Keyword Based Search Outcomes with Ranked Verification In Cloud Storage

Authors

  • Farhana Begum  Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India
  • Md Ateeq Ur Rahman  Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India

Keywords:

Dishonest cloud server, data verification, deterrent, top-k search

Abstract

With the approach of cloud computing, an increasing number of persons have a tendency to outsource their information to the cloud. As a key information use, secure keyword search over encoded cloud information has intent the concern of more investigators. But, many of existing researchers depend on a perfect belief that the cloud server is "interested however legit", where the searched lists are most certainly not tested. In this paper, we consider moreover a difficult model, where the cloud server would most likely carry on deceitfully. In light of this model, we investigate the issue of result validation for the secure ranked keyword search. Not quite the same as past information confirmation plans, we propose a unique constrained based plan. With our precisely expressed verification information, the cloud server can't know which data owners, or what number of data owners trade handle information which will be utilized for confirming the cloud server's misconduct. With our deliberately planned confirmation development, the cloud server can't know which data owners' information are installed in the validation information buffer, or what number of data owners' searched information are really utilized for validation. All the cloud server identifies that, when he carries on deceptively, he would be found with a high possibility, and rejected genuinely once found. Besides, we propose to upgrade the estimation of parameters utilized as a part of the development of the secret validation information buffer. At last, with intensive investigation and broad analyses, we insist the adequacy and productivity of our proposed plans.

References

  1. H. Pang, A. Jain, K. Ramamritham, and K.L. Tan, "Verifying completeness of relational query results in data publishing," in Proceedings of the 2005 ACM SIGMOD international conference on Management of data. ACM, 2005, pp. 407-418.
  2. Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios, "Authenticated indexing for outsourced spatial databases," The VLDB Journal The International Journal on Very Large Data Bases, vol. 18, no. 3, pp. 631-648, 2009.
  3. M. Chuah and W. Hu, "Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data," in Proc. IEEE 31th International Conference on Distributed Computing Systems (ICDCS’11), Minneapolis, MN, Jun. 2011, pp. 383-392.
  4. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proc. IEEE ASIACCS’13, Hangzhou, China, May 2013, pp. 71-81.
  5. W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, "Protecting your right: Attribute-based keyword search with fine-grained owner enforced search authorization in the cloud," in Proc. IEEE INFOCOM’ 14, Toronto, Canada, May 2014, pp. 226-234.
  6. B. Hore, E. C. Chang, M. H. Diallo, and S. Mehrotra, "Indexing encrypted documents for supporting efficient keyword search," in Proc. Secure Data Management (SDM’12), Istanbul, Turkey, Aug. 2012, pp. 93-110.

Downloads

Published

2017-10-31

Issue

Section

Research Articles

How to Cite

[1]
Farhana Begum, Md Ateeq Ur Rahman, " Keyword Based Search Outcomes with Ranked Verification In Cloud Storage, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.531-535, September-October-2017.