Keyword Based Search Outcomes with Ranked Verification In Cloud Storage

Authors(2) :-Farhana Begum, Md Ateeq Ur Rahman

With the approach of cloud computing, an increasing number of persons have a tendency to outsource their information to the cloud. As a key information use, secure keyword search over encoded cloud information has intent the concern of more investigators. But, many of existing researchers depend on a perfect belief that the cloud server is "interested however legit", where the searched lists are most certainly not tested. In this paper, we consider moreover a difficult model, where the cloud server would most likely carry on deceitfully. In light of this model, we investigate the issue of result validation for the secure ranked keyword search. Not quite the same as past information confirmation plans, we propose a unique constrained based plan. With our precisely expressed verification information, the cloud server can't know which data owners, or what number of data owners trade handle information which will be utilized for confirming the cloud server's misconduct. With our deliberately planned confirmation development, the cloud server can't know which data owners' information are installed in the validation information buffer, or what number of data owners' searched information are really utilized for validation. All the cloud server identifies that, when he carries on deceptively, he would be found with a high possibility, and rejected genuinely once found. Besides, we propose to upgrade the estimation of parameters utilized as a part of the development of the secret validation information buffer. At last, with intensive investigation and broad analyses, we insist the adequacy and productivity of our proposed plans.

Authors and Affiliations

Farhana Begum
Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India
Md Ateeq Ur Rahman
Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India

Dishonest cloud server, data verification, deterrent, top-k search

  1. H. Pang, A. Jain, K. Ramamritham, and K.L. Tan, "Verifying completeness of relational query results in data publishing," in Proceedings of the 2005 ACM SIGMOD international conference on Management of data. ACM, 2005, pp. 407-418.
  2. Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios, "Authenticated indexing for outsourced spatial databases," The VLDB Journal The International Journal on Very Large Data Bases, vol. 18, no. 3, pp. 631-648, 2009.
  3. M. Chuah and W. Hu, "Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data," in Proc. IEEE 31th International Conference on Distributed Computing Systems (ICDCS’11), Minneapolis, MN, Jun. 2011, pp. 383-392.
  4. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, "Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking," in Proc. IEEE ASIACCS’13, Hangzhou, China, May 2013, pp. 71-81.
  5. W. Sun, S. Yu, W. Lou, Y. T. Hou, and H. Li, "Protecting your right: Attribute-based keyword search with fine-grained owner enforced search authorization in the cloud," in Proc. IEEE INFOCOM’ 14, Toronto, Canada, May 2014, pp. 226-234.
  6. B. Hore, E. C. Chang, M. H. Diallo, and S. Mehrotra, "Indexing encrypted documents for supporting efficient keyword search," in Proc. Secure Data Management (SDM’12), Istanbul, Turkey, Aug. 2012, pp. 93-110.

Publication Details

Published in : Volume 2 | Issue 5 | September-October 2017
Date of Publication : 2017-10-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 531-535
Manuscript Number : CSEIT1725130
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Farhana Begum, Md Ateeq Ur Rahman, "Keyword Based Search Outcomes with Ranked Verification In Cloud Storage", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 5, pp.531-535, September-October-2017.
Journal URL : http://ijsrcseit.com/CSEIT1725130

Article Preview