International Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: Volume No.-4, Issue No.

Size: px
Start display at page:

Download "International Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: Volume No.-4, Issue No."

Transcription

1 A Review on Multi-Keyword Based Image Retrieval System for Encrypted Image Data Stored On Cloud Pawandeep 1, Hardeep Singh 2 1 Student, CSE department, CGC-COE Landran, Pawandeep.saini@gmail.com 2 Asst. Prof., CGC-COE Landran, Cgccoe.cse.hardeep@gmail.com Abstract-In recent years, cloud computing has become an advanced area, particularly due to its potential merits and applications. Also CBIR has become the active research topic in the area of computer science in past few years. In order to realize the cloud computing, many constraints are associated out of which multi-keyword search and privacy preserving are one of them. To enhance the use of data utilization search over multi-keyword encrypted cloud data a CBIR approach is used. CBIR is an effective method to retrieve the relevant images from large database. Searchable encryption scheme is proposed which focuses on multi keyword search and Boolean keyword search. For the efficient result, image segmentation approach is followed to extract the various features present in an image. Further, the use of other principle inner product similarity is used therefore count of query keywords present in a document chooses for result ranking. Using secure inner product computation, MRSE scheme has been proposed. Keywords: Privacy preserving, Coordinate-matching, CBIR, Inner-product similarity, Multi-keyword and MRSE I. INTRODUCTION Cloud computing is getting more and more important with the increase in technology. Cloud computing has an extensive variety of use to store the information.it diminishes the cost on equipment, programming and work force systems of support, and so forth [1]. To upgrade the speed content based recovery is proposed in this paper which is concerned with the recovery of pictures from the dataset, like the database of images. Hence this CBIR is implemented in cloud environment. The meaning of content based is that the search will analyze the contents of the image like shape, texture, color, or any other information resulting from an image itself. To ensure the information security the information must be in scrambled form to ensure that unapproved individual cannot recover the information. To explore privacy protection and effective search administration over cloud is a major test. The substantial number of information clients and outsourced information records in a cloud is a major test in this paper on the grounds that it is excessively troublesome; making it impossible to meet the necessities of execution, ease of use and framework adaptability. To meet the effective result Coordinate-matching [2] is used to find the similarity between search query and data documents principle among various multi-keyword semantics. The other rule "inward product similarity" [2] assesses the quantity of multikeywords identified with question showing up in an archive, to discover the closeness of a record to the inquiry in "coordinate matching" guideline. Applying these standards in the encoded cloud information seek framework is an exceptionally difficult assignment. On the other hand, searchable encryption method [3] is exceptionally useful that regards encoded information as archives and clients can without much of a stretch pursuit reports through multi-keyword search and recover the productive result. On the other hand Boolean keyword search technique is also helpful to retrieve the data. This technique enhances the system greatly which retrieves the matching files in a ranked order. But this technique is not much secure to design ranked searchable encryption system. Another huge test is to build an effective encoded information search technique that supports multi-keyword semantics without breaking security rules. To meet this test MRSE plan is proposed utilizing secure inward product calculation adjusted from k-closest neighbor strategy. Two levels of risk models are utilized to accomplish different security prerequisites. 2.1 System Model II. PROBLEM FORMULATION Three entities are considered in system model as shown in figure 1. They are - cloud server, data user and data owner. Information Owner concentrates the quantity of remarkable keywords from the arrangement of information. From this accumulation of information a encoded searchable index is built by the owner. Every one of the documents are in encoded form and information owner transfers the encoded information gathering and file to the cloud server RES Publication 2012 Page 6

2 Information client is in charge of giving essential keywords to the cloud server. By utilizing some inquiry control systems trapdoor is created comparing to the keywords. The approval between information owner and client is dared to be done roughly. Cloud server represents the estimation and returns the arrangement of encoded documents. Information client additionally sends a optional number alongside the trapdoor to decrease the correspondence cost. Accordingly, cloud server recover the most important highest records identified with search inquiry to send back. Figure 1: Search architecture over 2.2 THREAT MODELS Two kinds of threat model as per the following:- CIPHERTEXT MODEL encrypted cloud data In this model searchable index and encoded arrangement of information are outsourced from data. The cloud server should just know dataset in encoded structure C and searchable record I. BACKGROUND MODEL In this model, cloud server has a few foundations on the dataset, which can be subject and measurable data identified with it, in addition to this, what can be accessed to is known as cipher text model. In the event of possible attacks, cloud server could make utilization of record frequency to distinguish keywords in the submitted query [4]. 2.3 DESIGN GOALS The planned framework ought to accomplish security and execution assurances to empower the ranked search for successful use of outsourced cloud information. It ought to be as per the following: MULTI-KEYWORD RANKED SEARCH Under the above model, security and ranked search are proposed in this paper. MRSE supports the result ranking and multi keyword query. PRIVACY-PRESERVING To prevent additional information obtained from trapdoor and index to be learned by cloud server, a scheme is proposed and also meets the privacy concerns. a) Index Confidentiality: The file esteem which is put away in cloud server should be encoded as all the TF estimations of keywords are stored away there. b) Trapdoor Unlink ability: While cloud server performs some factual analysis of search results, the same inquiry produces the distinctive trapdoors in the mean time when the search is performed two times. c) Keyword privacy: cloud server couldn't have the capacity to discover query keyword and list by examining the terms like recurrence from factual data. 2.4 FRAMEWORK AND PRIVACY REQUIREMENTS FOR MRSE MRSE FRAMEWORK MRSE consists of four algorithms as follows:- Setup: - The symmetric key SK is put on as an output by the data owner and security parameter L is taken as a input RES Publication 2012 Page 7

3 Build Index: - On the premise of dataset F, searchable list is build by data owner, which is further encoded by the symmetric key SM and afterward send to cloud server. After the list is developed, the report gathering can be autonomously encoded and outsourced. Trapdoor (): - With the assistance of t keywords as information, this calculation creates a comparing trapdoor. Query(K,I ):- Ranked search on list I is performed at whatever point cloud server gets a request demand as (K) and with the assistance of trapdoor returns the rundown of top k reports in a positioned id request, sorted in the similarity structure. PRIVACY REQUIREMENTS FOR MRSE The different search privacy requirements for MRSE included in the inquiry methodology are more entangled and hard to handle which are as per the following:- KEYWORD PRIVACY: - In keyword security, pivotal words which are shown by the comparing trapdoor will be concealing which are search by the clients. The purpose to create the trapdoor is just to secure the query keywords. To distinguish the keyword with high likelihood [5] report recurrence is adequate strategy. TRAPDOOR PRIVACY: - In trapdoor privacy only authorized persons are able to acquire trapdoor for their search query. SEARCH PATTERN: - Search pattern identifies the single keyword searchable encryption plan. Search patterns utilized as a part of MRSE implies that any data can be determined by the server. To know the search pattern of any user data trapdoor must be generated in a deterministic manner. ACCESS PATTERN: - Access patterns intend to search in grouping and each query output contain an arrangement of records which are positioned in a ranking order. Single Keyword Searchable Encryption III. RELATED WORK For secure keyword look, searchable encryption plan gives numerous arrangements [6]. In the symmetric key setting plan,song et al. presented the first searchable encryption plan in which two layered encryption is built where every word is encrypted independently [6] in the file. For efficient search, researchers turned this scheme to index technique. Goh et al. proposed comparable secure per-record index plan, in which a list incorporates backdoor of every particular word is developed for every document [7]. Goh brings change and security definitions in the symmetric key setting. Goh built up a Bloom channel based upon per-record file which diminishes the work load when another solicitation desires look which is specifically relative to the quantity of documents in the accumulation. Curtmola et al. introduced a for each keyword list based methodology, where hash table list is built [10] for the full collection of record, where exceptionally section contains the backdoor for a keyword and set of related document identifiers in encoded structure. Boneh et al. presented public key based searchable encryption plan [8]. In this plan with utilizing public key unapproved individual can keep in touch with the information which is put away on the server however the search is done just by approved clients by utilizing private key. Boolean Keyword Searchable Encryption P-Golle et al.[14] proposed conjunctive pivotal word look over encoded information. To improve framework ease of use and security scientists proposed ranking keyword search. As of late predicate encryption plan have been proposed both conjunctive and disjunctive search. Conjunctive keyword search in view of the idea of "win or nothing" that profits just those records in which all the keywords are indicated with the inquiry question showed up though disjunctive keyword returns undifferentiated results,implies that it gives back each archive which contains a particular's subset of keywords.. Wang et al. proposed ranked single-keyword search to recover the significant picture [17]. Cao et al. built plan for multi-keyword rank search, where Inward product similarity is utilized for result ranking [19]. To put it into action, he presumes that any existing Boolean encryption scheme does not support ranked multi-keyword ranked over encoded cloud data. Emilet al achieve more secure and effective updated images [21] using hierarchical index structure Chuah et al. exhibited fuzzy keyword search to upgrade the search over encrypted cloud data [22]. RES Publication 2012 Page 8

4 Li et al. build method which is used for storage efficiency of fuzzy keywords set [23]. Liu proposed dictionary-based fuzzy set construction to lessen the size of fuzzy keywords set [25]. Bringer et al. proposed a fuzzy search plan to embed edit distance into Hamming distance [26]. TABLE 1: COMPREHENSIVE SUMMARY OF PROPOSED WORK Paper Proposed Work Remarks Song, Dawn Xiaodon, IEEE, [27] has worked about the practically tested models over Chang, Y. C. et. al. Springer [9], 2005 has worked on user privacy protection in the keyword based search from the Curtmola, R. et. al. ACM [10] 2006 has worked on the symmetric algorithm for data encryption with improved feature definitions. Boneh, D. et. al., Springer, 2004 [8] have worked on the keyword search over the data encoded with public key encryption plans. Golle, P. et.al. Springer, 2004 [14] proposed multi-keyword in conjunctive form for the encrypted data searching. Stefanov, E. et. al., IACR, 2013 [21] for practical search of the dynamic queries over the leakageenabled The first encryption scheme with the searchable ability has been introduced. Full index based ranking over the data with large number of files. Full text query processing with every keyword based distributed search. The public key cryptosystem has been proposed for searchable Multi-keyword n-gram search for efficient search over the encrypted storage data. Works with the hierarchically structured data indexing. The double layer based encryption mechanism has been proposed for data. The proposed scheme has been popular indexing scheme for highly efficient data search models. Authors have worked on the bloom filter for full index containing each file s features to reduce the work load. Hash table based file indexing for the centralized fast information retrieval system. The writeable or readable encrypted data to create the search ability in the stored Not capable of providing the keyword based search in the appropriate ranking. Require higher level of efficiency for the secure image update and scalability. RES Publication 2012 Page 9

5 Chuah, M. et. al. [28], IEEE, 2011 for the fuzzy enabled solution for multiple keyword queries over the encrypted data with privacy awareness. Fuzzy sets enabled multivariate keyword search. The scheme has been presented as the enhancement of the search efficiency over the encoded data. IV. CONCLUSION & FUTURE WORK In this paper the issue of multi-keyword ranked search over encoded cloud data is determined and characterized and build up various security prerequisites. The standards coordinate matching and inner product similarity is utilized among different multikeyword semantics. The MRSE plan is proposed to meet the test of supporting multi-keyword semantics without security breaks. The audit done in this paper will turn out to be useful to scientists working in the range of multi-keyword look over encoded cloud information. Following the current examination, several possible directions are proposed for multi-keyword based image retrieval system for encrypted image data stored on cloud. In future, the most encouraging one will support other multi-keyword semantics over encoded data and stronger privacy ensure in threat model. In future work, problem of irrelevant searches in the result can be removed. When user submits the query car, the resultant is the images showing all car but also the other automobiles. So these irrelevant searches can be removed by using better schemes. REFERENCES [1] Ren, K., Wang, C., & Wang, Q. (2012). Security challenges for the public cloud. IEEE Internet Computing, (1), [2] Witten, I. H., Moffat, A., & Bell, T. C. (1999). Managing gigabytes: compressing and indexing documents and images. Morgan Kaufmann. [3] Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on In Security and Privacy, S&P Proceedings IEEE Symposium on (pp ). IEEE. [4] Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., & Mitra, S. (2008, March). Zerber: r-confidential indexing for distributed documents. In Proceedings of the 11th international conference on Extending database technology: Advances in database technology (pp ). ACM. [5] Zerr, S., Olmedilla, D., Nejdl, W., & Siberski, W. (2009, March). Zerber+ r: Top-k retrieval from a confidential index. In Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology (pp ). ACM. [6] Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on In Security and Privacy, S&P Proceedings IEEE Symposium on (pp ). IEEE. [7] Goh E-J Secure indexes. Cryptology eprint Archive, Report 2003/216 [8] Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004, January). Public key encryption with keyword search. In Advances in Cryptology-Eurocrypt 2004 (pp ). Springer Berlin Heidelberg. [9] Chang, Y. C., & Mitzenmacher, M. (2005, January). Privacy preserving keyword searches on remote In Applied Cryptography and Network Security (pp ). Springer Berlin Heidelberg. [10] Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. (2006, October). Searchable symmetric encryption: improved definitions and efficient constructions. In Proceedings of the 13th ACM conference on Computer and communications security (pp ). ACM. [11] Bellare, M., Boldyreva, A., & O Neill, A. (2007). Deterministic and efficiently searchable encryption. In Advances in Cryptology-CRYPTO 2007 (pp ). Springer Berlin Heidelberg. [12] Curtmola, R., Garay, J., Kamara, S., & Ostrovsky, R. (2006, October). Searchable symmetric encryption: improved definitions and efficient constructions. In Proceedings of the 13th ACM conference on Computer and communications security (pp ). ACM. [13] Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004, January). Public key encryption with keyword search. In Advances in Cryptology-Eurocrypt 2004 (pp ). Springer Berlin Heidelberg. [14] Golle, P., Staddon, J., & Waters, B. (2004, January). Secure conjunctive keyword search over In Applied Cryptography and Network Security (pp ). Springer Berlin Heidelberg. RES Publication 2012 Page 10

6 [15] Ballard, L., Kamara, S., & Monrose, F. (2005). Achieving efficient conjunctive keyword searches over In Information and Communications Security (pp ). Springer Berlin Heidelberg. [16] Hwang, Y. H., & Lee, P. J. (2007). Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Pairing- Based Cryptography Pairing 2007 (pp. 2-22). Springer Berlin Heidelberg. [17] Wang, C., Cao, N., Li, J., Ren, K., & Lou, W. (2010, June). Secure ranked keyword search over encrypted cloud data. In Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference on (pp ). IEEE. [18] Wang, C., Cao, N., Ren, K., & Lou, W. (2012). Enabling secure and efficient ranked keyword search over outsourced cloud data. Parallel and Distributed Systems, IEEE Transactions on, 23(8), [19] Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. Parallel and Distributed Systems, IEEE Transactions on, 25(1), [20] Yang, C., Zhang, W., Xu, J., Xu, J., & Yu, N. (2012, November). A fast privacy-preserving multi-keyword search scheme on cloud data. In Cloud and Service Computing (CSC), 2012 International Conference on (pp ). IEEE. [21] Stefanov, E., Papamanthou, C., & Shi, E. (2013). Practical Dynamic Searchable Encryption with Small Leakage. IACR Cryptology eprint Archive, 2013, 832. [22] Chuah, M., & Hu, W. (2011, June). Privacy-aware bedtree based solution for fuzzy multi-keyword search over In Distributed Computing Systems Workshops (ICDCSW), st International Conference on (pp ). IEEE. [23] Wang, C., Ren, K., Yu, S., & Urs, K. M. R. (2012, March). Achieving usable and privacy-assured similarity search over outsourced cloud data. In INFOCOM, 2012 Proceedings IEEE (pp ). IEEE. [24] Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., & Lou, W. (2010, March). Fuzzy keyword search over encrypted data in cloud computing. In INFOCOM, 2010 Proceedings IEEE (pp. 1-5). IEEE. [25] Liu, C., Zhu, L., Li, L., & Tan, Y. (2011, September). Fuzzy keyword search on encrypted cloud storage data with small index. In Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on (pp ). IEEE. [26] Bringer, J., & Chabanne, H. (2012). Embedding edit distance to enable private keyword search. Human-centric Computing and Information Sciences, 2(1), 1-12 [27] Song, Dawn Xiaodong, David Wagner, and Adrian Perrig. "Practical techniques for searches on " In Security and Privacy, S&P Proceedings IEEE Symposium on, pp IEEE, [28] Chuah, M., and W. Hu. "Privacy-aware bedtree based solution for fuzzy multi-keyword search over " In Distributed Computing Systems Workshops (ICDCSW), st International Conference on, pp IEEE, Pawandeep Mtech Student at cgc coe, landran AUTHOR S BIOGRAPHY RES Publication 2012 Page 11

International Journal of Science Engineering and Advance Technology, IJSEAT,Vol.3,Issue 8

International Journal of Science Engineering and Advance Technology, IJSEAT,Vol.3,Issue 8 Multi-keyword Ranked Search over Encrypted Cloud Data Using RSA Algorithm KandiKattu Balaji Swamy 1, K.KISHORE RAJU 2 1 M.Tech (Information Technology), S.R.K.R ENGINEERING COLLEGE, A.P., India. 2 ASSISTANT

More information

EXECUTION OF PRIVACY - PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER CLOUD INFORMATION

EXECUTION OF PRIVACY - PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER CLOUD INFORMATION EXECUTION OF PRIVACY - PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER CLOUD INFORMATION Sunitha. N 1 and Prof. B. Sakthivel 2 sunithank.dvg@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor

More information

Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1

Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1 Multi-keyword Stratified Search over Encrypted Cloud Data P. Uma Rani 1, Dr. B. Jhansi Vazram 2, G. Raphi 3 1 M.Tech Student, Department of CSE, Narasaraopet Engineering College, Narasaraopet Guntur dist,

More information

Dynamic Secure Multi-Keyword Ranked Search over Encrypted Cloud Data

Dynamic Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Volume 2, Issue 3, ISSN [O]: 2455-4545 Macaw International Journal of advanced Research in Computer Science and Engineering (MIJARCSE) Available online at: http://www.macawpublications.com Dynamic Secure

More information

A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted

A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted 1 A.Raghavendra

More information

Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted Cloud Data

Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted Cloud Data www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11385-11390 Improving Privacy Multi-Keyword Top-K Retrieval Search Over Encrypted

More information

Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically

Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically G. Sunil Santhosh Kumar 1, M. Swapna 2 1 Assistant Professor, Marri Laxman Reddy Institute of Technology and Management, Telangana

More information

FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA 1 M MOUNIKA 1 M.Tech Student, Department of CSE, Jyothishmathi institute of Technology & science, karimnagar,

More information

TOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA

TOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA TOWARDS SECURE MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED CLOUD DATA Mrs.B.Jeeva, M.E., (CSE), Jay Shriram Group of Institutions, Tirupur. jeeva2mail@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE,

More information

Ramesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju

Ramesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Dynamic Secure Multi-Keyword Ranked Search over

More information

Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data

Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data Shruthishree M. K, Prasanna Kumar R.S Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared

More information

International Journal of Advance Engineering and Research Development. Secure and dynamic Multi-keyword Ranked Search Over Cloud Data

International Journal of Advance Engineering and Research Development. Secure and dynamic Multi-keyword Ranked Search Over Cloud Data Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Secure and

More information

Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Muzammil Ahmed 1, Asrarullah Khan 2 1M.E Dept. of CSE, Matoshri Pratishthan Group of Institutions, Khupsarwadi, Nanded, Maharashtra

More information

CO-RELATION TECHNIQUE FOR SEARCHING OF ENCRYPTED DATA OVER CLOUD 1

CO-RELATION TECHNIQUE FOR SEARCHING OF ENCRYPTED DATA OVER CLOUD 1 CO-RELATION TECHNIQUE FOR SEARCHING OF ENCRYPTED DATA OVER CLOUD 1 Vrushali R. Charde, 2 Prof. Nitin S. More 1,2 Dept. of Information Technology Smt. Kashibai Navale College of Engg. Pune, India 1 vrushali24692@gmail.com,

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 10, October -2016 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Efficient

More information

Searchable Encryption. Nuttiiya Seekhao

Searchable Encryption. Nuttiiya Seekhao Searchable Encryption Nuttiiya Seekhao Overview Motivation Literature Background Solutions Scheme I, II, III, IV Discussion Runtime Possible Extensions Conclusion Motivation Motivation Motivation Searchable

More information

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach Mr Vaibhav Sawalkar 1,Prof.Megha Singh 2 1 MTECH Student,Dept of Computer Science, CIIIT

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Vanita Gadekar 1, Baisa Gunjal. 2 1 Student, Computer Department, Amruthvahini College Of Engineering, Maharashtra,

More information

Enhanced Multi-Keyword Ranked Search Over Encrypted Cloud Data for Security B.VENKATA JYOTHSNADEVI 1, G. VIJAYA VANI 2

Enhanced Multi-Keyword Ranked Search Over Encrypted Cloud Data for Security B.VENKATA JYOTHSNADEVI 1, G. VIJAYA VANI 2 WWW.IJITECH.ORG ISSN 2321-8665 Vol.03,Issue.02, June-2015, Pages:0274-0279 Enhanced Multi-Keyword Ranked Search Over Encrypted Cloud Data for Security B.VENKATA JYOTHSNADEVI 1, G. VIJAYA VANI 2 1 PG Scholar,

More information

Optimal Search Results Over Cloud with a Novel Ranking Approach

Optimal Search Results Over Cloud with a Novel Ranking Approach Optimal Search Results Over Cloud with a Novel Ranking Approach 1 Movva Kalpana, 2 JayanthiRao Madina 1 Final MTech student, 2 Assistant professor 1 Department of Software Engineering, SISTAM college,

More information

ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2,

ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, DEPARTMENT OF CSE SAHAJA INSTITUTE OF TECHNOLOGY & SCIENCES FOR WOMEN, KARIMNAGAR ABSTRACT: The

More information

SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Research Manuscript Title SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Dr.B.Kalaavathi, SM.Keerthana, N.Renugadevi Professor, Assistant professor, PGScholar Department of

More information

PRIVACY PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER ENCRYPTED CLOUD DATA

PRIVACY PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER ENCRYPTED CLOUD DATA PRIVACY PRESERVING MULTI-KEYWORD POSITIONED SEARCH OVER ENCRYPTED CLOUD DATA G SRILEKHA 1*, SIVAIAH 2* 1. M.Tech, Dept of CSE, CMR College of Engg & Tech. 2. Assoc. Prof, Dept of CSE, CMR College of Engg

More information

Content-Based Image Retrieval in Cloud Using Watermark Protocol and Searchable Encryption

Content-Based Image Retrieval in Cloud Using Watermark Protocol and Searchable Encryption Impact Factor Value: 4.029 ISSN: 2349-7084 International Journal of Computer Engineering In Research Trends Volume 4, Issue 6, June-2017, pp. 231-235 www.ijcert.org Content-Based Image Retrieval in Cloud

More information

A Multi-Keywords Ranking Searchable Encryption Based on Similarity in Cloud Computing

A Multi-Keywords Ranking Searchable Encryption Based on Similarity in Cloud Computing Journal of Information Hiding and Multimedia Signal Processing c 2018 ISSN 2073-4212 Ubiquitous International Volume 9, Number 3, May 2018 A Multi-Keywords Ranking Searchable Encryption Based on Similarity

More information

Efficient Fuzzy Search Engine with B -Tree Search Mechanism

Efficient Fuzzy Search Engine with B -Tree Search Mechanism Efficient Fuzzy Search Engine with B -Tree Search Mechanism Simran Bijral Department of Information Technology Maharashtra Institute of Technology Pune, India simi.bijral1@gmail.com Debajyoti Mukhopadhyay

More information

Secure Conjunctive Keyword Searches For Unstructured Text

Secure Conjunctive Keyword Searches For Unstructured Text Secure Conjunctive Keyword Searches For Unstructured Text Florian Kerschbaum SAP Research Karlsruhe, Germany Email: florian.kerschbaum@sap.com Abstract There are a number of searchable encryption schemes

More information

Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies

Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article /

More information

A Survey on Phrase Search over Encrypted Cloud Storage with Multiple Data Owners

A Survey on Phrase Search over Encrypted Cloud Storage with Multiple Data Owners A Survey on Phrase Search over Encrypted Cloud Storage with Multiple Data Owners [1] Pavan Kumar Kandukuri, [2] G. Vishnu Murthy [2] Professor, [1] Dept. of Computer Science & Engineering, Anurag Group

More information

Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments

Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Qin Liu, Chiu C. Tan, Jie Wu, and Guojun Wang School of Information Science and Engineering, Central South University,

More information

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp Vol.2, No.2, June 30 (2016), pp. 35-41 http://dx.doi.org/10.21742/apjcri.2016.06.05 1) 2) Abstract Cloud computing gives an adaptable and helpful route for information sharing, which brings different advantages

More information

A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data

A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data Purva Jain 1, Dr. Abhijit Banubakode 2 ( Computer, RSCOE, University of Pune, Pune, Maharashtra India) 1 ( I.T., RSCOE, University

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,

More information

Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud

Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud 2012 IEEE 18th International Conference on Parallel and Distributed Systems Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud Zhiyong Xu 1,3, Wansheng Kang 1,2, Ruixuan Li 2, KinChoong

More information

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing P. Likitha Department of Computer Science and Engineering, MJR College of Engineering & Technology, Piler, A.P - 517214, India. ABSTRACT:

More information

A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage

A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage Jeniphar Francis #, Chetna Getme # Priyanka Bagde # Ruchika Bansod # Prof. Ashish Palandurkar * # Student, Dept. of Information Technology

More information

Lightweight Efficient Multi-keyword Ranked Search over Encrypted Cloud Data using Dual Word Embeddings

Lightweight Efficient Multi-keyword Ranked Search over Encrypted Cloud Data using Dual Word Embeddings Lightweight Efficient Multi-keyword Ranked Search over Encrypted Cloud Data using Dual Word Embeddings Ruihui Zhao Mizuho Iwaihara Graduate School of Information, Production, and Systems, Waseda University

More information

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department

More information

Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search

Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search 1328 Jho et. al: Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search Nam-Su Jho 1, and Dowon Hong 2 1 Electronics

More information

Structured Encryption and Controlled Disclosure

Structured Encryption and Controlled Disclosure Structured Encryption and Controlled Disclosure Melissa Chase Seny Kamara Microsoft Research Cloud Storage Security for Cloud Storage o Main concern: will my data be safe? o it will be encrypted o it will

More information

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

Efficient Auditable Access Control Systems for Public Shared Cloud Storage Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,

More information

Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage

Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Generating Aggregate Key for Group Data Sharing by Means of Cloud Data Storage 1

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 12, December -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 A SCRIPT

More information

Semantic Search Over Encrypted Data

Semantic Search Over Encrypted Data Semantic Search Over Encrypted Data Tarik Moataz, Abdullatif Shikfa, Nora Cuppens-Boulahia, and Frédéric Cuppens TELECOM Bretagne, Rennes, France {tarik.moataz,nora.cuppens,frederic.cuppens}@telecom-bretagne.eu

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

I. INTRODUCTION DUE to the flexibility and economic savings offered by the

I. INTRODUCTION DUE to the flexibility and economic savings offered by the Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement Zhangie Fu, Member, IEEE, Xinle Wu, Chaowen Guan, Xingming Sun, Senior Member, IEEE, and Kui Ren, Fellow,

More information

Secure Multi keyword Retrieval over Encrypted Cloud Data

Secure Multi keyword Retrieval over Encrypted Cloud Data Secure Multi keyword Retrieval over Encrypted Cloud Data Ms. Pradnya H. Unde 1, Ms. Arti Mohanpurkar 2 1 Master of Engineering (Computer Engineering), Savitribai Phule Pune University Dr. D. Y. Patil SOET,

More information

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray To cite this version: Tarik

More information

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud

More information

An Efficient Retrieval of Encrypted Data In Cloud Computing

An Efficient Retrieval of Encrypted Data In Cloud Computing An Efficient Retrieval of Encrypted Data In Cloud Computing N.Nandhini 1 and P.G Kathiravan 2 II Year M.Tech. IT Student, V.S.B Engineering College, Karur, Tamil Nadu, India 1 Assistant Professor/IT, V.S.B

More information

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,

More information

AES and DES Using Secure and Dynamic Data Storage in Cloud

AES and DES Using Secure and Dynamic Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud Mrs. Rashi Saxena 1, N. Yogitha 2, G. Swetha Reddy 3, D. Rasika 4 1 Associate

More information

SEARCHABLE SYMMETRIC ENCRYPTION

SEARCHABLE SYMMETRIC ENCRYPTION SEARCHABLE SYMMETRIC ENCRYPTION Er. Hariom Rathore 1 Dr. Amit Sharma 2 1 M.Tech Scholar, 2 Associate Professor, Department of Computer Science & Engineering, Vedant College of Engineering & Technology,Bundi,Rajasthan,(India)

More information

[Raut*, 5(3): March, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

[Raut*, 5(3): March, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A SURVEY ON KEY-AGGREGATE SEARCHABLE ENCRYPTION FOR GROUP DATA SHARING IN CLOUD STORAGE Swapnil D. Raut*, Prof. Avinash P. Wadhe,

More information

Multi-Keyword Ranked Search in Encrypted Cloud Storage

Multi-Keyword Ranked Search in Encrypted Cloud Storage Multi-Keyword Ranked Search in Encrypted Cloud Storage Akshay Kasulkar, Sahil Kamble, Nikhil Shettiwar, Tejaswini Dongre Prof. Vijay Masne UG Student, Dept. of Computer Science & Engineering, DBACER College,

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

Exploration Encryption Mechanism Using Single Key for Public Cloud Storage

Exploration Encryption Mechanism Using Single Key for Public Cloud Storage International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/v3i05.07 Exploration Encryption Mechanism Using Single Key for Public Cloud

More information

Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud

Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Anusha K 1, Babitha M N 2 PG Student, Department of Computer Science & Engineering, SSIT, Tumakuru, Karnataka, India 1 Assistant Professor,

More information

Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing

Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing Wenhai Sun, Wenjing Lou, Y. Thomas Hou, and Hui Li Abstract Search over encrypted data is a technique of great interest in the cloud

More information

Secure Indexes. Eu-Jin Goh May 5, 2004

Secure Indexes. Eu-Jin Goh May 5, 2004 Secure Indexes Eu-Jin Goh eujin@cs.stanford.edu May 5, 2004 Abstract A secure index is a data structure that allows a querier with a trapdoor for a word x to test in O(1) time only if the index contains

More information

An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing

An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing Qin Liu, Guojun Wang, and Jie Wu School of Information Science and Engineering Central South University Changsha 410083, Hunan Province,

More information

A Procedural Based Encryption Technique for Accessing Data on Cloud

A Procedural Based Encryption Technique for Accessing Data on Cloud A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,

More information

Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13

Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@daiict.ac.in

More information

Towards Search on Encrypted Graph Data

Towards Search on Encrypted Graph Data Towards Search on Encrypted Graph Data A. Kasten 1, A. Scherp 2, F. Armknecht 3, and M. Krause 3 1 University of Koblenz-Landau, IT Risk Management, Germany {andreas.kasten}@uni-koblenz.de, 2 University

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing

Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing 2011 31st International Conference on Distributed Computing Systems Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing Ning Cao,ZhenyuYang, Cong Wang,KuiRen, and Wenjing Lou

More information

Privacy Preserving Multi Keyword Search in Cloud Computing

Privacy Preserving Multi Keyword Search in Cloud Computing ISSN: 2454-132X Impact factor: 4.295 (Volume 4, Issue 2) Available online at: www.ijariit.com Privacy Preserving Multi Keyword Search in Cloud Computing Mansour Alshaikhsaleh mansouralshaikh@oakland.edu

More information

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,

More information

Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing

Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing 1 Naveen Kumar.B 2 Mr.Praveen Babu.G 1 M.Tech Student, Software Engineering, School of Information Technology JNTUH, Village

More information

Tracing Insider Attacks in the Context of Predicate Encryption Schemes

Tracing Insider Attacks in the Context of Predicate Encryption Schemes Tracing Insider Attacks in the Context of Predicate Encryption Schemes Jonathan Katz and Dominique Schröder University of Maryland Email: {jkatz,schroder}@cs.umd.edu Abstract In a predicate encryption

More information

Auditing-as-a-Service for Cloud Storage

Auditing-as-a-Service for Cloud Storage Auditing-as-a-Service for Cloud Storage Alshaimaa Abo-alian, N. L. Badr, M. F. Tolba, Faculty of Information and Computer Sciences, Ain shams University, Cairo, Egypt shimo.fcis83@gmail.com, dr.nagwabadr@gmail.com,

More information

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Abstract: Distributed computing is area that permits clients to store the information. Distributed

More information

Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy

Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy Boyang Wang,, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Fenghua Li Department of Computer Science, Utah State University,

More information

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing wwwijcsiorg 10 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing Yinghui Zhang 12 1 National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications

More information

GEOMETRIC RANGE SEARCH ON ENCRYPTED SPATIAL DATA

GEOMETRIC RANGE SEARCH ON ENCRYPTED SPATIAL DATA Special Issue of International Journal of Advances in Applied Science and Engineering (IJAEAS) ISSN (P): 2348-1811; ISSN (E): 2348-182X Vol. 4, Issue 1,2, March 2017, 40-45 IIST GEOMETRIC RANGE SEARCH

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

Encrypted databases. Tom Ristenpart CS 6431

Encrypted databases. Tom Ristenpart CS 6431 Encrypted databases Tom Ristenpart CS 6431 Outsourced storage settings Client wants to store data up on Dropbox High availability, synch across devices Server includes much value-add functionality Keyword

More information

Dual-Server Public-key Encryption with Keyword Search for Secure Cloud Storage

Dual-Server Public-key Encryption with Keyword Search for Secure Cloud Storage Dual-Server Public-key Encryption with Keyword Search for Secure Cloud Storage A.VIJAYA DURGA 1, N. KOTESWARAMMA 2, B. LAKSHMI PRAVEENA 3 1,2 Dept. of MCA, VVIT, Guntur, AP 3 Dept. of IT, VVIT, Guntur,

More information

A Scalable Multi Keyword Search and Relevance Oriented Ranking for Searchable Network Encrypted data in Cloud Storage Systems

A Scalable Multi Keyword Search and Relevance Oriented Ranking for Searchable Network Encrypted data in Cloud Storage Systems A Scalable Multi Keyword Search and Relevance Oriented Ranking for Searchable Network Encrypted data in Cloud Storage Systems Srinivasulu Chinna 1, A. Santosh Kumar 2, D. Priyanka 3, B. Sunil Kumar 4 Pursing

More information

Facilitating Shielded and Adept Ranked Keyword Search over Outsourced Obscure Information

Facilitating Shielded and Adept Ranked Keyword Search over Outsourced Obscure Information Facilitating Shielded and Adept Ranked Keyword Search over Outsourced Obscure Information Karthika.RN PG Student, Veltech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai Abstract:

More information

Distributed ID-based Signature Using Tamper-Resistant Module

Distributed ID-based Signature Using Tamper-Resistant Module , pp.13-18 http://dx.doi.org/10.14257/astl.2013.29.03 Distributed ID-based Signature Using Tamper-Resistant Module Shinsaku Kiyomoto, Tsukasa Ishiguro, and Yutaka Miyake KDDI R & D Laboratories Inc., 2-1-15,

More information

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption

More information

SEARCHABLE SYMMETRIC ENCRYPTION: REVIEW AND EVALUATION

SEARCHABLE SYMMETRIC ENCRYPTION: REVIEW AND EVALUATION SEARCHABLE SYMMETRIC ENCRYPTION: REVIEW AND EVALUATION 1 YAP JOE EARN, 2 RAED ALSAQOUR, 3 MAHA ABDELHAQ, 4 TARIQ ABDULLAH 1,2,3 Department of Computer Science, Faculty of Information Science and Technology,

More information

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN. Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS

More information

User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe

User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe T.Radhika 1, S.Vasumathi Kannagi 2 P.G.Scholar, Department of CSE, Info Institute of Engineering, Coimbatore, India 1 Assistant

More information

Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations

Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov Cornell-Tech Moni Naor Gil Segev Ido Shahaf (Hebrew University) Weizmann Hebrew

More information

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN

More information

Efficient Data Retrieval in Cloud Using Combined Searchable Homomorphic Encryption Mechanism

Efficient Data Retrieval in Cloud Using Combined Searchable Homomorphic Encryption Mechanism I J C T A, 9(2) 2016, pp. 445-453 International Science Press Efficient Data Retrieval in Cloud Using Combined Searchable Homomorphic Encryption Mechanism Madhumitha T. 1 and R. Anitha 2 ABSTRACT Cloud

More information

Information Retrieval of Mass Encrypted Data over Multimedia Networking with N-Level Vector Model-Based Relevancy Ranking

Information Retrieval of Mass Encrypted Data over Multimedia Networking with N-Level Vector Model-Based Relevancy Ranking Information Retrieval of Mass Encrypted Data over Multimedia Networking with N-Level Vector Model-Based Relevancy Ranking Jinghui Peng, Shanyu Tang *, Senior Member, IEEE, Liping Zhang, Ran Liu Abstract

More information

Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption

Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption Dan Boneh, Ananth Raghunathan, and Gil Segev Computer Science Department Stanford University, Stanford, CA 94305.

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations

Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov Moni Naor Gil Segev Ido Shahaf IBM Research Weizmann Hebrew University Hebrew University

More information

Privacy Preserving (Outsourced) Data Share and Search

Privacy Preserving (Outsourced) Data Share and Search Privacy Preserving (Outsourced) Data Share and Search Surrey Centre for Cyber Security, Department of Computer Science, University of Surrey. December 13, 2017 Outline Introduction 1 Introduction 2 3 4

More information

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid

More information

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store

Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Randal Burns randal@cs.jhu.edu www.cs.jhu.edu/~randal/ Department of Computer Science, Johns Hopkins Univers

More information

Provable Dynamic Data Possession by Datalog Rules

Provable Dynamic Data Possession by Datalog Rules 958 JOURNAL OF SOFTWARE, VOL. 9, NO. 4, APRIL 2014 Provable Dynamic Data Possession by Datalog Rules Jing Lu School of Optical Electrical and Computing Engineering University of Shanghai for Science and

More information