International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 76
FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE
P.RAGUL PRASAD
B.E. Department of CSE, Sri Ramakrishna Engineering College, Coimbatore,
Tamil Nadu, India
S.RAKKESH
B.E. Department of CSE, Sri Ramakrishna Engineering College, Coimbatore,
Tamil Nadu, India
V.P.SHANMUGAM
B.E. Department of CSE, Sri Ramakrishna Engineering College, Coimbatore,
Tamil Nadu, India
Mr. S. SURESH KUMAR
Assistant Professor (Sr.G), Department of CSE, Sri Ramakrishna Engineering College, Coimbatore,
Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing has generated much
interest in the research community in recent years for its
many advantages, but has also raise security and privacy
concerns. The storage and access of confidential documents
have been identified as one of the central problems in the
area. In particular, many researchers investigated solutions
to search over encrypted documents storedon remotecloud
servers. While many schemes have been proposed to
perform conjunctive keywordsearch,lessattentionhasbeen
noted on more specialized searching techniques. In this
paper, we present a phrasesearchtechniquebasedonBloom
filters that is significantly faster than existingsolutions,with
similar or better storage and communication cost.
Our technique uses a series of n-gram filters to
support the functionality. The scheme exhibits a trade-off
between storage and false positive rate, and is adaptable to
defend against inclusion-relation attacks.Adesignapproach
based on an application’s target false positive rate is also
described.
Key Words: CLOUD COMPUTING, ENCRYPTED
DOCUMENTS,CONJUCTIVE KEYWORDS
1. INTRODUCTION
As organizations and individuals adopt cloud
technologies, many have become aware of the serious
concerns regarding security and privacy of accessing
personal and confidential information over the Internet. In
particular, there cent and continuingdata breacheshighlight
the need for more secure cloud storage systems. While it is
generally agreed that encryption is necessary, cloud
providers often perform the encryption and maintain the
private keys instead of the data owners. That is, the cloud
can read any data it desired, providing no privacy to its
users. The storage of private keys and encrypted data by the
cloud provider is also problematic in case of data breach.
Hence, researchers have actively been exploring solutions
for secure storage on private and public clouds where
private keys remain in the hands of data owners.
Although phrase searches are processed
independently using our technique, they are typically a
specialized function in a keyword search scheme, where the
primary function is to provide conjunctive keyword
searches. Therefore, we describe both the basic conjunctive
keyword search algorithm and the basic phrase search
algorithm.
2. RELATED WORK
Cloud computing provides elastic data storage and
processing services. Although existing research has
proposed preferred search on the plaintext files and
encrypted search, no method has been proposed that
integrates the two techniques to efficiently conduct
preferred and privacy-preserving search over large
datasets in the cloud.
Enterprisesoutsourcingtheirdatabasestothecloud
and authorizing multiple users for access represents a
typical use scenario of cloud storage services. In such a case
of database outsourcing, data encryption is a good approach
enabling the data owner to retain its control over the
outsourced data. Searchable encryption is a cryptographic
primitive allowing for private keyword based search over
the encrypted database. The above setting of enterprise
outsourcing database to the cloud requires multi-user
searchable encryption, whereas virtually all of the existing
schemes consider the single-user setting.
Due to the high popularityof cloudcomputing, more
data owners are motivated to outsourcethedata tothecloud
server. In that sensitive data will be encrypted before
outsourcing to the cloud server for security purpose. In this
paper, we introduce a secure multi-keyword ranked search
over encrypted cloud data, which performs dynamic update
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 77
operations like deletion and insertion of documents. By
combining the vector space model and widely used TFxIDF
model for the index construction and query generation
Due to the high popularityof cloudcomputing, more
data owners are motivated to outsourcethedata tothecloud
server. In that sensitive data will be encrypted before
outsourcing to the cloud server for security purpose. In this
paper, we introduce a secure multi-keyword ranked search
over encrypted cloud data, which performs dynamic update
operations like deletion and insertion of documents. By
combining the vector space model and widely used TFxIDF
model for the index construction and query generation
3. OVERVIEW OF PROPOSED SYSTEM
Our framework differs from some of the earlier works,
where keywords generally consist of meta-data rather than
content of the files and where a trustedkeyescrowauthority
is used due to the use of Identity based encryption. When
compared to recent works, where an organization wishes to
outsource computing resources to a cloud storage provider
and enable search for its employees, where the aim is to
return properly ranked files. Most other recent works
related to search over encrypted data have considered
similar models such as, where the client acts as both data
owner and user.
LIST OF MODULES
 HOME.
 DATA OWNER MODULE.
 DATA USER MODULE.
 CLOUD STORAGE.
DATA OWNER MODULE:
a) Registration Module:
Registration module is used for admin
authentication purpose in which administrator can
only access this admin module. It contains
authentication type and personal details of admin
such as name, designation, mail id, phone number,
address, username, password, date of birth, photo
and also it can be stored and maintained in
database. The person who is authenticating it will
access it by using username and password.
b) Login Module:
This module checks the admin register
page by checking with mail id and password which
is already stored in database. It true data is
authenticated that allows to go for main admin
module or otherwise that will stay in current page
by showing up alert message as Invalid User.
c) Home Module:
In this module Data Owner Home this
contains Basic functionalities of cloud that can be
helpful for data Owner who is logged on already
in session.
d) Upload Module:
In which, the files are uploadedinformatof
file name, keywords .In this case single keyword
does not helps in the searching to avoid this we are
using three types of keyword to fetch the file. The
file are stored in the encrypted formats.
e) My Files Module:
My Files pageshowsfileswhichisuploaded
by particular data user.
F) Approvals Module:
In this module, the request send by the
data user can be authenticated by the data owner.
Either accepts the request or rejects the request.
G) Logout:
This module which completely moves you
out from the data owner session to the home
session.
Fig1:data owner module
DATA USER MODULE :
a) Registration Module:
Registration module is used for data user
authentication purpose in which administrator can only
access this admin module. It contains authentication type
and personal details of admin such as name, designation,
mail id, phone number, address, username, and password,
date of birth, photo and also it can be stored and maintained
in database. The person who is authenticatingitwill accessit
by using username and password.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 78
b) Login Module:
This module checks the admin register page by
checking with mail id and password which is already stored
in database. It true data is authenticated that allowstogofor
main admin module or otherwise that will stay in current
page by showing up alert message as Invalid User.
c) Home Module:
In this module Data user Home this contains Basic
functionalities of cloud that can be helpful for data Owner
who is logged on already in session.
d) Search:
Search module, in which you can search the file that
you want. The search request is send as query that finds the
data from the cloud andshowsyourapproximatesearch, you
can send request to the file so that particular data owner
either accept/decline request as their wish.
e) Requested files:
This shows your file is either accepted or not. If
accepted you can view file by particular generated
decryption key so that encrypted file will be downloaded as
decrypted the readable format.
g)Logout:
This module which completely moves you out from
the data user session to the home session.
Fig2:data user module
CLOUD STORAGE:
Fig3:cloud storage
This module completely shows the accurate data stored in
the cloud storage .This help you search file that you needed.
4. SOFTWARE SPECIFICATION
J2ME
Sun Microsystems defines J2ME as "a highly optimized Java
run-time environment targeting a wide range of consumer
products, including pagers, cellular phones, screen-phones,
digital set-top boxes and car navigation systems."
Announced in June 1999 at the Java One Developer
Conference, J2ME brings the cross-platform functionality of
the Java language to smaller devices, allowing mobile
wireless devices to share applications. With J2ME, Sun has
adapted the Java platform for consumer products that
incorporate or are based on small computing devices.
General J2ME architecture
J2ME uses configurations and profiles to
customize the Java Runtime Environment (JRE). As a
complete JRE, J2ME is comprised of a configuration, which
determines the JVM used, and a profile, which defines the
application by adding domain-specific classes. The
configuration defines the basic run-time environment as a
set of core classes and a specific JVM that run on specific
types of devices. We'll discuss configurations in detail in the
profile defines the application; specifically, it adds domain-
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 79
specific classes to the J2ME configuration to define certain
uses for devices. We'll cover profiles in depth in the
following graphic depicts the relationship between the
different virtual machines, configurations, and profiles. It
also draws a parallel with the J2SE API and its Java virtual
machine. While the J2SE virtual machine is generally
referred to as a JVM, the J2ME virtual machines, KVM and
CVM, are subsets of JVM. Both KVM and CVM can be thought
of as a kind of Java virtual machine -- it's just that they are
shrunken versions of the J2SE JVM and are specific to J2ME.
5. CONCLUSION
A phrase searchschemebasedonBloomfilterthatis
significantly faster than Existing approaches, requiring only
a single round of communication and Bloom filter
verifications. Our approach is also the first to effectively
allow phrase search to run independently without first
performing a conjunctive keyword search to identify
candidate documents.Thetechniqueofconstructinga Bloom
filter index enables fast verification of Bloom filters in the
same manner as indexing. According to our experiment, it
also achieves a lower storage cost than all existing solutions
except where a higher computational cost was exchanged in
favor of lower storage. While exhibiting similar
communication cost to leading existing solutions, the
proposed solution can also be adjusted to achievemaximum
speed or high speed with a reasonable storage cost
depending on the application.
Various challenges in the area of Hidden
web data extraction and their possible solutions have been
discussed. Although this system extracts, collects and
integrates the data from various hidden websites
successfully, this work could be extended in near future. In
this work, a search engine shell has been created which was
tested on a particular domain. This work could be extended
for other domains by integrating this work with the unified
search interface.
6. REFERENCES
1) K. Cai, C. Hong, M. Zhang, D. Feng, and Z.Lv, “A
secure conjunctive keywords search over
encrypted cloud data against inclusion-
relation attack,” in IEEE International
Conference on Cloud Computing Technology
and Science, 2013.
2) Y. Yang, H. Lu, and J. Weng, “Multi-user private
keyword search for cloud computing,” in IEEE
Third International Conference on Cloud
Computing Technology and Science, 2011.
3) C. Wang, N. Cao, J. Li, K. Ren, and W. Lou,
“Secure ranked keyword search over
encrypted cloud data,” in International
Conference on Distributed Computing
Systems, 2010.
4) HusM. T. Goodrich, M. Mitzenmacher, O.
Ohrimenko, and R. Tamassia, “Practical
oblivious storage,”inProceedingsoftheSecond
ACM Conference on Data and Application
Security and Privacy, 2012.
5) Mark Grand and Jonathan Knudsen, “Java
Fundamental Classes Reference”, Tata
McGraw-Hill Publishing Company Limited, 1st
Edition, May 1997.
6) Dietel & Deitel, Java How To Program, BPB
Publishers, New Delhi, 2000.
7) O’reilly, Java Swings, Tata McGrawHill, Fifth
Edition, 2002.

More Related Content

PDF
IRJET- Redsc: Reliablity of Data Sharing in Cloud
PDF
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
PDF
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
PDF
Dynamic Resource Allocation and Data Security for Cloud
PDF
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
PDF
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
PDF
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
PDF
J017547478
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
Dynamic Resource Allocation and Data Security for Cloud
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
J017547478

What's hot (20)

PDF
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
PDF
A Novel Information Accountability Framework for Cloud Computing
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PDF
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
PDF
IRJET- Adaptable Wildcard Searchable Encryption System
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
PDF
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
PDF
Enhanced security framework to ensure data security
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
International Journal of Engineering Research and Development
PDF
Survey on securing outsourced storages in cloud
PDF
Survey on securing outsourced storages in cloud
PDF
A novel graphical password approach for accessing cloud & data verification
PDF
Cloud Data Security and Secure Data Sharing Methods
PDF
I42024349
PDF
Secure Data Self-Destructing with Time Constraint in Clouds
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PDF
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
PDF
Survey On: Auditing Public Clouds
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
A Novel Information Accountability Framework for Cloud Computing
IRJET- Secure Cloud Data Using Attribute Based Encryption
Integrity Privacy to Public Auditing for Shared Data in Cloud Computing
IRJET- Adaptable Wildcard Searchable Encryption System
Secure Data Sharing In an Untrusted Cloud
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security in cloud using security b...
International Journal of Engineering Research and Development
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
A novel graphical password approach for accessing cloud & data verification
Cloud Data Security and Secure Data Sharing Methods
I42024349
Secure Data Self-Destructing with Time Constraint in Clouds
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
Survey On: Auditing Public Clouds
Ad

Similar to IRJET- Fast Phrase Search for Encrypted Cloud Storage (20)

PDF
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
PDF
IRJET- Securing Cloud Data Under Key Exposure
PDF
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
PDF
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
PDF
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
PDF
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
PDF
IRJET- Sharing Session Key to Protect Data in Cloud Storage
PDF
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
Cloud Storage System like Dropbox
PDF
Towards Achieving Efficient and Secure Way to Share the Data
PDF
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
PDF
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
PDF
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
PDF
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
PDF
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET- Securing Cloud Data Under Key Exposure
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Sharing Session Key to Protect Data in Cloud Storage
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Cloud Storage System like Dropbox
Towards Achieving Efficient and Secure Way to Share the Data
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PPTX
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PDF
Lesson 3 .pdf
PPT
UNIT-I Machine Learning Essentials for 2nd years
PPTX
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
PDF
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
PPTX
Micro1New.ppt.pptx the mai themes of micfrobiology
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PDF
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
PPTX
CS6006 - CLOUD COMPUTING - Module - 1.pptx
PDF
Beginners-Guide-to-Artificial-Intelligence.pdf
PPTX
Chapter-8 Introduction to Quality Standards.pptx
PPTX
Solar energy pdf of gitam songa hemant k
PDF
Project_Mgmt_Institute_-Marc Marc Marc .pdf
PDF
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PPTX
Agentic Artificial Intelligence (Agentic AI).pptx
PDF
Unit1 - AIML Chapter 1 concept and ethics
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
Lesson 3 .pdf
UNIT-I Machine Learning Essentials for 2nd years
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
Micro1New.ppt.pptx the mai themes of micfrobiology
Environmental studies, Moudle 3-Environmental Pollution.pptx
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
CS6006 - CLOUD COMPUTING - Module - 1.pptx
Beginners-Guide-to-Artificial-Intelligence.pdf
Chapter-8 Introduction to Quality Standards.pptx
Solar energy pdf of gitam songa hemant k
Project_Mgmt_Institute_-Marc Marc Marc .pdf
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
MLpara ingenieira CIVIL, meca Y AMBIENTAL
Design ,Art Across Digital Realities and eXtended Reality
Agentic Artificial Intelligence (Agentic AI).pptx
Unit1 - AIML Chapter 1 concept and ethics

IRJET- Fast Phrase Search for Encrypted Cloud Storage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 76 FAST PHRASE SEARCH FOR ENCRYPTED CLOUD STORAGE P.RAGUL PRASAD B.E. Department of CSE, Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu, India S.RAKKESH B.E. Department of CSE, Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu, India V.P.SHANMUGAM B.E. Department of CSE, Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu, India Mr. S. SURESH KUMAR Assistant Professor (Sr.G), Department of CSE, Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing has generated much interest in the research community in recent years for its many advantages, but has also raise security and privacy concerns. The storage and access of confidential documents have been identified as one of the central problems in the area. In particular, many researchers investigated solutions to search over encrypted documents storedon remotecloud servers. While many schemes have been proposed to perform conjunctive keywordsearch,lessattentionhasbeen noted on more specialized searching techniques. In this paper, we present a phrasesearchtechniquebasedonBloom filters that is significantly faster than existingsolutions,with similar or better storage and communication cost. Our technique uses a series of n-gram filters to support the functionality. The scheme exhibits a trade-off between storage and false positive rate, and is adaptable to defend against inclusion-relation attacks.Adesignapproach based on an application’s target false positive rate is also described. Key Words: CLOUD COMPUTING, ENCRYPTED DOCUMENTS,CONJUCTIVE KEYWORDS 1. INTRODUCTION As organizations and individuals adopt cloud technologies, many have become aware of the serious concerns regarding security and privacy of accessing personal and confidential information over the Internet. In particular, there cent and continuingdata breacheshighlight the need for more secure cloud storage systems. While it is generally agreed that encryption is necessary, cloud providers often perform the encryption and maintain the private keys instead of the data owners. That is, the cloud can read any data it desired, providing no privacy to its users. The storage of private keys and encrypted data by the cloud provider is also problematic in case of data breach. Hence, researchers have actively been exploring solutions for secure storage on private and public clouds where private keys remain in the hands of data owners. Although phrase searches are processed independently using our technique, they are typically a specialized function in a keyword search scheme, where the primary function is to provide conjunctive keyword searches. Therefore, we describe both the basic conjunctive keyword search algorithm and the basic phrase search algorithm. 2. RELATED WORK Cloud computing provides elastic data storage and processing services. Although existing research has proposed preferred search on the plaintext files and encrypted search, no method has been proposed that integrates the two techniques to efficiently conduct preferred and privacy-preserving search over large datasets in the cloud. Enterprisesoutsourcingtheirdatabasestothecloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a good approach enabling the data owner to retain its control over the outsourced data. Searchable encryption is a cryptographic primitive allowing for private keyword based search over the encrypted database. The above setting of enterprise outsourcing database to the cloud requires multi-user searchable encryption, whereas virtually all of the existing schemes consider the single-user setting. Due to the high popularityof cloudcomputing, more data owners are motivated to outsourcethedata tothecloud server. In that sensitive data will be encrypted before outsourcing to the cloud server for security purpose. In this paper, we introduce a secure multi-keyword ranked search over encrypted cloud data, which performs dynamic update
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 77 operations like deletion and insertion of documents. By combining the vector space model and widely used TFxIDF model for the index construction and query generation Due to the high popularityof cloudcomputing, more data owners are motivated to outsourcethedata tothecloud server. In that sensitive data will be encrypted before outsourcing to the cloud server for security purpose. In this paper, we introduce a secure multi-keyword ranked search over encrypted cloud data, which performs dynamic update operations like deletion and insertion of documents. By combining the vector space model and widely used TFxIDF model for the index construction and query generation 3. OVERVIEW OF PROPOSED SYSTEM Our framework differs from some of the earlier works, where keywords generally consist of meta-data rather than content of the files and where a trustedkeyescrowauthority is used due to the use of Identity based encryption. When compared to recent works, where an organization wishes to outsource computing resources to a cloud storage provider and enable search for its employees, where the aim is to return properly ranked files. Most other recent works related to search over encrypted data have considered similar models such as, where the client acts as both data owner and user. LIST OF MODULES  HOME.  DATA OWNER MODULE.  DATA USER MODULE.  CLOUD STORAGE. DATA OWNER MODULE: a) Registration Module: Registration module is used for admin authentication purpose in which administrator can only access this admin module. It contains authentication type and personal details of admin such as name, designation, mail id, phone number, address, username, password, date of birth, photo and also it can be stored and maintained in database. The person who is authenticating it will access it by using username and password. b) Login Module: This module checks the admin register page by checking with mail id and password which is already stored in database. It true data is authenticated that allows to go for main admin module or otherwise that will stay in current page by showing up alert message as Invalid User. c) Home Module: In this module Data Owner Home this contains Basic functionalities of cloud that can be helpful for data Owner who is logged on already in session. d) Upload Module: In which, the files are uploadedinformatof file name, keywords .In this case single keyword does not helps in the searching to avoid this we are using three types of keyword to fetch the file. The file are stored in the encrypted formats. e) My Files Module: My Files pageshowsfileswhichisuploaded by particular data user. F) Approvals Module: In this module, the request send by the data user can be authenticated by the data owner. Either accepts the request or rejects the request. G) Logout: This module which completely moves you out from the data owner session to the home session. Fig1:data owner module DATA USER MODULE : a) Registration Module: Registration module is used for data user authentication purpose in which administrator can only access this admin module. It contains authentication type and personal details of admin such as name, designation, mail id, phone number, address, username, and password, date of birth, photo and also it can be stored and maintained in database. The person who is authenticatingitwill accessit by using username and password.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 78 b) Login Module: This module checks the admin register page by checking with mail id and password which is already stored in database. It true data is authenticated that allowstogofor main admin module or otherwise that will stay in current page by showing up alert message as Invalid User. c) Home Module: In this module Data user Home this contains Basic functionalities of cloud that can be helpful for data Owner who is logged on already in session. d) Search: Search module, in which you can search the file that you want. The search request is send as query that finds the data from the cloud andshowsyourapproximatesearch, you can send request to the file so that particular data owner either accept/decline request as their wish. e) Requested files: This shows your file is either accepted or not. If accepted you can view file by particular generated decryption key so that encrypted file will be downloaded as decrypted the readable format. g)Logout: This module which completely moves you out from the data user session to the home session. Fig2:data user module CLOUD STORAGE: Fig3:cloud storage This module completely shows the accurate data stored in the cloud storage .This help you search file that you needed. 4. SOFTWARE SPECIFICATION J2ME Sun Microsystems defines J2ME as "a highly optimized Java run-time environment targeting a wide range of consumer products, including pagers, cellular phones, screen-phones, digital set-top boxes and car navigation systems." Announced in June 1999 at the Java One Developer Conference, J2ME brings the cross-platform functionality of the Java language to smaller devices, allowing mobile wireless devices to share applications. With J2ME, Sun has adapted the Java platform for consumer products that incorporate or are based on small computing devices. General J2ME architecture J2ME uses configurations and profiles to customize the Java Runtime Environment (JRE). As a complete JRE, J2ME is comprised of a configuration, which determines the JVM used, and a profile, which defines the application by adding domain-specific classes. The configuration defines the basic run-time environment as a set of core classes and a specific JVM that run on specific types of devices. We'll discuss configurations in detail in the profile defines the application; specifically, it adds domain-
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 79 specific classes to the J2ME configuration to define certain uses for devices. We'll cover profiles in depth in the following graphic depicts the relationship between the different virtual machines, configurations, and profiles. It also draws a parallel with the J2SE API and its Java virtual machine. While the J2SE virtual machine is generally referred to as a JVM, the J2ME virtual machines, KVM and CVM, are subsets of JVM. Both KVM and CVM can be thought of as a kind of Java virtual machine -- it's just that they are shrunken versions of the J2SE JVM and are specific to J2ME. 5. CONCLUSION A phrase searchschemebasedonBloomfilterthatis significantly faster than Existing approaches, requiring only a single round of communication and Bloom filter verifications. Our approach is also the first to effectively allow phrase search to run independently without first performing a conjunctive keyword search to identify candidate documents.Thetechniqueofconstructinga Bloom filter index enables fast verification of Bloom filters in the same manner as indexing. According to our experiment, it also achieves a lower storage cost than all existing solutions except where a higher computational cost was exchanged in favor of lower storage. While exhibiting similar communication cost to leading existing solutions, the proposed solution can also be adjusted to achievemaximum speed or high speed with a reasonable storage cost depending on the application. Various challenges in the area of Hidden web data extraction and their possible solutions have been discussed. Although this system extracts, collects and integrates the data from various hidden websites successfully, this work could be extended in near future. In this work, a search engine shell has been created which was tested on a particular domain. This work could be extended for other domains by integrating this work with the unified search interface. 6. REFERENCES 1) K. Cai, C. Hong, M. Zhang, D. Feng, and Z.Lv, “A secure conjunctive keywords search over encrypted cloud data against inclusion- relation attack,” in IEEE International Conference on Cloud Computing Technology and Science, 2013. 2) Y. Yang, H. Lu, and J. Weng, “Multi-user private keyword search for cloud computing,” in IEEE Third International Conference on Cloud Computing Technology and Science, 2011. 3) C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,” in International Conference on Distributed Computing Systems, 2010. 4) HusM. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, “Practical oblivious storage,”inProceedingsoftheSecond ACM Conference on Data and Application Security and Privacy, 2012. 5) Mark Grand and Jonathan Knudsen, “Java Fundamental Classes Reference”, Tata McGraw-Hill Publishing Company Limited, 1st Edition, May 1997. 6) Dietel & Deitel, Java How To Program, BPB Publishers, New Delhi, 2000. 7) O’reilly, Java Swings, Tata McGrawHill, Fifth Edition, 2002.