A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage

Size: px
Start display at page:

Download "A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage"

Transcription

1 A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage Jeniphar Francis #, Chetna Getme # Priyanka Bagde # Ruchika Bansod # Prof. Ashish Palandurkar * # Student, Dept. of Information Technology Nagpur Institute of Technology, Nagpur Abstract The approach of distributed computing, information proprietors are roused to outsource their mind boggling information administration frameworks from neighbourhood destinations to business open cloud for extraordinary adaptability and monetary reserve funds. Be that as it may, for ensuring information protection, touchy information must be encoded before outsourcing, which obsoletes conventional information use in view of plaintext keyword look. In this manner, empowering an encoded cloud information seek administration is of central significance. Considering the extensive number of information clients and reports in cloud, it is critical for the hunt administration to permit multi-keyword question and give result comparability positioning to meet the compelling information recovery require. Related takes a shot at searchable encryption concentrate on single keyword inquiry or Boolean keyword seek, and once in a while separate the query items. In this paper, interestingly, we characterize and tackle the testing issue of protection saving multi-keyword positioned look over encoded cloud information (MRSE), and set up an arrangement of strict protection necessities for such a safe cloud information use framework to end up distinctly a reality. Among different multi-keyword semantics, we pick the proficient rule of "arrange coordinating", i.e., whatever number matches as could reasonably be expected, to catch the likeness between pursuit inquiry and information archives, and further utilize "internal item comparability" to quantitatively formalize such guideline for closeness estimation. We first propose a fundamental MRSE plot utilizing secure internal item calculation, and after that altogether enhance it to meet diverse protection necessities in two levels of risk models. Intensive examination exploring security and effectiveness certifications of proposed plans is given, and investigations on this present reality dataset additionally demonstrate proposed plots surely present low overhead on calculation and correspondence. Keywords Cloud computing, Encryption, Inner product similarity, Single Keyword Search, Multi-keyword search, ranking. I. INTRODUCTION Presently a-days a large number of information is basic regular on the web. Every day new information is outsourced because of development away in addition to prerequisites of clients, then * Assistant Professor Dept. of Information Technology Nagpur Institute of Technology, Nagpur basically semi-put stock in servers. Cloud registering is a Web-based model, where cloud customers can supply their information into the cloud [1]. By stacking information into the cloud, the information proprietors remain unbound after the limit of capacity. Subsequently, to protect touchy information honesty is a fundamental errand. To shield information protection in the cloud, the information proprietor must be outsourced in the encoded framework to people in general cloud and the information operation is established on plaintext keyword look. We select the proficient measure of "arrange coordinating". Organize coordinating is utilized to gauge the parallel sum. Facilitate coordinating catches the centrality of information records to the inquiry question keywords. The inquiry office and security defensive over scrambled cloud information are fundamental. In the event that we concentrate enormous measure of information reports and information clients in the cloud, it is hard for the necessities of execution, convenience, in addition to versatility. Worried to experience the genuine information recuperation, the colossal measure of information archives in the cloud server accomplishes to result important rank as opposed to returning undistinguishable results. Positioning plan minds multiple keyword pursuit to recoup the inquiry rightness. Today's Google network seek gadgets, information clients offer arrangement of keywords rather than remarkable keyword look significance to recover the most extreme critical information. Organize coordinating is a synchronize matching of question keywords which are significance to that report to the inquiry. ISSN NO: Volume 2 : Issue 3 - May 2017 Page 5

2 Because of inherence wellbeing and security, it remains the intriguing employment for how to relate the scrambled cloud seeks. The troublesome of multi-keyword positioned seek over encoded cloud information is settled by utilizing stringent security necessities then various multi-keyword semantics. Among various multi-keyword positioned semantics, we pick facilitate coordinating. Our commitments are condensed as takes after, 1) For the first occasion when, we investigate the issue of multi keyword positioned look over scrambled cloud information, and build up an arrangement of strict protection prerequisites for such a safe cloud information use framework. 2) We propose two MRSE plans in view of the likeness measure of "arrange coordinating" while meeting diverse protection prerequisites in two distinctive risk models. 3) Thorough examination exploring security and productivity assurances of the proposed plans is given; an analysis on this present reality dataset additionally demonstrate the proposed plots in fact present low overhead on calculation and correspondence. II. PROBLEM STATEMENT Quite number of on-request information clients and enormous measure of information archives in the cloud, this trouble is testing. It is fundamental for the hunt office to allow multi keyword look question and make accessible outcome correlation positioning to see the viable information recovery prerequisite. To build up the query output precision and in addition to enhance the client looking background, it is additionally fundamental for such positioning framework to bolster multiple keywords hunt, as single keyword inquiry frequently yields extraordinary coarse outcomes. The searchable encryption technique support to give encoded information encourages a client to immovably look over single keyword and recover archives of concern. III. LITERATURE SURVEY Qin Liu et al. proposed Secure and protection saving keyword seek in [1]. It gives keyword protection, information protection and semantic secure by open key encryption. The principle issue of this hunt is that the correspondence and computational cost of encryption and unscrambling is more. Ming Li et al. proposed Authorized Private keyword Search (APKS) in [2]. It gives keyword security, Index and Query Privacy, Fine-grained Search Authorization and Revocation, Multidimensional Keyword Search, Scalability and Efficiency. This pursuit technique builds the hunt productivity utilizing quality chain of importance however by and by every one of the characteristics are not various leveled. Cong Wang et al in [3] proposed Secure and Efficient Ranked Keyword Search which illuminates preparing overhead, information and keyword protection, least correspondence and calculation overhead. It is not helpful for multiple keyword quests, Also there is a tiny bit of overhead in file building. Kui Ren et al. [4] proposed Secured fluffy keyword seek with symmetric searchable encryption (SSE). It doesn't bolster fluffy pursuit with open key based searchable encryption, additionally it can't play out multiple keywords semantic hunt. The overhauls for fluffy searchable file are not proficiently performed. Ming Li et al. [5] proposed Privacy guaranteed searchable cloud Storage strategy. It is executed utilizing SSE, Scalar-Product-Preserving Encryption and Order-Preserving Symmetric Encryption. It bolsters the protection and utilitarian prerequisites. This plan does not bolster open key based searchable encryption. Wei Zhou et al. [6] proposed K-gram based fluffy keyword Ranked Search. In this proprietor make k- gram fluffy keyword file for records D and tuple <I, D> is transferred to inquiry server (SS) which is embedded to sprout channel for size controlling. The scrambled record D is transferred to capacity server. However, the issue is that, the measure of the k-gram construct fluffy keyword set depends in light of the jacquard coefficient esteem. J. Baek et al. in [7] proposed Secure Channel Free Public Key Encryption with Keyword Search (SCF-PEKS) technique. In these strategy bunch servers makes its own open and private key ISSN NO: Volume 2 : Issue 3 - May 2017 Page 6

3 combine however this technique experiences outside assailant by KGA. H. S. Rhee et al. [8] proposed Trapdoor in noticeability Public-Key Encryption with Keyword Search (IND-PEKS). In this outsourcing is done as SCF-PEKS. It experiences outside aggressor utilizing KGA and breaking down the recurrence of event of keyword trapdoor. Peng Xu et al. [9] proposed Public-Key Encryption PEFKS with Fuzzy Keyword Search, in this client makes fluffy keyword trapdoor Tw and correct keyword trapdoor Kw for W. Client asks for Tw to CS. At that point CS checks Tw with fluffy keyword file and sends superset of coordinating figure messages by Fuzz Test calculation that is executed by CS. The client procedure Exact Test calculation for checking figure writings with Kw and recover the encoded records. The way toward making fluffy keyword file and correct keyword list is troublesome for vast size database. Ning et al. [10] proposed Privacy Preserving Multi Keyword Ranked Search (MRSE). It is helpful for known figure content model and foundation demonstrate over scrambled information. It gives low calculation and correspondence overhead. The facility coordinating is chosen for multi-keyword seeks. The downside is that MRSE have little standard deviation which lessens the keyword security. IV. PROPOSED SOLUTION We propose a powerful framework where any approved client can do a pursuit on scrambled information with multiple keywords, without uncovering the keywords he looks for, nor the information of the records that match by the question. Approved clients can make seek forms by distinct keywords on the cloud to recover the pertinent reports. Our proposition framework encourages that a gathering of clients can inquiry the database gave that they have purported trapdoors for the hunt terms that approve the clients to incorporate them in their inquiries. Our proposed framework can play out multiple keyword hunts in a solitary question and positions the outcomes so the client can recover just the most important matches in a requested way. Also, we build up an arrangement of strict protection prerequisites. Among various multi keyword semantics, we select the viable rule of "organize coordinating". V. SYSTEM OVERVIEW The framework engineering is worried by making a straightforward auxiliary structure for a framework. It characterizes the general edge of the venture which quickly depicts the working of the structure and the motivation behind the venture stage is to arrange an answer of the issue distinguished by the need document. The underneath Figure 1 demonstrates the framework of the structure. We consider three sections in our framework engineering: Data Owner, Data client and Cloud Server. Data Owner is in charge of the making of the database. Data Users are the devotees in a gathering who can utilize the documents of the database. Cloud Server bargains information offices to confirmed clients. It is fundamental that server be torpid to substance of the database it keeps. Fig 1: Search over Encrypted Cloud Information proprietor has measure of information records that he wishes to outsource on cloud server in scrambled frame. Before outsourcing, information proprietor will first build a protected searchable record from an arrangement of differing keywords expelled from the document gathering and store both the list and the encoded document on the cloud server. We attempt the endorsement between the information proprietor and clients are finished. To look the record gathering for a given keyword, ensured client ISSN NO: Volume 2 : Issue 3 - May 2017 Page 7

4 makes and presents an inquiry ask for in a mystery frame a trapdoor of the keyword to the cloud server. After getting the hunt ask for, the server is in control to seek the record and give back the coordinating arrangement of documents to the client. We concentrate the protected positioned keyword look dangerous as takes after: the query output must be returned providing for clear positioned significance standards, to create record recovery accuracy for clients. However, cloud server must review obscure or minimal about the critical standards themselves as they uncover significant touchy information against keyword protection. To decline transfer speed, the client may send conceivable esteem k alongside the trapdoor and cloud server just sends back the top-k most proper documents to the client's concerned keyword. Outline Goals: To permit positioned scan for agent utilization of outsourced cloud information under the previously mentioned display, our framework configuration ought to quickly accomplish security and execution affirmations as takes after. Multi-keyword Ranked Search: To configuration seek plans which permit multi-keyword question and give result closeness positioning to successful information recovery, rather than returning undifferentiated outcomes. Protection Preserving: To keep the cloud server from taking in extra information from the dataset and the record, and to meet security. Effectiveness: Above objectives on usefulness and security ought to be accomplished with low correspondence and calculation overhead. Arrange Matching: "Organize coordinating" [2] is a middle of the road comparability measure which utilizes the quantity of question keywords showing up in the report to evaluate the importance of that archive to the inquiry. At the point when clients distinguish the correct subset of the dataset to be recaptured, Boolean inquiries accomplish well with the correct hunt need expressed by the client. It is more versatile for clients to recognize a rundown of keywords demonstrating their worry and recover the most important reports with a rank request. VI. IMPLEMENTATION A. Data User Module: Information clients are clients on this framework, will's identity ready to download documents from the cloud that are transferred by the information proprietors. Since the documents put away on the cloud server could be in enormous numbers, there is a pursuit office gave to the client. The client ought to have the capacity to do a multi-keyword look on the cloud server. Once, the outcome shows up for the particular pursuit, these clients ought to have the capacity to send a demand to the individual information proprietors of the document through the framework (likewise called trap-entryway ask for) for downloading these records. The information clients will likewise be given a demand endorsement screen, where it will tell if the information proprietor has acknowledged or dismisses the demand. In the event that the demand has been affirmed, the clients ought to have the capacity to download the decoded record. B. Information Owner Module: In this module, the information proprietors ought to have the capacity to transfer the records. The documents are encoded before the records are transferred to the cloud. The information proprietors are given an alternative to enter the keywords for the document that are transferred to the server. These keywords are utilized for the ordering reason which helps the pursuit return values rapidly. These records when once accessible on the cloud, the information clients ought to be capable pursuit utilizing the keywords. The information proprietors will likewise be furnished with a demand endorsement screen so they can support or reject the demand that is gotten by the information clients. C. Document Upload and Encryption Module: In this module, the information proprietors ought to have the capacity to transfer the documents. The records are scrambled before the documents are transferred to the cloud. The information proprietors are given an alternative to enter the keywords for the record that are transferred to the server. These keywords are utilized for the ordering reason which helps the hunt return values rapidly. These records when once accessible on the cloud, the information clients ought to have the capacity to hunt utilizing keywords. The information proprietors will likewise be furnished with a ISSN NO: Volume 2 : Issue 3 - May 2017 Page 8

5 demand endorsement screen so they can support or reject the demands that are gotten by the information clients. The document before transfer should be encoded with a key so that the information clients can't simply download it without this key. This key will be asked for by the information clients through the trap-entryway. The encryption of these records utilizes RSA calculation so that unapproved clients won't have the capacity to download these documents. D. Document Download and Decryption Module: Information clients are clients on this framework, will's identity ready to download documents from the cloud that are transferred by the information proprietors. Since the records put away on the cloud server could be in immense numbers, there is a pursuit office gave to the client. The client ought to have the capacity to do a multi-keyword seek on the cloud server. Once, the outcome shows up for the particular pursuit, the clients ought to have the capacity to send a demand to the individual information proprietors of the document through the framework (additionally called trap-entryway ask for) for downloading these records. The information clients will likewise be given a demand endorsement screen, where it will tell if the information proprietor has acknowledged or dismisses the demand. On the off chance that the demand has been endorsed, the clients ought to have the capacity to download the unscrambled document. The record before download should be unscrambled with a key. This key will be asked for by the information clients through the trapentryway ask. Once the key is given amid the download, the information clients will have the capacity to download the record and utilize them. E. Rank-Search Module: This module permits the information clients to seek the documents with multi-keyword rank looking. This model uses the every now and again utilized rank hunting calculation down present the yield for multi-keywords. "Facilitate Matching" guideline will be embraced for the multi-keyword seeking. This module likewise deals with making a file for speedier hunt. VII. CONCLUSION In this work, firstly we portray and resolve the troublesome of multi-keyword positioned look over scrambled cloud information, and make an assortment of protection necessities. Between various multi-keyword semantics, we select the compelling likeness measure of "facilitate coordinating", i.e., as different matches as likely, to adequately catch the importance of outsourced archives to the question correspondence.in our future work, we will seek supporting other multi keyword semantics over encoded information and checking the honesty of the rank request in the item keywords. For tradition the test of steady multikeyword semantic without security breaks, we propose an essential thought of MRSE. At that point we give two better MRSE diagrams to acknowledge numerous stringent security necessities in two divergent risk models. Nitty gritty examination contemplating security and effectiveness assurances of proposed plans is given, and trials on this present reality information set demonstrate our future frameworks present low overhead on both calculation and correspondence. REFERENCES [1] Qin Liuy, Guojun Wangyz, and Jie Wuz, Secure and privacy preserving keyword searching for cloud storage services, ELSEVIER Journal of Network and computer Applications, March 2011 [2] Ming Li et al., Authorized Private Keyword Search over Encrypted Data in Cloud Computing,IEEE proc. International conference on distributed computing systems, June 2011,pages [3] Cong Wang et al., Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Transactions on parallel and distributed systems, vol. 23, no. 8, August 2012 [4] Kui Ren et al., Towards Secure and Effective Data utilization in Public Cloud, IEEE Transactions on Network, volume 26, Issue 6, November / December 2012 [5] Ming Li et al., Toward Privacy-Assured and Searchable Cloud Data Storage Services, IEEE Transactions on Network, volume 27, Issue 4, July/August 2013 [6] Wei Zhou et al., K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing Journal of Software Engineering and Applications, Scientific Research, Issue 6, Volume 29-32,January2013 [7] J. Baek et al., Public key encryption with keyword search revisited", in ICCSA 2008, vol of Lecture Notes in Computer Science, pp , Perugia, Italy, Springer Berlin/Heidelberg. [8] H. S. Rhee et al., Trapdoor security in a searchable public-key encryption scheme with a designated tester," The Journal of Systems and Software, vol. 83, no. 5, pp , [9] Peng Xu et al., Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack,IEEE Transactions on computers, vol. 62, no. 11, November 2013 [10] Ning Cao et al., Privacy-Preserving Multi- Keyword Ranked Search over Encrypted Cloud Data, IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, jan 2014 [11] D. X. D. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, in Proc. S & P, BERKELEY, CA, 2000, pp. 44. ISSN NO: Volume 2 : Issue 3 - May 2017 Page 9

6 [12] C. Wang, N. Cao, K. Ren, and W. J. Lou, Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp , Aug [13] W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking, in Proc. ASIACCS, Hangzhou, China, 2013, pp [14] R. X. Li, Z. Y. Xu, W. S. Kang, K. C. Yow, and C. Z. Xu, Efficient multi-keyword ranked query over encrypted data in cloud computing, Futur. Gener. Comp. Syst., vol. 30, pp , Jan [15] Gurdeep Kaur, Poonam Nandal, Ranking Algorithm of Web Documents using Ontology, IOSR Journal of Computer Engineering (IOSR-JCE) eissn: , p- ISSN: Volume 16, Issue 3, Ver. VIII (May-Jun. 2014), PP ISSN NO: Volume 2 : Issue 3 - May 2017 Page 10

Multi-Keyword Ranked Search in Encrypted Cloud Storage

Multi-Keyword Ranked Search in Encrypted Cloud Storage Multi-Keyword Ranked Search in Encrypted Cloud Storage Akshay Kasulkar, Sahil Kamble, Nikhil Shettiwar, Tejaswini Dongre Prof. Vijay Masne UG Student, Dept. of Computer Science & Engineering, DBACER College,

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,

More information

International Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: Volume No.-4, Issue No.

International Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: Volume No.-4, Issue No. A Review on Multi-Keyword Based Image Retrieval System for Encrypted Image Data Stored On Cloud Pawandeep 1, Hardeep Singh 2 1 Student, CSE department, CGC-COE Landran, Pawandeep.saini@gmail.com 2 Asst.

More information

EXECUTION OF PRIVACY - PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER CLOUD INFORMATION

EXECUTION OF PRIVACY - PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER CLOUD INFORMATION EXECUTION OF PRIVACY - PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER CLOUD INFORMATION Sunitha. N 1 and Prof. B. Sakthivel 2 sunithank.dvg@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor

More information

Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically

Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically G. Sunil Santhosh Kumar 1, M. Swapna 2 1 Assistant Professor, Marri Laxman Reddy Institute of Technology and Management, Telangana

More information

Ramesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju

Ramesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Dynamic Secure Multi-Keyword Ranked Search over

More information

Dynamic Secure Multi-Keyword Ranked Search over Encrypted Cloud Data

Dynamic Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Volume 2, Issue 3, ISSN [O]: 2455-4545 Macaw International Journal of advanced Research in Computer Science and Engineering (MIJARCSE) Available online at: http://www.macawpublications.com Dynamic Secure

More information

Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Muzammil Ahmed 1, Asrarullah Khan 2 1M.E Dept. of CSE, Matoshri Pratishthan Group of Institutions, Khupsarwadi, Nanded, Maharashtra

More information

SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Research Manuscript Title SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Dr.B.Kalaavathi, SM.Keerthana, N.Renugadevi Professor, Assistant professor, PGScholar Department of

More information

Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies

Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article /

More information

Query Result Extraction Using Dynamic Query Forms

Query Result Extraction Using Dynamic Query Forms Query Result Extraction Using Dynamic Query Forms #1 Mrs. I. Anitha Rani, #2 Y.Vijay, #3 Abdul Moseen #1 Assistant Professor, Department of Computer Science Engineering,Andhra Loyola Institute Of Engineering

More information

Received on Accepted on

Received on Accepted on ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com EFFICIENT SEARCHING WITH MULTIPLE KEYWORD OVER ENCRYPTED CLOUD DATA BY BLIND STORAGE K.Santhi* 1, M.Deepa 2, M.Lawanya

More information

A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data

A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data Purva Jain 1, Dr. Abhijit Banubakode 2 ( Computer, RSCOE, University of Pune, Pune, Maharashtra India) 1 ( I.T., RSCOE, University

More information

Exploration Encryption Mechanism Using Single Key for Public Cloud Storage

Exploration Encryption Mechanism Using Single Key for Public Cloud Storage International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/v3i05.07 Exploration Encryption Mechanism Using Single Key for Public Cloud

More information

Catch You in the event that You Misbehave Ranked Keyword Search Results Verification in Cloud Computing

Catch You in the event that You Misbehave Ranked Keyword Search Results Verification in Cloud Computing International Journal for Modern Trends in Science and Technology Volume: 03, Issue No: 09, September 2017 ISSN: 2455-3778 http://www.ijmtst.com Catch You in the event that You Misbehave Ranked Keyword

More information

Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud

Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Anusha K 1, Babitha M N 2 PG Student, Department of Computer Science & Engineering, SSIT, Tumakuru, Karnataka, India 1 Assistant Professor,

More information

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid

More information

Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data

Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data Shruthishree M. K, Prasanna Kumar R.S Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared

More information

Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing

Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing 1 Naveen Kumar.B 2 Mr.Praveen Babu.G 1 M.Tech Student, Software Engineering, School of Information Technology JNTUH, Village

More information

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Abstract: Distributed computing is area that permits clients to store the information. Distributed

More information

A Survey on Phrase Search over Encrypted Cloud Storage with Multiple Data Owners

A Survey on Phrase Search over Encrypted Cloud Storage with Multiple Data Owners A Survey on Phrase Search over Encrypted Cloud Storage with Multiple Data Owners [1] Pavan Kumar Kandukuri, [2] G. Vishnu Murthy [2] Professor, [1] Dept. of Computer Science & Engineering, Anurag Group

More information

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN. Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS

More information

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department

More information

Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage

Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Mr. Ramesh 1, Prof. Girish Kumar D 2, Student, M.tech(Computer Networking) 1,, Assistant Professor, Computer

More information

International Journal of Science Engineering and Advance Technology, IJSEAT,Vol.3,Issue 8

International Journal of Science Engineering and Advance Technology, IJSEAT,Vol.3,Issue 8 Multi-keyword Ranked Search over Encrypted Cloud Data Using RSA Algorithm KandiKattu Balaji Swamy 1, K.KISHORE RAJU 2 1 M.Tech (Information Technology), S.R.K.R ENGINEERING COLLEGE, A.P., India. 2 ASSISTANT

More information

Facilitating Shielded and Adept Ranked Keyword Search over Outsourced Obscure Information

Facilitating Shielded and Adept Ranked Keyword Search over Outsourced Obscure Information Facilitating Shielded and Adept Ranked Keyword Search over Outsourced Obscure Information Karthika.RN PG Student, Veltech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai Abstract:

More information

International Journal of Advance Engineering and Research Development. Secure and dynamic Multi-keyword Ranked Search Over Cloud Data

International Journal of Advance Engineering and Research Development. Secure and dynamic Multi-keyword Ranked Search Over Cloud Data Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Secure and

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 3, March -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Identify

More information

Efficient Approach for Query Based Search in Data Mining

Efficient Approach for Query Based Search in Data Mining International Journal of Private Cloud Computing Environment and Management Vol. 3, No. 2, (2016), pp. 1-6 http://dx.doi.org/10.21742/ijpccem.2016.3.2.01 Efficient Approach for Query Based Search in Data

More information

Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1

Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1 Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1 M.Tech Student, Department of CSE, Narasaraopet Engineering College, Narasaraopet Guntur dist,

More information

PRIVACY PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER ENCRYPTED CLOUD DATA

PRIVACY PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER ENCRYPTED CLOUD DATA PRIVACY PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER ENCRYPTED CLOUD DATA G SRILEKHA 1*, SIVAIAH 2* 1. M.Tech, Dept of CSE, CMR College of Engg & Tech. 2. Assoc. Prof, Dept of CSE, CMR College of Engg

More information

[Patil*, 4(7): July, 2017] ISSN Impact Factor: 2.805

[Patil*, 4(7): July, 2017] ISSN Impact Factor: 2.805 KEY AGGREGATE SEARCHABLE ENCRYPTION FOR SHARING THE DATA ON MULTI CLOUD R. U. Patil *1 & Prof. A. J. Kadam 2 M.E, Department of Computer Engineering, All India Shri Shivaji Memorial Society's, College

More information

Enhanced Multi-Keyword Ranked Search Over Encrypted Cloud Data for Security B.VENKATA JYOTHSNADEVI 1, G. VIJAYA VANI 2

Enhanced Multi-Keyword Ranked Search Over Encrypted Cloud Data for Security B.VENKATA JYOTHSNADEVI 1, G. VIJAYA VANI 2 WWW.IJITECH.ORG ISSN 2321-8665 Vol.03,Issue.02, June-2015, Pages:0274-0279 Enhanced Multi-Keyword Ranked Search Over Encrypted Cloud Data for Security B.VENKATA JYOTHSNADEVI 1, G. VIJAYA VANI 2 1 PG Scholar,

More information

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 12, December -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 A SCRIPT

More information

CO-RELATION TECHNIQUE FOR SEARCHING OF ENCRYPTED DATA OVER CLOUD 1

CO-RELATION TECHNIQUE FOR SEARCHING OF ENCRYPTED DATA OVER CLOUD 1 CO-RELATION TECHNIQUE FOR SEARCHING OF ENCRYPTED DATA OVER CLOUD 1 Vrushali R. Charde, 2 Prof. Nitin S. More 1,2 Dept. of Information Technology Smt. Kashibai Navale College of Engg. Pune, India 1 vrushali24692@gmail.com,

More information

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach Mr Vaibhav Sawalkar 1,Prof.Megha Singh 2 1 MTECH Student,Dept of Computer Science, CIIIT

More information

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

Efficient Auditable Access Control Systems for Public Shared Cloud Storage Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,

More information

A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted

A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted 1 A.Raghavendra

More information

R. R. Badre Associate Professor Department of Computer Engineering MIT Academy of Engineering, Pune, Maharashtra, India

R. R. Badre Associate Professor Department of Computer Engineering MIT Academy of Engineering, Pune, Maharashtra, India Volume 7, Issue 4, April 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Service Ranking

More information

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

More information

IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K.

IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K. Volume 119 No. 15 2018, 995-1000 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Vanita Gadekar 1, Baisa Gunjal. 2 1 Student, Computer Department, Amruthvahini College Of Engineering, Maharashtra,

More information

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Sushma T Shanbhogue 1, Poonguzhali E 2 P.G. Student, Department of Computer Engineering, AMC Engineering College, Bangalore,

More information

Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted Cloud Data

Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted Cloud Data www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11385-11390 Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted

More information

An Algorithm for user Identification for Web Usage Mining

An Algorithm for user Identification for Web Usage Mining An Algorithm for user Identification for Web Usage Mining Jayanti Mehra 1, R S Thakur 2 1,2 Department of Master of Computer Application, Maulana Azad National Institute of Technology, Bhopal, MP, India

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 10, October -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Efficient

More information

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp Vol.2, No.2, June 30 (2016), pp. 35-41 http://dx.doi.org/10.21742/apjcri.2016.06.05 1) 2) Abstract Cloud computing gives an adaptable and helpful route for information sharing, which brings different advantages

More information

FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA 1 M MOUNIKA 1 M.Tech Student, Department of CSE, Jyothishmathi institute of Technology & science, karimnagar,

More information

Secure Sensitive Data

Secure Sensitive Data Secure Sensitive Data Praneet Mohanbala 1, Manisha Parida 2, Dr.Roopa R 3 U.G. Student, Department of Information Science &Engg, BMS College of Engineering, Bangalore, India 1 U.G. Student, Department

More information

AES and DES Using Secure and Dynamic Data Storage in Cloud

AES and DES Using Secure and Dynamic Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

A NEW FRAMEWORK FOR PROVABLE FEATURES BASED KEYWORD SEARCH OUTSOURCED ENCRYPTED DATA FINAL

A NEW FRAMEWORK FOR PROVABLE FEATURES BASED KEYWORD SEARCH OUTSOURCED ENCRYPTED DATA FINAL A NEW FRAMEWORK FOR PROVABLE FEATURES BASED KEYWORD SEARCH OUTSOURCED ENCRYPTED DATA FINAL M.Divyalakshmi 1, D.Rambabu 2 1 Pursuing M.Tech, 2 Associate Professor, Holy Marry Institute of Technology & Sciences

More information

INFORMATION SECURITY AND PRIVACY IN CLOUD USING HYBRID CRYPTOGRAPHIC ALGORITHM

INFORMATION SECURITY AND PRIVACY IN CLOUD USING HYBRID CRYPTOGRAPHIC ALGORITHM INFORMATION SECURITY AND PRIVACY IN CLOUD USING HYBRID CRYPTOGRAPHIC ALGORITHM PRIYA K Assistant Professor, Information Science and Engineering, MVJ College Of Engineering, Bangalore, India Abstract From

More information

IMPLEMENTATION OF INFORMATION RETRIEVAL (IR) ALGORITHM FOR CLOUD COMPUTING: A COMPARATIVE STUDY BETWEEN WITH AND WITHOUT MAPREDUCE MECHANISM *

IMPLEMENTATION OF INFORMATION RETRIEVAL (IR) ALGORITHM FOR CLOUD COMPUTING: A COMPARATIVE STUDY BETWEEN WITH AND WITHOUT MAPREDUCE MECHANISM * Journal of Contemporary Issues in Business Research ISSN 2305-8277 (Online), 2012, Vol. 1, No. 2, 42-56. Copyright of the Academic Journals JCIBR All rights reserved. IMPLEMENTATION OF INFORMATION RETRIEVAL

More information

TOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA

TOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA TOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA Mrs.B.Jeeva, M.E., (CSE), Jay Shriram Group of Institutions, Tirupur. jeeva2mail@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE,

More information

Improving Keyword Query Suggestions On Document Proximity With Using LKS Framework And PA Algorithm

Improving Keyword Query Suggestions On Document Proximity With Using LKS Framework And PA Algorithm Improving Keyword Query Suggestions On Document Proximity With Using LKS Framework And PA Algorithm 1 N.VARUN KUMARI 2 MRS. P. SREE LAKSHMI 1 M. Tech Student, Department of CSE, B.V. Raju Institute of

More information

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

Hierarchical Attribute Based Revocable Data Access Control For Multi Authority Cloud Storage

Hierarchical Attribute Based Revocable Data Access Control For Multi Authority Cloud Storage IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 4, Ver. I (Jul - Aug 2017), PP 91-97 www.iosrjournals.org Hierarchical Attribute Based Revocable Data

More information

Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing

Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing ISSN No: 2454-9614 Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing *Corresponding Author: D. Vaduganathan E-mail:vaduganathan.kce@gmail.com D. Vaduganathan a a)

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

Result Analysis: Decentralized Access Control with Anonymous Authentication

Result Analysis: Decentralized Access Control with Anonymous Authentication Result Analysis: Decentralized Access Control with Anonymous Authentication Prof D.S.Thosar 1, Punam S.Jadhav 2,Shruti S.Thosar 3,Swapnali D.Sarode 4 1 Assistant Prof. Computer Department, 2,3,4 Student

More information

DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS

DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS Harshit Yadav Student, Bal Bharati Public School, Dwarka, New Delhi

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18,  ISSN International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, www.ijcea.com ISSN 2321-3469 SECURE MOBILE HEALTH CARE SYSTEM THROUGH SHARABLE AND TRACEABLE FEATURES

More information

Linear Programming Solution for Secure and Outsourcing in Cloud Computing

Linear Programming Solution for Secure and Outsourcing in Cloud Computing Linear Programming Solution for Secure and Outsourcing in Cloud Computing V.SANDEEP PG Scholar, Dept. Computer Science Engineering, Kakinada Institute Of Engineering Technology, KORANGI, KAKINADA. CH.SUBHASH

More information

Implementation of Data Clustering With Meta Information Using Improved K-Means Algorithm Based On COATES Approach

Implementation of Data Clustering With Meta Information Using Improved K-Means Algorithm Based On COATES Approach www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10647-10651 Implementation of Clustering With Meta Information Using Improved

More information

Auto Secured Text Monitor in Natural Scene Images

Auto Secured Text Monitor in Natural Scene Images IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. V (Jul.-Aug. 2016), PP 148-152 www.iosrjournals.org Auto Secured Text Monitor in Natural Scene

More information

Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds

Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds Qin Liu [1][2], Guojun Wang [1], and Jie Wu [2], [1] Central South University, China [2] Temple University, USA 1 Outline 1. 1. Introduction

More information

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health

More information

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT: CRYPTOGRAPHY AND NETWORK SECURITY K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 1 Email:lakshmikpriya3698@gmail.com, 2 Email:rubhapandian@gmail.com, 3 Email:niranjanamurugan@gmail.com, Nadar Saraswathi College

More information

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY

MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY GARNEPALLI MOUNIKA 1, N.SANTHOSH RAMCHANDER 2 M. Tech Student, CSE, SVS Group of Institutions, Warangal, TS 1 M.Tech (Ph.D) Assoc. Prof, CSE Dept,

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)

More information

Data Store and Multi-Keyword Search on Encrypted Cloud Data

Data Store and Multi-Keyword Search on Encrypted Cloud Data Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent

More information

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN

More information

SECURE SCHEME ON CRYPTOGRAPHY

SECURE  SCHEME ON CRYPTOGRAPHY SECURE EMAIL SCHEME ON CRYPTOGRAPHY 1 Ms.Karthika.M 2 Mr.Mitun Kumar.M.B 3 Ms.Nithya.A 4 Dr. Kalaikumaran.T 1 Department of Computer Science And Engineering, SNS College of Technology, Coimbatore, India

More information

An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration

An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration Ruchi Tailwal P.G. Scholar, Graphic Era Hill University Dehradun, India Avita Katal Assistant Professor,

More information

Secure Multi keyword Retrieval over Encrypted Cloud Data

Secure Multi keyword Retrieval over Encrypted Cloud Data Secure Multi keyword Retrieval over Encrypted Cloud Data Ms. Pradnya H. Unde 1, Ms. Arti Mohanpurkar 2 1 Master of Engineering (Computer Engineering), Savitribai Phule Pune University Dr. D. Y. Patil SOET,

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 05, May -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 PRIVACY-PRESERVING

More information

Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments

Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Qin Liu, Chiu C. Tan, Jie Wu, and Guojun Wang School of Information Science and Engineering, Central South University,

More information

A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Computing

A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Computing A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Computing Dhananjaya.V Dr.Balasubramani.R Dr.JagadeeshGowda.K.S Naveen Ghorpade Asst.Prof,CSEDept, Prof & HOD,ISE Dept, Prof &

More information

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud

More information

ISSN Vol.04,Issue.05, May-2016, Pages:

ISSN Vol.04,Issue.05, May-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG

More information

Implementation of AES using 512 bit key for secure communication

Implementation of AES using 512 bit key for secure communication .gmailc. Implementation of AES using 512 bit key for secure communication Kazi Huma, Shete Chaitali, Vidhate Amruta, Deshmukh Sneha Prof.Zine D.B Computer Engineering Department, A.J.M.V.P.S, Shri Chhatrapati

More information

A Procedural Based Encryption Technique for Accessing Data on Cloud

A Procedural Based Encryption Technique for Accessing Data on Cloud A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage

Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage 1

More information

Privacy Preserving Location Query Service

Privacy Preserving Location Query Service Privacy Preserving Location Query Service P.Sampath Kumar, K. RAJENDRA PRASAD, A. SOUJANYA, Ch. SRIKANTH Student, M.Tech CSE Dept., Professor & HOD, CSE Department Institute of Aeronautical Engineering

More information

Dual-Server Public-key Encryption with Keyword Search for Secure Cloud Storage

Dual-Server Public-key Encryption with Keyword Search for Secure Cloud Storage Dual-Server Public-key Encryption with Keyword Search for Secure Cloud Storage A.VIJAYA DURGA 1, N. KOTESWARAMMA 2, B. LAKSHMI PRAVEENA 3 1,2 Dept. of MCA, VVIT, Guntur, AP 3 Dept. of IT, VVIT, Guntur,

More information

Based on Distance Comparison Shortest Path Algorithm

Based on Distance Comparison Shortest Path Algorithm Volume 118 No. 20 2018, 853-860 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Based on Distance Comparison Shortest Path Algorithm 1 Y. NavyaSri, 2 K. Meghana, 3 D. Nageswari and

More information

COPY RIGHT. To Secure Your Paper As Per UGC Guidelines We Are Providing A Electronic Bar Code

COPY RIGHT. To Secure Your Paper As Per UGC Guidelines We Are Providing A Electronic Bar Code COPY RIGHT 2018IJIEMR.Personal use of this material is permitted. Permission from IJIEMR must be obtained for all other uses, in any current or future media, including reprinting/republishing this material

More information

Dual-server public-key encryption with keyword search for secure cloud storage

Dual-server public-key encryption with keyword search for secure cloud storage ISSN:2348-2079 Volume-6 Issue-2 International Journal of Intellectual Advancements and Research in Engineering Computations Dual-server public-key encryption with keyword search for secure cloud storage

More information

Control Cloud Data Access Privilege And Anonymity With Fully Anonymous Attribute Based Encryption

Control Cloud Data Access Privilege And Anonymity With Fully Anonymous Attribute Based Encryption Control Cloud Data Access Privilege And Anonymity With Fully Anonymous Attribute Based Encryption Mr.K.Raju 1,N.Naga Sai Anuradha 2,P.Pramitha Sharon 3,Md.Yasmeen 4 Assistant Professor 1, CSE,Andhra Loyola

More information

Privacy Preserving Multi Keyword Search in Cloud Computing

Privacy Preserving Multi Keyword Search in Cloud Computing ISSN: 2454-132X Impact factor: 4.295 (Volume 4, Issue 2) Available online at: www.ijariit.com Privacy Preserving Multi Keyword Search in Cloud Computing Mansour Alshaikhsaleh mansouralshaikh@oakland.edu

More information

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption

More information

International Journal of Advance Engineering and Research Development. Data Masking: A Secured Data Storage on Cloud

International Journal of Advance Engineering and Research Development. Data Masking: A Secured Data Storage on Cloud Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Data Masking: A Secured Data Storage on Cloud Mrs.

More information

Improved K-Means Algorithm Based on COATES Approach. Yeola, Maharashtra, India. Yeola, Maharashtra, India.

Improved K-Means Algorithm Based on COATES Approach. Yeola, Maharashtra, India. Yeola, Maharashtra, India. Improved K-Means Algorithm Based on COATES Approach Mr.Nikhil Patankar 1, Prof.Prakash Rokade 2 1 Department of Computer Engineering, SND College of Engineering & Research Center, Yeola, Maharashtra, India

More information

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,

More information