International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 556
Privacy Preserving Keyword Search over Encrypted Data in the Cloud
D. VETRISELVI1, N.M. JAYASHRI2
1Assistant Professor Deptartment of Computer Science and Engineering Jeppiaar SRR Engineering College, Padur
Chennai, Tamil Nadu, INDIA
2B.E Department of Computer Science and Engineering Jeppiaar SRR Engineering College, Padur
Chennai, Tamil Nadu, INDIA
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Research in cloud computing is receiving tons of
attention from both academic and industrial worlds. Clouds
can provide several kind of services like applications (e.g.,
Google Apps, Microsoft online), infrastructures (e.g.,Amazon’s
EC2, Eucalyptus, Nimbus), and platforms to assist developers
write applications(e.g., Amazon’sS3, WindowsAzure). Muchof
the info stored in clouds is very sensitive, for instance , medical
records and social networks. Security and privacy are thus
vital issues in cloud computing. The user should authenticate
itself before beginning any transaction. It must be ensured
that the cloud doesn't tamper with the data that is out
sourced.In order to search in cloud, some requirements is
needed, search over encrypted data should support the
following three functions. In one hand, the searchable
encryption schemes support keyword search, and supply an
equivalent user experience as searching in Google search with
different keywords; single-keyword search is way from
satisfactory by only returning very limited and inaccurate
search results.,The search user would typically prefer cloud
servers to sort the returned search leads to a relevance-based
order ranked by the relevance of the search request to the
documents.
Key Words: EfficientRevocation,CiphertextPolicyAttribute
Based Encryption, Standard Model
1. INTRODUCTION
Mobile cloud computing has been detailed as a key enabling
technology to overcome the physical limit of mobile devices
towards scalable and flexible mobile services. In the mobile
cloud environment searchable encryption, which allows
precisely search over encrypted data, is a key technique to
maintain both the privacy andavailableofoutsourceddata in
cloud. On addressing the hardness , many research efforts
resolve to using the searchable symmetric encryption (SSE)
and searchable public-key encryption (SPE). By giving
thorough security analysis, we demonstrate that PSU are
able to do a high security level. Using extensive experiments
during a realworld mobile environment,weshowthatPUSis
more efficient compared with the prevailing proposals.
1.1 Proposed system
In Proposed system, PSU (personalized search)schemewith
efficient and secure updates we introduced an efficient and
reliable methodology for search over encrypted data.Here
the encrypted keyword search pre computes the resulting
hunt documents for the input query from users through
Natural language processing Techniquewhichiscarryout on
gateway (client side) on user fileupload.Hencethematching
documents which is pre compute the before arching the
encrypted cloud contents are retrieved from cloud. Here we
does not pull all the encrypted data’s from cloud for
searching, which is time consuming and inadequate. The
matching documents memory locations on mobile storage
are restore from the serializable objects whichisreservedin
the gateway. User can download the produced documents
after getting the keys from the group owner. Asymmetric
kind of encryption for key re-encryption and is more
assured.
2. TECHNOLOGIES USED
a) Cloud Computing
Cloud computing may be a sort of computing during which
dynamically scalable and sometimes virtualities resources
are provided as a service over the web .Users needn't have
knowledge of, skills in, or control over the technology
infrastructure within the "cloud" that supports them. The
concept generally conditions combinations of
infrastructureas a service (IaaS), platform as a service
(PaaS), software as a service (SaaS).Cloud computing
customers do notcommonly ownthephysical infrastructure.
serving as host to the software platform in question.Instead,
they avoid capital expenditure byrentingusagefroma third-
party provider.Cloud computing is a style of computing in
which dynamically scalable and often virtualized resources
are provided as a service over the web .Users needn't have
knowledge of, expertise in, or control over the technology
infrastructure in the"cloud"thatsupportsthem.Theconcept
generally incorporates combinations of infrastructure as a
service (IaaS) ,platform as a service (PaaS) ,software as a
service (SaaS).
b)JAVA
It is a Platform Independent. Java is an object-oriented
programming language matured initially by James Gosling
and colleagues at Sun Microsystems. The language, initially
called Oak (named after the oak trees outside Gosling's
office), was proposed to replaceC++,althoughthefeature set
better feature that of Objective C.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 557
Fig -1: WORKING OF JAVA
Windows NT System 8
Fig -2: JAVA
c) APACHE TOMCAT SERVER
Apache Tomcat is a web package developed at the Apache
Software Foundation. Tomcat appliance the servlet and the
JavaServer Pages (JSP) detail item particularization from
Sun Microsystems, providing an environment for Java code
to run in cooperation with a web server. It adds tools for
configuration and management but can also be construct by
editing configuration files that arenormallyXML -formatted.
Because Tomcat includes its own HTTP server privately,itis
also considered a standalone web server.
3. MODULES
The System is categorized into following modules:
1) Group creation
2) Text Mining process
3) Blind storage
4) Query search
1) GROUP CREATION: Data owner should be registered in
this environment and create a group. Data users also
registers and give request to group owner to add a group
user. Data owner accept the request from the user.
2) TEXT MINNING PROCESS: In this modulethedata owner
can upload the documents. Data owner can upload the files,
the content of file is to be separatedusingNLPtechniqueand
that words can get synonyms using Word Net tool.
3) BLIND STORAGE: The uploaded data’s are encrypted in
gateway after Natural languageProcessingisdoneandsaved
as index file. The owner can give access control and
authority to user while uploading the data.
4) QUERY SEARCH: Data user will try to haunt a query in
cloud server. The cloud servers plot reliefmapthekeywords
and search the related files.
Accept
request
Group
Creation
owner
Accept request
User User request
Group
owner
File
Upload
Natural
Language
Processing
technique
Word Net toolCreating Index
file
Owner Upload files Encryption
StorageBlocks Splitting
Stored in
blocks
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 558
4. Architecture Diagram
5. Conclusion
Hence we developed an efficient search in keyword through
updates which enable accurate, efficient and secure search
over encrypted data. Privacy is preserved for data in cloud
while storing in blind Storage, and also manage approach
control for each user.
6. Enhancement
 Multiple group creation, eachgroupishavingowner
and multiple users.
 Multimedia Search.
 To encrypt data using Asymmetric algorithm (RSA)
and key re-encryption.
 Using NLP technique and word net tool for text
mining process.
 Index file and Key generation on cloud.
REFERENCES
[1] Q. Shen, X. Liang, X. Shen, X. Lin, and H. Y. Luo, ‘‘Exploiting
geo-distributedcloudsfora E-healthmonitoringsystem with
minimum ser-vice delay and privacy preservation,’’ IEEE J.
Biomed. Health Informat., vol. 18, no. 2, pp. 430–439, Mar.
2014. VOLUME 6, NO. 1, MARCH 2018 107 IEEE
TRANSACTIONS ON EMERGINGTOPICS IN COMPUTINGLiet
al.: Personalized Search Over Encrypted Data With Efficient
and Secure Updates
[2] H. Liang, L. X. Cai, D. Huang, X. Shen, and D. Peng, ‘‘An
SMDP-based service model for interdomain resource
allocation in mobile cloud networks,’’ IEEE Trans. Veh.
Technol., vol. 61, no. 5, pp. 2222–2232, Jun. 2012.
[3] Y. Cai, F. Yu, and S. Bu, ‘‘Cloud computing meets mobile
wireless com-munications in next generation cellular
networks,’’ IEEE Netw., vol. 28,no. 6, pp. 54–59, Nov./Dec.
2014.
[4] D. Zeng, S. Guo, I. Stojmenovic, and S. Yu, ‘‘Stochastic
modeling and analysis of opportunistic computing in
intermittent mobile cloud,’’ in Proc. 8th IEEE Conf. Ind.
Electron. Appl. (ICIEA), Jun. 2013, pp. 1902–1907.
[5] S. Yu, R. Doss, W. Zhou, and S. Guo, ‘‘A general cloud
firewall framework with dynamic resource allocation,’’ in
Proc. ICC, Jun. 2013, pp. 1941–1945.
[6] F. R. Yu and V. Leung, Advances in Mobile Cloud
Computing Systems. Boca Raton, FL, USA: CRC Press, 2015.
Data
Owner
Upload files Encryption
Blind StorageSearch
Data
user

More Related Content

PDF
Secure retrieval of files using homomorphic encryption for cloud computing
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
Ijarcet vol-2-issue-3-951-956
PDF
IRJET- Multiple Keyword Search over Encrypted Cloud Data
PDF
Attribute-Based Data Sharing
DOCX
Secure distributed deduplication systems with improved reliability
PDF
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
PDF
Data Search in Cloud using the Encrypted Keywords
Secure retrieval of files using homomorphic encryption for cloud computing
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Ijarcet vol-2-issue-3-951-956
IRJET- Multiple Keyword Search over Encrypted Cloud Data
Attribute-Based Data Sharing
Secure distributed deduplication systems with improved reliability
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
Data Search in Cloud using the Encrypted Keywords

What's hot (20)

PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
PDF
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
PDF
Ijricit 01-006 a secluded approval on clould storage proceedings
PDF
Cloud Data Security using Elliptic Curve Cryptography
PDF
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
PDF
3 ijece 1 ed iqbal qc
PDF
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
PDF
H1803035056
PDF
Accessing secured data in cloud computing environment
PDF
Efficient Similarity Search Over Encrypted Data
PDF
Enabling efficient multi keyword ranked
PDF
Retrieving Secure Data from Cloud Using OTP
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
Ijariie1196
PDF
J018145862
PDF
Providing Secure Cloud for College Campus
PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
PDF
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Preserving Privacy Policy- Preserving public auditing for data in the cloud
Ijricit 01-006 a secluded approval on clould storage proceedings
Cloud Data Security using Elliptic Curve Cryptography
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
3 ijece 1 ed iqbal qc
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
H1803035056
Accessing secured data in cloud computing environment
Efficient Similarity Search Over Encrypted Data
Enabling efficient multi keyword ranked
Retrieving Secure Data from Cloud Using OTP
Secure Data Sharing In an Untrusted Cloud
Ijariie1196
J018145862
Providing Secure Cloud for College Campus
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Ad

Similar to IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud (20)

PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PDF
verifiable and multi-keyword searchable attribute-based encryption scheme for...
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PDF
IJSRED-V2I2P55
PDF
Efficient Privacy Preserving Clustering Based Multi Keyword Search
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
Efficient and Empiric Keyword Search Using Cloud
PDF
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
PDF
Paper id 28201425
PDF
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
PDF
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
PDF
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
PDF
IRJET- Fast Phrase Search for Encrypted Cloud Storage
PDF
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
PDF
IRJET- Single to Multi Cloud Data Security in Cloud Computing
PDF
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
PDF
C017421624
PDF
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
PDF
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IJSRED-V2I2P55
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Efficient and Empiric Keyword Search Using Cloud
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Paper id 28201425
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
IRJET- Fast Phrase Search for Encrypted Cloud Storage
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
IRJET- Single to Multi Cloud Data Security in Cloud Computing
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
C017421624
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET- Execution of Privacy - Preserving Multi-Keyword Positioned Search Over...
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Designing Fault-Tolerant Architectures for Resilient Oracle Cloud ERP and HCM...
PDF
Beginners-Guide-to-Artificial-Intelligence.pdf
PPTX
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PPTX
chapter 1.pptx dotnet technology introduction
PDF
Mechanics of materials week 2 rajeshwari
PDF
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
PDF
Computer System Architecture 3rd Edition-M Morris Mano.pdf
PPTX
Solar energy pdf of gitam songa hemant k
PDF
Present and Future of Systems Engineering: Air Combat Systems
PPTX
MAD Unit - 3 User Interface and Data Management (Diploma IT)
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PDF
Lesson 3 .pdf
PPT
Programmable Logic Controller PLC and Industrial Automation
PDF
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
PPTX
CS6006 - CLOUD COMPUTING - Module - 1.pptx
PDF
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
PDF
Principles of operation, construction, theory, advantages and disadvantages, ...
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
Designing Fault-Tolerant Architectures for Resilient Oracle Cloud ERP and HCM...
Beginners-Guide-to-Artificial-Intelligence.pdf
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
Environmental studies, Moudle 3-Environmental Pollution.pptx
chapter 1.pptx dotnet technology introduction
Mechanics of materials week 2 rajeshwari
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
Computer System Architecture 3rd Edition-M Morris Mano.pdf
Solar energy pdf of gitam songa hemant k
Present and Future of Systems Engineering: Air Combat Systems
MAD Unit - 3 User Interface and Data Management (Diploma IT)
August -2025_Top10 Read_Articles_ijait.pdf
Lesson 3 .pdf
Programmable Logic Controller PLC and Industrial Automation
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
CS6006 - CLOUD COMPUTING - Module - 1.pptx
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
Principles of operation, construction, theory, advantages and disadvantages, ...
MLpara ingenieira CIVIL, meca Y AMBIENTAL
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf

IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 556 Privacy Preserving Keyword Search over Encrypted Data in the Cloud D. VETRISELVI1, N.M. JAYASHRI2 1Assistant Professor Deptartment of Computer Science and Engineering Jeppiaar SRR Engineering College, Padur Chennai, Tamil Nadu, INDIA 2B.E Department of Computer Science and Engineering Jeppiaar SRR Engineering College, Padur Chennai, Tamil Nadu, INDIA ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Research in cloud computing is receiving tons of attention from both academic and industrial worlds. Clouds can provide several kind of services like applications (e.g., Google Apps, Microsoft online), infrastructures (e.g.,Amazon’s EC2, Eucalyptus, Nimbus), and platforms to assist developers write applications(e.g., Amazon’sS3, WindowsAzure). Muchof the info stored in clouds is very sensitive, for instance , medical records and social networks. Security and privacy are thus vital issues in cloud computing. The user should authenticate itself before beginning any transaction. It must be ensured that the cloud doesn't tamper with the data that is out sourced.In order to search in cloud, some requirements is needed, search over encrypted data should support the following three functions. In one hand, the searchable encryption schemes support keyword search, and supply an equivalent user experience as searching in Google search with different keywords; single-keyword search is way from satisfactory by only returning very limited and inaccurate search results.,The search user would typically prefer cloud servers to sort the returned search leads to a relevance-based order ranked by the relevance of the search request to the documents. Key Words: EfficientRevocation,CiphertextPolicyAttribute Based Encryption, Standard Model 1. INTRODUCTION Mobile cloud computing has been detailed as a key enabling technology to overcome the physical limit of mobile devices towards scalable and flexible mobile services. In the mobile cloud environment searchable encryption, which allows precisely search over encrypted data, is a key technique to maintain both the privacy andavailableofoutsourceddata in cloud. On addressing the hardness , many research efforts resolve to using the searchable symmetric encryption (SSE) and searchable public-key encryption (SPE). By giving thorough security analysis, we demonstrate that PSU are able to do a high security level. Using extensive experiments during a realworld mobile environment,weshowthatPUSis more efficient compared with the prevailing proposals. 1.1 Proposed system In Proposed system, PSU (personalized search)schemewith efficient and secure updates we introduced an efficient and reliable methodology for search over encrypted data.Here the encrypted keyword search pre computes the resulting hunt documents for the input query from users through Natural language processing Techniquewhichiscarryout on gateway (client side) on user fileupload.Hencethematching documents which is pre compute the before arching the encrypted cloud contents are retrieved from cloud. Here we does not pull all the encrypted data’s from cloud for searching, which is time consuming and inadequate. The matching documents memory locations on mobile storage are restore from the serializable objects whichisreservedin the gateway. User can download the produced documents after getting the keys from the group owner. Asymmetric kind of encryption for key re-encryption and is more assured. 2. TECHNOLOGIES USED a) Cloud Computing Cloud computing may be a sort of computing during which dynamically scalable and sometimes virtualities resources are provided as a service over the web .Users needn't have knowledge of, skills in, or control over the technology infrastructure within the "cloud" that supports them. The concept generally conditions combinations of infrastructureas a service (IaaS), platform as a service (PaaS), software as a service (SaaS).Cloud computing customers do notcommonly ownthephysical infrastructure. serving as host to the software platform in question.Instead, they avoid capital expenditure byrentingusagefroma third- party provider.Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the web .Users needn't have knowledge of, expertise in, or control over the technology infrastructure in the"cloud"thatsupportsthem.Theconcept generally incorporates combinations of infrastructure as a service (IaaS) ,platform as a service (PaaS) ,software as a service (SaaS). b)JAVA It is a Platform Independent. Java is an object-oriented programming language matured initially by James Gosling and colleagues at Sun Microsystems. The language, initially called Oak (named after the oak trees outside Gosling's office), was proposed to replaceC++,althoughthefeature set better feature that of Objective C.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 557 Fig -1: WORKING OF JAVA Windows NT System 8 Fig -2: JAVA c) APACHE TOMCAT SERVER Apache Tomcat is a web package developed at the Apache Software Foundation. Tomcat appliance the servlet and the JavaServer Pages (JSP) detail item particularization from Sun Microsystems, providing an environment for Java code to run in cooperation with a web server. It adds tools for configuration and management but can also be construct by editing configuration files that arenormallyXML -formatted. Because Tomcat includes its own HTTP server privately,itis also considered a standalone web server. 3. MODULES The System is categorized into following modules: 1) Group creation 2) Text Mining process 3) Blind storage 4) Query search 1) GROUP CREATION: Data owner should be registered in this environment and create a group. Data users also registers and give request to group owner to add a group user. Data owner accept the request from the user. 2) TEXT MINNING PROCESS: In this modulethedata owner can upload the documents. Data owner can upload the files, the content of file is to be separatedusingNLPtechniqueand that words can get synonyms using Word Net tool. 3) BLIND STORAGE: The uploaded data’s are encrypted in gateway after Natural languageProcessingisdoneandsaved as index file. The owner can give access control and authority to user while uploading the data. 4) QUERY SEARCH: Data user will try to haunt a query in cloud server. The cloud servers plot reliefmapthekeywords and search the related files. Accept request Group Creation owner Accept request User User request Group owner File Upload Natural Language Processing technique Word Net toolCreating Index file Owner Upload files Encryption StorageBlocks Splitting Stored in blocks
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 558 4. Architecture Diagram 5. Conclusion Hence we developed an efficient search in keyword through updates which enable accurate, efficient and secure search over encrypted data. Privacy is preserved for data in cloud while storing in blind Storage, and also manage approach control for each user. 6. Enhancement  Multiple group creation, eachgroupishavingowner and multiple users.  Multimedia Search.  To encrypt data using Asymmetric algorithm (RSA) and key re-encryption.  Using NLP technique and word net tool for text mining process.  Index file and Key generation on cloud. REFERENCES [1] Q. Shen, X. Liang, X. Shen, X. Lin, and H. Y. Luo, ‘‘Exploiting geo-distributedcloudsfora E-healthmonitoringsystem with minimum ser-vice delay and privacy preservation,’’ IEEE J. Biomed. Health Informat., vol. 18, no. 2, pp. 430–439, Mar. 2014. VOLUME 6, NO. 1, MARCH 2018 107 IEEE TRANSACTIONS ON EMERGINGTOPICS IN COMPUTINGLiet al.: Personalized Search Over Encrypted Data With Efficient and Secure Updates [2] H. Liang, L. X. Cai, D. Huang, X. Shen, and D. Peng, ‘‘An SMDP-based service model for interdomain resource allocation in mobile cloud networks,’’ IEEE Trans. Veh. Technol., vol. 61, no. 5, pp. 2222–2232, Jun. 2012. [3] Y. Cai, F. Yu, and S. Bu, ‘‘Cloud computing meets mobile wireless com-munications in next generation cellular networks,’’ IEEE Netw., vol. 28,no. 6, pp. 54–59, Nov./Dec. 2014. [4] D. Zeng, S. Guo, I. Stojmenovic, and S. Yu, ‘‘Stochastic modeling and analysis of opportunistic computing in intermittent mobile cloud,’’ in Proc. 8th IEEE Conf. Ind. Electron. Appl. (ICIEA), Jun. 2013, pp. 1902–1907. [5] S. Yu, R. Doss, W. Zhou, and S. Guo, ‘‘A general cloud firewall framework with dynamic resource allocation,’’ in Proc. ICC, Jun. 2013, pp. 1941–1945. [6] F. R. Yu and V. Leung, Advances in Mobile Cloud Computing Systems. Boca Raton, FL, USA: CRC Press, 2015. Data Owner Upload files Encryption Blind StorageSearch Data user