An Enhanced Framework for Privacy Preservation and Multi-Keyword Search in Information Network

Authors

  • Shweta P. Warhadkar  BE Scholars, Department of Computer Science and Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
  • Shweta C. Paunikar  BE Scholars, Department of Computer Science and Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
  • Unnati V. Kedare  BE Scholars, Department of Computer Science and Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
  • Ujjwala P. Ukinkar  BE Scholars, Department of Computer Science and Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
  • Uttamkumar D. Pal  BE Scholars, Department of Computer Science and Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
  • Prof. Deepika Radke  Assistant Professor, Department of Computer Science and Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India

Keywords:

Information Network, Private Server, Public Cloud, Distributed Databases, Ranking Results

Abstract

In Information Networks, proprietors can store their documents over passed on different servers. It urging customers to store and get to their information in and from various servers by settling down wherever and on any device. It is an amazingly troublesome task to give beneficial look for on dispersed records also give the privacy on proprietor’s documents. The present system gives one possible game plan that is privacy safeguarding indexing (PPI). In this system, records are dispersed over different private servers which are all things considered controlled by cloud/open server. Exactly when customer require a couple of reports, they request to open cloud, which at that point restores the confident summary that is private server once-over to customers. In the wake of getting summary, customer can look for the records on specific private server however in this structure; reports are secured fit as a fiddle on private server that is privacy is bartered. Regardless, proposed structure enhances this present system to influence it more too secure and capable. To begin with records are secured in encoded outline on the private servers and after that use Key Distribution Center (KDC) for allowing deciphering of information got from private server, at client side. The proposed structure moreover executes TF-IDF, which gives the situating of results to customers.

References

  1. Yuzhe Tang and Ling Liu,”Privacy-Preserving Multi-Keyword Searching Information Networks”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 9, SEPTEMBER 2015
  2. R. J. Bayardo Jr, R. Agrawal, D. Gruhl, and A. Somani, “Youserv: A web-hosting and content sharing tool for the masses,” in Proc. 11th Int. Conf. World Wide Web, 2002, pp. 345–354.
  3. M. Bawa, R. J. Bayardo Jr, S. Rajagopalan, and E. J. Shekita, “Make it fresh, make it quick: Searching a network of personal webservers,” in Proc. 12th Int. Conf. World Wide Web, 2003, pp. 577–586.
  4. [Online]. Available: Diaspora: https://joindiaspora.com/, 2014.
  5. [Online]. Available: Status, http://status.net, 2014.
  6. R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, “Persona: An online social network with user-defined privacy,” in SIGCOMM Conf. Data Commun., 2009, pp. 135–146.
  7. H. L€ohr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health cloud,” in Proc. 1st ACM Int. Health Informat. Symp., 2010, pp. 220–229.
  8. [Online]. Available: Nhin direct, http://directproject.org/, 2014.
  9. R. Geambasu, M. Balazinska, S. D. Gribble, and H. M. Levy,
  10. “Homeviews: Peer-to-peer middleware for personal data sharing applications,” in Proc. SIGMOD Conf., 2007, pp. 235–246.
  11. M. Bawa, R. J. Bayardo Jr, and R. Agrawal, “Privacy-preserving
  12. indexing of documents on the network,” in Proc. VLDB Conf.,
  13. 2003, pp. 922–933.
  14. Y. Tang, T. Wang, and L. Liu, “Privacy preserving indexing for ehealth information networks,” in Proc. 20th ACM Int. Conf. Inf. Knowl. Manage., 2011, pp. 905–914.
  15. M. Bawa, R. J. Bayardo, Jr, R. Agrawal, and J. Vaidya, “Privacy preserving indexing of documents on the network,” VLDB J., vol. 18, no. 4, pp. 837–856, 2009.
  16. R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan, “CryptDB: Protecting confidentiality with encrypted query processing,” in Proc. 23rd ACM Symp. Operating Syst. Principles, 2011, pp. 85–100.
  17. C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proc. 41st Annu. ACM Symp. Theory Comput., 2009, pp. 169–178.
  18. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” in Proc. IEEE INFOCOM, 2011, pp. 829–837.
  19. D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, “Fairplay—Secure two-party computation system,” in Proc. 13th Conf. USENIX Security Symp., 2004, pp. 287–302.
  20. A. Ben-David, N. Nisan, and B. Pinkas, “Fairplaymp: A system for secure multi-party computation,” in Proc. ACM Conf. Comput. Commun. Security, 2008, pp. 257–266.
  21. W. Henecka, S. K€ogl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg, “TASTY: Tool for automating secure two-party computations,” in Proc. 17th ACM Conf. Comput. Commun. Security, 2010, pp. 451–462.
  22. I. Damga rd, M. Geisler, M. Krøigaard, and J. B. Nielsen, “Asynchronous multiparty computation: Theory and implementation,” in Proc. 12th Int. Conf. Practice Theory Public Key Cryptography, 2009, pp. 160–179.
  23. A. Narayan and A. Haeberlen, “DJoin: Differentially private join queries over distributed databases,” in Proc. 10th USENIX Conf. Operating Syst. Des. Implementation, Oct. 2012, pp. 149–162.
  24. J. Hsu, M. Gaboardi, A. Haeberlen, S. Khanna, A. Narayan, B. C. Pierce, and A. Roth. (2014). Differential privacy: An economic method for choosing epsilon, CoRR [Online]. abs/1402.3329 Available: http://arxiv.org/abs/1402.3329
  25. Y. Tang and L. Liu, “Multi-keyword privacy-preserving search in information networks,” Tech. Rep. 2014 [Online]. Available: http://tristartom.github.io/docs/tr-mppi.pdf, 2014.
  26. Y. Tang, L. Liu, A. Iyengar, K. Lee, and Q. Zhang, “e-PPI: Locator service in information networks with personalized privacy preservation,” in Proc. IEEE 34th Int. Conf. Distrib. Comput. Syst., Madrid, Spain, Jun. 30–Jul. 3, 2014, pp. 186–197.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Shweta P. Warhadkar, Shweta C. Paunikar, Unnati V. Kedare, Ujjwala P. Ukinkar, Uttamkumar D. Pal, Prof. Deepika Radke, " An Enhanced Framework for Privacy Preservation and Multi-Keyword Search in Information Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.201-208, March-April-2018.