A Defend and Spirited Multi Keyword Search Style Over Encrypted Cloud Information

Authors(1) :-S. T. Ganesh

Infrastructure as a service provides companies with computing resources at the aspect of servers, networking, storage, and data center area on a pay-per-use basis. This of this paper is vogue offloads the computation from mobile devices to the cloud, that we've got a bent to tend to any optimize the communication between the mobile shoppers and so the cloud. it's bulletproof that the information privacy does not degrade once the performance improvement ways in {which} among which ar applied. Our experiments show that TEES reduces the computation time by twenty 3 to forty half-dozen00 and save the energy consumption by thirty 5 to fifty 5 or half-dozen per file retrieval, among the meanwhile the network traffics throughout the file retrievals area unit significantly reduced. during this paper, we've got a trend to gift a secure tree-based search theme over encrypted cloud data, that at an everyday time bolsters dynamic refresh activities like erasure and inclusion of archives. we've got associate slant to develop AN uncommon tree primarily based file structure and propose a Greedy Depth 1st Search rule to convey sensible multi-watch word stratified detection. The protected kNN management is used to form the file and subject vectors and among the among among the within the within the mean whereas guarantee rectify affiliation score computation between encoded file and question vectors. thus on prohibit maths strikes, phantom terms unit of activity additional to the neglected vector for noteworthy neglected things. as a delayed consequences of crafted by our special tree-based summation structure, the masterminded theme can do sub-straight request time and result the cancelation and growth of reports adaptably.

Authors and Affiliations

S. T. Ganesh
MCA Sri Padmavathi College of Computer Sciences and Technology Tiruchanoor, Andhra Pradesh, India

Infrastructure, Greedy Depth-first Search algorithm, kNN algorithm, TEES

  1. K. Ren, C. Wang, Q. Wang, Security challenges for the public cloud, IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
  2. S. Kamara and K. Lauter, Cryptographic cloud storage, in Financial Cryptography and Data Security. Springer, 2010
  3. C. Gentry, A fully homomorphic encryption scheme, Ph.D. dissertation, Stanford University, 2009.
  4. O. Goldreich and R. Ostrovsky, Software protection and simulation on oblivious rams, Journal of the ACM (JACM), 1996.
  5. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search in Advances in Cryptology Eurocrypt 2004.
  6. D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. Skeith III, Public key encryption that allows pir queries, in Advances in Cryptology-CRYPTO 2007
  7. D. X. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, in Security and Privacy, 2000.
  8. E.-J. Goh et al., Secure indexes. IACR Cryptology ePrint Archive, 2003,
  9. Y.-C. Chang and M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, in Proceedings of the Third international conference on Applied Cryptography and Network Security, 2005.
  10. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proceedings of the 13th ACM conference on Computer and communications security, 2006.
  11. Y. Chang and M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data in Proc. 3rd Int. Conf. Appl. Cryptography Netw. Security, 2005.
  12. S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, Zerber r: Top-k retrieval from a confidential index in Proc. 12th Int. Conf. Extending Database Technol.: Adv. Database Technol., 2009
  13. C. Wang, N. Cao, K. Ren, and W. Lou, Enabling secure and efficient ranked keyword search over outsourced cloud data, IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
  14. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, Secureranked keyword search over encrypted cloud data, in Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst., 2010
  15. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, Privacy -preserving multi-keyword ranked search over encrypted cloud data, IEEE Trans. Parallel Distrib 2014.

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 432-437
Manuscript Number : CSEIT1833409
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

S. T. Ganesh, "A Defend and Spirited Multi Keyword Search Style Over Encrypted Cloud Information", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.432-437, March-April-2018. |          | BibTeX | RIS | CSV

Article Preview