PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

Similar documents
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

ISSN Vol.04,Issue.05, May-2016, Pages:

Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies

ABSTRACT I. INTRODUCTION

AES and DES Using Secure and Dynamic Data Storage in Cloud

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

LOAD BALANCING AND DEDUPLICATION

Group User Revocation in Cloud for Shared Data

A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach

ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM

SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai

ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL

Data Store and Multi-Keyword Search on Encrypted Cloud Data

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

Attribute Based Encryption with Privacy Protection in Clouds

Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing

ADVANCES in NATURAL and APPLIED SCIENCES

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE

SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

International Journal of Advance Research in Engineering, Science & Technology

A Procedural Based Encryption Technique for Accessing Data on Cloud

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Secure Conjunctive Keyword Ranked Search over Encrypted Cloud Data

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

Self Destruction Of Data On Cloud Computing

System Approach for Single Keyword Search for Encrypted data files Guarantees in Public Infrastructure Clouds

FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage

A Survey on Secure Sharing In Cloud Computing

A Two-Fold Authentication Mechanism for Network Security

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

Available online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)

International Journal of Advance Engineering and Research Development

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

Clustering and Association using K-Mean over Well-Formed Protected Relational Data

DATA SECURITY IN CLOUDS USING DECENTRALIZED ACCESS CONTROL, ANONYMOUS AUTHENTICATION AND RSA BASED ENCRYPTION

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Privacy Protection on Data Self- Destruction System for Cloud Storage Networks

International Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing

Enhanced Novel Multilevel Secure User Authentication Scheme in Cloud.

ISSN Vol.08,Issue.16, October-2016, Pages:

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing

Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices

Creating Web Server in Android Mobile and Easy Serving of Information to Clients

A Survey on Cryptography Based QR code authentication

S. Indirakumari, A. Thilagavathy

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]

ISSN: [Revathy* et al., 6(3): March, 2017] Impact Factor: 4.116

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An

Concealing Information in Images using Progressive Recovery

Secure Data Storage in Clouds by Using Decentralized Access Control Scheme

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Cryptanalysis of a Markov Chain Based User Authentication Scheme

Distributed Bottom up Approach for Data Anonymization using MapReduce framework on Cloud

ANALYSIS OF AES ENCRYPTION WITH ECC

International Journal of Advance Engineering and Research Development. Carefree Data Access Solution for Public Cloud Storage

A Survey on Phrase Search over Encrypted Cloud Storage with Multiple Data Owners

An Efficient And Secure Data Sharing By Preventing Collusion Attack In Cloud

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,

A Methodology for Assigning Access Control to Public Clouds

ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2,

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES

CO-RELATION TECHNIQUE FOR SEARCHING OF ENCRYPTED DATA OVER CLOUD 1

ISSN: (Online) Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Privacy Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

Various Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi 2 M. Navinkumar 3

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Kusum Lata, Sugandha Sharma

Secure Parallel Processing on Encryption Cloud Data Using Fully Homomorphic Encryption

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

How to Use Google Cloud Print

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage

Efficient Data Retrieval in Cloud Using Combined Searchable Homomorphic Encryption Mechanism

Introduction. Security Edition User Guide

VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH THE EFFICIENT MULTIPLICATIVE INVERSE UNIT

Content-Based Image Retrieval in Cloud Using Watermark Protocol and Searchable Encryption

International Journal of Advance Engineering and Research Development

A Secure and Dynamic Multi Keyword Ranked Search Scheme over encrypted

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME

IMPLEMENTATION OF KERBEROS BASED AUTHENTICATED KEY EXCHANGE PROTOCOL FOR PARALLEL NETWORK FILE SYSTEMS IN CLOUD

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud

AUTHENTICATED SMART CARD APPLICATION USING MULTI CROSS CLOUD TECHNOLOGY

Securing Cloud Data Under Key Exposure

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

An Application of Graph Theory in Cryptography

Transcription:

Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS Rajan Kumar 1, Anurag Roy 2 and R. Yamini 3 1,2 Final Year, Computer Science and Engineering, SRM University, Kattankulathur, Chennai, IN. 3 Assistant Professor (O.G), Department of Computer Science and Engineering, SRM University, Kattankulathur, Chennai, IN. Abstract: In this modern age, cloud computing is more popular. Cloud computing gives many opportunity to the user. Through this opportunity user can upload their data and download that data from the cloud. It also gives the function so that user can run many websites by pay-peruse service. Most cloud server do not serve single user, it give service to multiple user at the same time. This project consist of functions in which user can search multiple file and send the file to multiple user at the same time. It has ranking search technique in which most frequent searches are shown. A dynamic secret key is generated which prevent others for stealing data. Keywords: Cloud computing, Ranking Search, Multiple Data Owners, Dynamic Secret Key. 1. Introduction Cloud computing becomes popular and has important role in our lives. Cloud computing gives many benefits such as data storage, running websites into the cloud. Users can upload many documents like financial details, government details etc. All these information can be access by the user. To protect the data privacy in cloud, the data has to be encrypted first by the user before uploading on the cloud and after that the data is decrypted by the key and download data on the local system. In this project, when the user wants to search a particular file then the cloud server can perform search without knowing the exact keyword. This searching technique gives rank-wise result to the user. This ranking technique is based on the frequently search the file name by the user. It also contain the encryption and decryption technology. Encryption is done at the time of uploading the data to cloud. Advance Encryption Standards methodology is used to file encryption. Decryption is done at the time of downloading the data from cloud. Data Encryption Standards methodology is used to file decryption. User have the key to decrypt data by using decryption key. It also have sharing function. When the user wants to share the file to others then a key is generated. This key is generated to protect the system from attackers. By using this key, user can download data from cloud. Existing System 2. Literature Survey In the Existing System, the data owner share file to a single user and the user who is authorized can download the shared files by giving the decryption key. This system was not secured and takes more time to share files to user. The Existing System does not have any searching technique of the data files in cloud. Disadvantages 1. It does not have searching process. 2. It does not have multiple sharing technique. 3. It takes more time to share the files. 4. The cost is high. 5. It is less scalable. 6. It is less efficient. Proposed System In this paper, we proposes scheme which enables users for searching files by giving the keyword. This project consist of protocols in which users uses different keys to encrypt and decrypt files. This paper consist of secure search protocol in which user can search files by giving the short or full data files names. To prevent the attackers from eavesdropping, a dynamic secret key is generating. Advantages 1. Itallow searches over encrypted files. 2. Decryption key should be send via a secure channel like Gmail. 3. Data files are encrypted on the cloud server. 3. Problem Formulation 585

Problem Defination This projectis used to search multiple keywords and share files to multiple users. This project consist of searchable technique which gives the facility to search over cloud. file, he/she requests the decryption key. Then the decryption key is sent to their registered mail account. By using that decryption key, the contents of the data file gets decrypted and the users can download the data file.if any attackers can access the cloud server then he/she cannot get the contents of the actual data files. The cloud server is only responsible for storage of data files. Architectural Model The proposed system contain data users, the cloud server and the administration server. When the users have right to access in the server from their local system, they select the file which have to upload on the cloud. This selected files is saved on the location where all the users files are saved (Because there is not only single user, there are multiple user which cannot interact directly). Now from that location, the user uploads the data file on the cloud. Security Goals Figure 2. Architecture model In this paper, we proposes scheme in which function design satisfy security goals. Figure 1. Architecture of privacy preserving keywordsearch in a multi-owner and multi-user cloud model Multi keyword Search over Multiple data owner:this paper allow multiple search over encrypted data files. This allows the server to ranked the searched result among different users and return the most frequentresults. When the data is uploaded, if the user wants to share that uploaded files, he/she can share with the registered users along with the private key. When the data files are uploaded on the cloud, the server can t know the contents of data files because the data files are encrypted. When the shared users wants to access the 586

II. Uploading and Downloading In this module, Files are uploaded to the server after file is encrypted by the encryption method. This encryption is done by AES (Advanced Encryption Standard) Algorithm and generate key. This Encrypted Data is in the form of Binary and stored in Cloud. User needs decryption key to download the data files. III. File Sharing In this module, the uploaded files are shared to the multiple users. In this system, the Private Key of the Data which is shared will be send via a secure channel called Gmail. This decryption key is used by the user at the time of download the files. IV. Key Generation Figure 3. Example of Ranking Search Result User scalability: This paper allow new data users to register and login to this system without disturbing other users. User revocation: This paper allow that only registered data users can perform right search. Security Process: This paper prevent attacker from eavesdropping. When the files is shared which is in the encrypted form, another users wants the keywords to decrypt the data files. Multi-Keyword Search In this paper, user can search multiple file names. This proposed system also search the fuzzy keyword which means if the data file name is abcd.txt and the user search ab then it shows all the data files that contain the letter ab simultaneously. In this module, when the user wants to access the data files then the server send the decryption key. Through this decryption key, the user who wants to access the data file, uses this decryption key to decrypt the files with the help of private key sent at the time of file sharing. 4. Admin Module In this module, admin can view the details of all the registered users. Admin can see the status of the shared files among multiple users. 5. Algorithm & Protocol Used There are two types of algorithm used in this project. 1. Encryption: This is used to encrypt the data files. This convert the plain text into the cipher text. This uses the AES (Advanced Encryption Standard) algorithm. IV. SYSTEM MODULE I. Authentication and Authorization In this module, the data user register with their userid, Password, email-id, mobile number and gender then user can access the database. After registration completed, user access the database by giving the user-id and their password. 2. Decryption: This is used to decrypt the data files. This convert the cipher text into the plain text. This uses the ADS (Advanced Decryption Standard) algorithm. 3. SMTP: Simple Mail Transfer Protocol is used to send mail to the users. 587

1. Keywords 6. Security Analysis In this proposed system, keywords are known only for the registered user. If the unknown users gives the keyword for searching the data files, it does not search and shows that the data file is not found. 2. Encryption And Decryption Key In this proposed system, when the user shares a particular data file, the private key is sent to all the shared users. When a user wants to decrypt the data file then he/she request the decryption key. Then the server sends the decryption key to the authenticated user to their registered mail Id. By using this decryption key, the user decrypts the data files and then he/she can download the file. [4] T. Jung, X. Y. Li, Z. Wan, and M. Wan, Privacy preserving cloud data access with multi-authorities, in Proc. IEEE INFOCOM 13, Turin, Italy, Apr. 2013, pp. 2625 2633. [5] R.Kandhan, R.Ananthan, P.Tamilselvan, Mr.D.Sathyamurthy, An Efficient Privacy- Preserving Search System Over Encrypted Cloud Data, in International Innovative Research Journal of Engineering and Technology. 7. Conclusion And Future Work In this paper, we solve the problem of secure multi keyword search for multiple data owners in the cloud computing. We introduced a secret key generation protocol and a new data user authentication protocol which is used to protect the system from attackers and authenticate only the registered users. In our future work, we work on the safe fuzzy keyword search in multiple data users and we are planning to implement on the commercial cloud. References [1] Wei Zhang, Student Member, IEEE, Yaping Lin, Member, IEEE, Sheng Xiao, Member, IEEE,Jie Wu, Fellow, IEEE, and Siwang Zhou, Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing. [2] W. Zhang, S. Xiao, Y. Lin, T. Zhou, and S. Zhou, Secure ranked multi-keyword search for multiple data owners in cloud computing, in Proc. 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN2014). Atlanta, USA: IEEE, jun 2014, pp. 276 286. [3] C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, Privacy preserving public auditing for secure cloud storage, Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362 375, 2013. 588

589

590