Advance Search Using Bloom Filter and Asymmetric Key Algorithm

Authors

  • Mukkara Varun Teja Chowdary  Student, Department of CSE, Velammal Engineering College, Chennai, Tamil Nadu, Inida
  • Venkatesh K  Student, Department of CSE, Velammal Engineering College, Chennai, Tamil Nadu, Inida
  • Nikhil Sai K  Assistant Professor-II, Department of CSE, Velammal Engineering College, Chennai, Tamil Nadu, Inida
  • M. S. Murali Dhar  

Keywords:

Abstract

Cloud Computing is most various number advantages in cloud platform. In is this concern there are also lot of security problem arises and privacy concerns are there. Data Accessing and integration confidential documents have been identified as one of the central problems in this area. Many researchers tried to find solutions to search over encrypted documents stored on remote cloud servers. While many schemes have been proposed to perform Bloom filter search, less attention has been noted on more specialized searching techniques. In this paper we proposed, a phrase search technique based on Bloom filter that is significantly faster than existing solutions. Bloom filters tied to hashed keywords and n-grams are attached. The contents are then encrypted using Asymmetric-key Encryption method and uploaded to the cloud server. To upload content to the cloud server then keyword is attached with Bloom filters. To remove a content from the cloud server. The data owner simply sends the request to the cloud server, it removes the content along with the attached Bloom filters. Using Asymmetric-key to encrypt and decrypt content. Asymmetric key is a cryptographic algorithm in which there are two different keys are used to encrypt and decrypt the content. When User registers in cloud then that password hashed stored in the cloud server. When we type the login password then it is also hashed and compared with the registered password then it redirects to the Client page. That hashing and encryption technique are used to secure the data in cloud.

References

  1. Prof. H.Poon and A.Miri, "An efficient conjunctive keyword and phrase search scheme for encrypted cloud storage systems," in IEEE International Conference on Cloud Computing, 2015.
  2. "A low storage phrase search scheme based on bloom filters for encrypted cloud services," to appear in IEEE International Conference on Cyber Security and Cloud Computing, 2015.
  3. Z.Fu, X.Sun, N.Linge, and L.Zhou, "Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query," IEEE Transactions on Consumer Electronics, vol.60, pp.164–172, 2014
  4. M.Yoon, J.Son, and S.-H.Shin, "Bloom tree: A search tree based on Bloom filters for multiple set membership testing," in Proc.2014 IEEE Conference on Computer Communications (INFOCOM ’14), 2014, pp.1429–1437.
  5. K.Rabieh, M.M.E.A.Mahmoud, K.Akkaya, and S.Tonyali.Scalable Certificate Revocation Schemes for Smart Grid AMI Networks Using Bloom Filters.IEEE Transactions on Dependable and Secure Computing, 14(4):420–432, 2017
  6. J.Lu, Y.Wan, Y.Li, C.Zhang, H.Dai, Y.Wang, G.Zhang, and B.Liu.Ultra-Fast Bloom Filters using SIMD techniques.In 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), pages 1–6, 2017.
  7. Y.Zhang, Z.Zheng, and X.Zhang.Efficient Bloom Filter for Network Protocols Using AES Instruction Set.IET Communications, 11(11):1815–1821, 2017.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Mukkara Varun Teja Chowdary, Venkatesh K, Nikhil Sai K, M. S. Murali Dhar, " Advance Search Using Bloom Filter and Asymmetric Key Algorithm, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 3, pp.1217-1222, March-April-2018.