Manuscript Number : CSEIT1723232
Fuzzy Keyword Search over Encrypted Data in Cloud
Authors(4) :-Prof. Sonali Kale, Yash Gulati, Pooja Ghorpade, Avinash Savake For privacy concerns, a secure search over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner; instead, they support multiple owners to share the benefits brought by cloud computing. In this paper, we propose schemes to deal with Privacy preserving Ranked Multi-keyword Search in a Multi-owner model (PRMSM). To enable cloud servers to perform secure search without knowing the actual data of both keywords and trapdoors, we systematically construct a novel secure search protocol. To rank the search results and preserve the privacy of relevance scores between keywords and files, we propose a novel Additive Order and Privacy Preserving Function family. To prevent the attackers from eavesdropping secret keys and pretending to be legal data users submitting searches, we propose a novel dynamic secret key generation protocol and a new data user authentication protocol.
Hence, some cloud information retrieval schemes has been planned to resolve this drawback, these schemes not only will search the information they have properly, however can also stop sensitive information leaked out. During this paper, we tend to survey the privacy protective cloud information retrieval scheme and provide a comparison of them with regard to the key principles of search and privacy security.
Prof. Sonali Kale Fuzzy Keyword, Encrypted Data, RMSM, cloud servers, CSP Publication Details Published in : Volume 2 | Issue 3 | May-June 2017 Article Preview
Department of Computer Engineering, Savitribai phule University/Trinity Academy of Engineering, Pune, Maharashtra, India
Yash Gulati
Department of Computer Engineering, Savitribai phule University/Trinity Academy of Engineering, Pune, Maharashtra, India
Pooja Ghorpade
Department of Computer Engineering, Savitribai phule University/Trinity Academy of Engineering, Pune, Maharashtra, India
Avinash Savake
Department of Computer Engineering, Savitribai phule University/Trinity Academy of Engineering, Pune, Maharashtra, India
Date of Publication : 2017-06-30
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 630-633
Manuscript Number : CSEIT1723232
Publisher : Technoscience Academy