cloud
Cloud computing represents today's maximum interesting
computing paradigm shift in statistics technology. However,
protection and privateness are perceived as number one
boundaries to its huge adoption. Here, the authors define
numerous important protection demanding situations and
inspire in addition research of protection answers for a
straightforward public cloud environment.
2) A fully homomorphic encryption scheme
We endorse the primary completely homomorphic
encryption scheme, fixing an antique open problem. Such a
scheme permits one to compute arbitrary features over
encrypted records with out the decryption key—i.e., given
encryptions E(m1), ..., E( mt) of m1, ..., m t, you can still
correctly compute a compact ciphertext that encrypts f(m1,
..., mt) for any correctly computable feature f.Fully
homomorphic encryption has severa applications. For
example, it allows encrypted seek engine queries—i.e., a
seek engine can come up with a succinct encrypted solution
to your (boolean) question with out even understanding
what your question was. It additionally allows looking on
encrypted records; you may keep your encrypted records
on a faraway server, and later have the server retrieve
handiest documents that (while decrypted) fulfill a few
boolean constraint, despite the fact that the server can't
decrypt the documents on its very own. More broadly, it
improves the performance of steady
multipartycomputation. In our solution, we start with the
aid of using designing a fairly homomorphic
"boostrappable" encryption scheme that works while the
feature f is the scheme's very own decryption feature. We
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 641
then display how, thru recursive self-embedding,
bootstrappable
Implementation
MODULES
MODULES DESCRIPTION
Data Owner Module
This module facilitates the proprietor to sign in the ones
information and additionally consist of login information.
This module facilitates the proprietor to add his record
with encryption the usage of RSA algorithm. This
guarantees the documents to be covered from
unauthorized user. Data proprietor has a set of files F =
that he desires to outsource to the cloud server in
encrypted shape whilst nevertheless preserving the
functionality to look on them for powerful utilization. In
our scheme, the records proprietor first of all builds a
stable searchable tree index I from file series F, after which
generates an encrypted file series C for F. Afterwards, the
records proprietor outsources the encrypted series C and
the stable index I to the cloud server, and securely
distributes the important thing statistics of trapdoor era
and file decryption to the legal records users. Besides, the
records proprietor is accountable for the replace operation
of his files saved withinside the cloud.
Data User Module
This module consists of the person registration login
information. This module is used to assist the consumer to
look the report the use of the a couple of key phrases idea
and get the correct end result listing primarily based
totally at the person question. The person goes to pick out
the specified report and sign up the person information
and get activation code in mail e mail earlier than input the
activation code. After person can down load the Zip report
and extract that report. Data customers are legal ones to
get admission to the files of information owner. With t
question keywords, the legal person can generate a
trapdoor TD consistent with seek manage mechanisms to
fetch okay encrypted files from cloud server. Then, the
information person can decrypt the files with the shared
mystery key.
Cloud Server and Encryption Module:
This module is used to assist the server to encrypt the
record the usage of RSA Algorithm and to transform the
encrypted record to the Zip report with activation code
after which activation code ship to the consumer for
download. Cloud server shops the encrypted record series C
and the encrypted searchable tree index I for facts owner.
Upon receiving the trapdoor TD from the facts consumer,
the cloud server executes seek over the index tree I, and
sooner or later returns the corresponding series of top-
okay ranked encrypted documents. Besides, upon receiving
the replace statistics from the facts owner, the server
wishes to replace the index I and record series C in keeping
with the obtained statistics. The cloud server withinside the
proposed scheme is taken into consideration as “honest-
but-curious”, that's hired through masses of works on
stable cloud facts seek
Rank Search Module
These modules make certain the consumer to go looking
the documents which can be searched regularly the use of
rank search. This module permits the consumer to down
load the document the use of his mystery key to decrypt the
downloaded data. This module permits the Owner to view
the uploaded documents and downloaded documents. The
proposed scheme is designed to offer now no longer
simplest multi-key-word question and correct end result
ranking, however additionally dynamic replace on report
collections. The scheme is designed to save you the cloud
server from mastering extra facts approximately the report
collection, the index tree, and the question.
CONCLUSION:
In this paper, a stable, green and dynamic seek scheme is
proposed, which helps now no longer handiest the correct
multi-key-word ranked seek however additionally the
dynamic deletion and insertion of files. We assemble a
unique key-word balanced binary tree because the index,
and recommend a “Greedy Depth-first Search” set of rules
to reap higher performance than linear seek. In addition,
the parallel seek method may be accomplished to in
addition lessen the time cost. The protection of the scheme
is included towards risk fashions via way of means of the
usage of the stable kNN set of rules. Experimental effects
reveal the performance of our proposed scheme. There are
nevertheless many mission troubles in symmetric SE
schemes. In the proposed scheme, the records proprietor is
liable for producing updating records and sending them to
the cloud server. Thus, the records proprietor desires to
shop the unencrypted index tree and the records which
might be essential to recalculate the IDF values. Such an
energetic records proprietor might not be very appropriate
for the cloud computing model. It may be a significant
however tough destiny paintings to layout a dynamic
searchable encryption scheme whose updating operation
may be finished via way of means of cloud server handiest,
in the meantime booking the cappotential to guide multi-
key-word ranked seek. In addition, because the maximum
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 642
of works approximately searchable encryption, our scheme
in particular considers the mission from the cloud server.
Actually, there are many stable demanding situations in a
multi-consumer scheme. Firstly, all of the customers
commonly preserve the equal stable key for trapdoor
technology in a symmetric SE scheme. In this case, the
revocation of the consumer is large mission. If it's miles
had to revoke a consumer on this scheme, we want to
rebuild the index and distribute the brand new stable keys
to all of the legal customers. Secondly, symmetric SE
schemes commonly anticipate that every one the records
customers are trustworthy. It isn't always realistic and a
bent records consumer will lead to many stable troubles.
For example, a bent records consumer can also
additionally seek the files and distribute the decrypted files
to the unauthorized ones. Even more, a bent records
consumer can also additionally distribute his/her stable
keys to the unauthorized ones. In the destiny works, we
are able to try and enhance the SE
REFERENCES
[1] K. Ren, C.Wang, Q.Wang et al., “Security challenges for
the public cloud,”IEEE Internet Computing, vol. 16, no. 1,
pp. 69–73, 2012.
[2] S. Kamara and K. Lauter, “Cryptographic cloud storage,”
in FinancialCryptography and Data Security. Springer,
2010, pp. 136–149.
[3] C. Gentry, “A fully homomorphic encryption scheme,”
Ph.D. dissertation,Stanford University, 2009.
[4] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou,
“Fuzzy keywordsearch over encrypted data in cloud
computing,” in INFOCOM, 2010 Proceedings IEEE. IEEE,
2010, pp. 1–5.
[5] M. Kuzu, M. S. Islam, and M. Kantarcioglu, “Efficient
similarity search overencrypted data,” in Data
Engineering (ICDE), 2012 IEEE 28th International
Conference on. IEEE, 2012, pp. 1156–1167.
[6] C. Wang, K. Ren, S. Yu, and K. M. R. Urs, “Achieving
usable and privacy-assured similarity search over
outsourced cloud data,” in INFOCOM, 2012 Proceedings
IEEE. IEEE, 2012, pp. 451–459.

More Related Content

PDF
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
 
PDF
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
IJCI JOURNAL
 
PDF
Retrieving Secure Data from Cloud Using OTP
AM Publications
 
PDF
Paper id 28201425
IJRAT
 
PDF
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Editor IJCATR
 
PDF
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
 
PDF
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET Journal
 
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
IJCI JOURNAL
 
Retrieving Secure Data from Cloud Using OTP
AM Publications
 
Paper id 28201425
IJRAT
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Editor IJCATR
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET Journal
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology
 

Similar to A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data (20)

DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
 
DOCX
A secure and dynamic multi keyword ranked
nexgentech15
 
PDF
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET Journal
 
PDF
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
 
PDF
IRJET- Fast Phrase Search for Encrypted Cloud Storage
IRJET Journal
 
PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
 
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
 
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
 
PDF
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
Iaetsd Iaetsd
 
PDF
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Dakshineshwar Swain
 
PDF
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
 
PDF
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
 
PDF
IRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET Journal
 
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
 
PDF
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET Journal
 
PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
PDF
2016 BE Final year Projects in chennai - 1 Crore Projects
1crore projects
 
PDF
IJSRED-V2I2P55
IJSRED
 
PDF
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
 
A secure and dynamic multi keyword ranked
nexgentech15
 
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
IRJET Journal
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
 
IRJET- Fast Phrase Search for Encrypted Cloud Storage
IRJET Journal
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
 
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
Iaetsd Iaetsd
 
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Dakshineshwar Swain
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
 
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
 
IRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET Journal
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET Journal
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
2016 BE Final year Projects in chennai - 1 Crore Projects
1crore projects
 
IJSRED-V2I2P55
IJSRED
 
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PDF
JUAL EFIX C5 IMU GNSS GEODETIC PERFECT BASE OR ROVER
Budi Minds
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
Inventory management chapter in automation and robotics.
atisht0104
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
Zero Carbon Building Performance standard
BassemOsman1
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Information Retrieval and Extraction - Module 7
premSankar19
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
JUAL EFIX C5 IMU GNSS GEODETIC PERFECT BASE OR ROVER
Budi Minds
 

A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 640 A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data R. Prema1, K.S.D. Narendra Gupta2, K. Teja3 1Assistant Professor, Department of CSE, SCSVMV (Deemed to be University), Tamilnadu 2Student, Department of CSE, SCSVMV (Deemed to be university), Tamilnadu. 3Student, Department of CSE, SCSVMV (Deemed to be university), Tamilnadu --------------------------------------------------------------------***-------------------------------------------------------------------- Abstract: - Due to the growing recognition of cloud computing, an increasing number of facts proprietors are stimulated to outsource their facts to cloud servers for outstanding comfort and decreased fee in facts management. However, touchy facts need to be encrypted earlier than outsourcing for privateness requirements, which obsoletes facts usage like key-word-primarily based totally file retrieval.In this paper, we present a consistent multi-key-phrase ranked are seeking scheme over encrypted cloud facts, which simultaneously allows dynamic update operations like deletion and insertion of files.. Specifically, the vector area version and the widely- used TF_IDF version are mixed withinside the index production and question generation. We assemble a unique tree-primarily based totally index shape and endorse a “Greedy Depth-first Search” set of rules to offer green multi-key-word ranked seek. The steady KNN set of rules is applied to encrypt the index and question vectors, and in the meantime make certain correct relevance rating calculation among encrypted index and question vectors. In order to withstand statistical attacks, phantom phrases are brought to the index vector for blinding seek results. Due to using our unique tree-primarily based totally index shape, the proposed scheme can gain sub- linear seek time and address the deletion and insertion of files flexibly. 1. INTRODUCTION Cloud computing is using computing assets (hardware and software program) which can be introduced as a provider over a network (commonly the Internet). The call comes from the not unusualplace use of a cloud-fashioned image as an abstraction for the complicated infrastructure it incorporates in gadget diagrams. Cloud computing entrusts faraway offerings with a user's records, software program and computation. Cloud computing includes hardware and software program assets made to be had at the Internet as controlled third-celebration offerings. These offerings commonly offer get admission to to superior software program programs and high-cease networks of server computers. The purpose of cloud computing is to use conventional supercomputing, or high- overall performance computing energy, generally utilized by army and studies facilities, to carry out tens of trillions of computations in keeping with second, in purchaser- orientated programs along with monetary portfolios, to supply customized information, to offer records garage or to energy massive, immersive laptop games. The cloud computing makes use of networks of massive businesses of servers commonly strolling low-value purchaser PC generation with specialised connections to unfold records- processing chores throughout them. This shared IT infrastructure incorporates massive swimming pools of structures which can be related together. Often, virtualization strategies are used to maximise the energy of cloud 2. Literature Survey 1) Security challenges for the public cloud Cloud computing represents today's maximum interesting computing paradigm shift in statistics technology. However, protection and privateness are perceived as number one boundaries to its huge adoption. Here, the authors define numerous important protection demanding situations and inspire in addition research of protection answers for a straightforward public cloud environment. 2) A fully homomorphic encryption scheme We endorse the primary completely homomorphic encryption scheme, fixing an antique open problem. Such a scheme permits one to compute arbitrary features over encrypted records with out the decryption key—i.e., given encryptions E(m1), ..., E( mt) of m1, ..., m t, you can still correctly compute a compact ciphertext that encrypts f(m1, ..., mt) for any correctly computable feature f.Fully homomorphic encryption has severa applications. For example, it allows encrypted seek engine queries—i.e., a seek engine can come up with a succinct encrypted solution to your (boolean) question with out even understanding what your question was. It additionally allows looking on encrypted records; you may keep your encrypted records on a faraway server, and later have the server retrieve handiest documents that (while decrypted) fulfill a few boolean constraint, despite the fact that the server can't decrypt the documents on its very own. More broadly, it improves the performance of steady multipartycomputation. In our solution, we start with the aid of using designing a fairly homomorphic "boostrappable" encryption scheme that works while the feature f is the scheme's very own decryption feature. We
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 641 then display how, thru recursive self-embedding, bootstrappable Implementation MODULES MODULES DESCRIPTION Data Owner Module This module facilitates the proprietor to sign in the ones information and additionally consist of login information. This module facilitates the proprietor to add his record with encryption the usage of RSA algorithm. This guarantees the documents to be covered from unauthorized user. Data proprietor has a set of files F = that he desires to outsource to the cloud server in encrypted shape whilst nevertheless preserving the functionality to look on them for powerful utilization. In our scheme, the records proprietor first of all builds a stable searchable tree index I from file series F, after which generates an encrypted file series C for F. Afterwards, the records proprietor outsources the encrypted series C and the stable index I to the cloud server, and securely distributes the important thing statistics of trapdoor era and file decryption to the legal records users. Besides, the records proprietor is accountable for the replace operation of his files saved withinside the cloud. Data User Module This module consists of the person registration login information. This module is used to assist the consumer to look the report the use of the a couple of key phrases idea and get the correct end result listing primarily based totally at the person question. The person goes to pick out the specified report and sign up the person information and get activation code in mail e mail earlier than input the activation code. After person can down load the Zip report and extract that report. Data customers are legal ones to get admission to the files of information owner. With t question keywords, the legal person can generate a trapdoor TD consistent with seek manage mechanisms to fetch okay encrypted files from cloud server. Then, the information person can decrypt the files with the shared mystery key. Cloud Server and Encryption Module: This module is used to assist the server to encrypt the record the usage of RSA Algorithm and to transform the encrypted record to the Zip report with activation code after which activation code ship to the consumer for download. Cloud server shops the encrypted record series C and the encrypted searchable tree index I for facts owner. Upon receiving the trapdoor TD from the facts consumer, the cloud server executes seek over the index tree I, and sooner or later returns the corresponding series of top- okay ranked encrypted documents. Besides, upon receiving the replace statistics from the facts owner, the server wishes to replace the index I and record series C in keeping with the obtained statistics. The cloud server withinside the proposed scheme is taken into consideration as “honest- but-curious”, that's hired through masses of works on stable cloud facts seek Rank Search Module These modules make certain the consumer to go looking the documents which can be searched regularly the use of rank search. This module permits the consumer to down load the document the use of his mystery key to decrypt the downloaded data. This module permits the Owner to view the uploaded documents and downloaded documents. The proposed scheme is designed to offer now no longer simplest multi-key-word question and correct end result ranking, however additionally dynamic replace on report collections. The scheme is designed to save you the cloud server from mastering extra facts approximately the report collection, the index tree, and the question. CONCLUSION: In this paper, a stable, green and dynamic seek scheme is proposed, which helps now no longer handiest the correct multi-key-word ranked seek however additionally the dynamic deletion and insertion of files. We assemble a unique key-word balanced binary tree because the index, and recommend a “Greedy Depth-first Search” set of rules to reap higher performance than linear seek. In addition, the parallel seek method may be accomplished to in addition lessen the time cost. The protection of the scheme is included towards risk fashions via way of means of the usage of the stable kNN set of rules. Experimental effects reveal the performance of our proposed scheme. There are nevertheless many mission troubles in symmetric SE schemes. In the proposed scheme, the records proprietor is liable for producing updating records and sending them to the cloud server. Thus, the records proprietor desires to shop the unencrypted index tree and the records which might be essential to recalculate the IDF values. Such an energetic records proprietor might not be very appropriate for the cloud computing model. It may be a significant however tough destiny paintings to layout a dynamic searchable encryption scheme whose updating operation may be finished via way of means of cloud server handiest, in the meantime booking the cappotential to guide multi- key-word ranked seek. In addition, because the maximum
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 642 of works approximately searchable encryption, our scheme in particular considers the mission from the cloud server. Actually, there are many stable demanding situations in a multi-consumer scheme. Firstly, all of the customers commonly preserve the equal stable key for trapdoor technology in a symmetric SE scheme. In this case, the revocation of the consumer is large mission. If it's miles had to revoke a consumer on this scheme, we want to rebuild the index and distribute the brand new stable keys to all of the legal customers. Secondly, symmetric SE schemes commonly anticipate that every one the records customers are trustworthy. It isn't always realistic and a bent records consumer will lead to many stable troubles. For example, a bent records consumer can also additionally seek the files and distribute the decrypted files to the unauthorized ones. Even more, a bent records consumer can also additionally distribute his/her stable keys to the unauthorized ones. In the destiny works, we are able to try and enhance the SE REFERENCES [1] K. Ren, C.Wang, Q.Wang et al., “Security challenges for the public cloud,”IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, 2012. [2] S. Kamara and K. Lauter, “Cryptographic cloud storage,” in FinancialCryptography and Data Security. Springer, 2010, pp. 136–149. [3] C. Gentry, “A fully homomorphic encryption scheme,” Ph.D. dissertation,Stanford University, 2009. [4] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keywordsearch over encrypted data in cloud computing,” in INFOCOM, 2010 Proceedings IEEE. IEEE, 2010, pp. 1–5. [5] M. Kuzu, M. S. Islam, and M. Kantarcioglu, “Efficient similarity search overencrypted data,” in Data Engineering (ICDE), 2012 IEEE 28th International Conference on. IEEE, 2012, pp. 1156–1167. [6] C. Wang, K. Ren, S. Yu, and K. M. R. Urs, “Achieving usable and privacy-assured similarity search over outsourced cloud data,” in INFOCOM, 2012 Proceedings IEEE. IEEE, 2012, pp. 451–459.