SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
p-ISSN: 2395-0072Volume: 04 Issue: 03 | Mar -2017 www.irjet.net
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2133
Efficient Similarity Search over Encrypted Data
Mohit Kulkarni1, Nikhil Kumar2, Santosh Vaidande3, B.S.Satpute4
1Mohit Kulkarni: Student, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra,
India.
2Nikhil Kumar: Student, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra,
India.
3Santosh Vaidande: Student, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra,
India.
4B.S. Satpute: Professor, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – In the present time, due to attractive
features of cloud computing, the massive amount of data
has been stored in the cloud. Though cloud-based
services offer many benefits but privacy and security of
the sensitive data is a big issue. These issues are resolved
by storing sensitive data in encrypted form. Encrypted
storage protects the data against unauthorized access,
but it weakens some basic and important functionality
like search operation on the data, i.e. searching the
required data by the user on the encrypted data requires
data to be decrypted first and then search, so this
eventually, slows down the process of searching. To
achieve this many encryption schemes have been
proposed, however, all of the schemes handle exact
Query matching but not Similarity matching. While user
uploads the file, features are extracted from each
document. When the user fires a query, trapdoor of that
query is generated and search is performed by finding
the correlation among documents stored on cloud and
query keyword, using Locality Sensitive Hashing.
Key Words - Locality sensitive hashing, Encrypted
data, Similarity search, Cloud computing, Data privacy
and Query matching.
1. INTRODUCTION
In present data comprehensive environment, cloud
computing is common because it removes the burden
of enormous data management in a cost effective way.
The sensitive data send to untrusted cloud servers will
lead to privacy issues. To lessen the worries, sensitive
data must be deployed in the encrypted form which
avoids illegal access. Though encryption provides
protection, it complicates the fundamental search
operation. There are many algorithms which support
the operation which is called Searchable Encryption
Scheme.
Conventionally, almost all schemes are designed for
exact query matching. Query matching is the process of
finding the user’s desired data from the cloud
according to the stated feature. But actually, it is more
logical to perform retrieval according to the similarity
with the stated feature instead of the existence of it.
Similarity search is a problem that optimizes and finds
the point in a given set that is closest to a given point.
It is predefined that efficient methods are required to
do similarity search over the huge amount of encrypted
data. The basic algorithm of our project is the
approximate near neighbor search algorithm called
Locality Sensitive Hashing (LSH). LSH is broadly used
for fast similarity search on data in information
retrieval. Our project has two parts: User ‘Uploading
the data’ and ‘Searching the query’.
Fig 1: Complete Process
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
p-ISSN: 2395-0072Volume: 04 Issue: 03 | Mar -2017 www.irjet.net
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2134
Firstly, the user uploads the data. Then file features are
extracted by preprocessing it. Stop words removal and
Stemming id is the next process. The words are split at
the certain character to form buckets and continue till
the total length of the word after which they are stored
in a file. After that Encryption of both Plaintext and the
Indexed file is done and stored in the cloud.
The second part is sending the file from cloud storage
to the receiver. For this, the receiver will send a
request for a list of files. When the user fires a query,
the trapdoor is constructed i.e. - it is preprocessed and
the bucket of that query is formed. Trapdoor helps to
search on encrypted data. Cloud performs a search by
using LSH. Document having max similarity to the
query will be returned to the user. Then the user can
choose the file he wants to download.
Eventually, this proposed system will reduce the time
required to get desired data by directly searching over
encrypted data.
2. LITERATURE SURVEY
Cong Wang et al. [1] introduces secured rank keyword
search for data stored in the cloud. Firstly, they ranked
the keywords using effective ranking schemas while
maintaining security over the cloud and efficiency of
data searched. The ranking is done based on index
construction and uses ranking function to give a score
to keywords. The major issue in this is computational
overhead for ranking keywords.
Cheng and Mitzenmacher [2] offer to search on
encrypted data stored remotely using keywords that
preserve the privacy of data. Here they describe
retrieving the encrypted data using the keyword index
(i.e. dictionary) which is created by the user itself. The
dictionary is present on the remote server including
the file, using which the user can retrieve the encrypted
data while maintaining privacy. It requires extra
storage to store keyword index.
Jan Li et al. [3] developed schemes to retrieve the
encrypted data on the cloud using fuzzy keyword
search while preserving the privacy and efficiency.
They have developed two schemes (wildcard-based
technique and gram-based technique) to construct
fuzzy keyword set which produces matching files or
closed matching files. The owner stores fuzzy
keywords set along with the file which is converted
into index form. The efficiency of proposed system can
still be further improved for attaining better possible
results.
Qin Lv et al. [4] elaborates on multi-probe LHS schema
for indexing which helps in efficient similarity
matching for searched query and produces best
possible results. It uses KNN-algorithm for matching
files from multiple buckets for a given input query by
the user. Thus it requires few hash tables due to
probing multiple buckets and saves storage space
required to store a large number of hash tables. They
even compared entropy based LSH and multi-probe
LSH showing the advantages of multi-probe LSH over
entropy based LSH.
Dan Boneh and Brent Waters [5] offers the public-key
system that supports comparison queries on encrypted
data as well as more general queries such as subset
queries. These systems support conjunctive queries
which are arbitrary in nature without leaking
information on individual conjuncts. In addition, a
general framework for constructing and analyzing
public-key systems supporting queries on encrypted
data. In public key systems, a secret key can produce
tokens for testing any supported query predicate. The
token lets anyone test the predicate on a given cipher
text without learning any other information about the
plaintext. It represents the general framework to
analyze the security of searching on encrypted data
systems.
Mehmet Kuzu [6] proposes an approach which uses
Locality Sensitive Hashing (LSH) which is the nearest
neighbor algorithm for the index creation. Similar
features are put into the same bucket with a high
probability due to the property of LSH while the
features which are not similar are kept in the different
buckets. If the data set is small, then the
communication cost and search time required by this
scheme is better. But if the database size increases,
then the time required for communication and for
searching also increases rapidly. They use bloom filter
for translation of strings. But the disadvantage of this
structure is that it is a probabilistic data structure.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
p-ISSN: 2395-0072Volume: 04 Issue: 03 | Mar -2017 www.irjet.net
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2135
3. CONCLUSION
Thus we can conclude that to get an efficient similarity
searchable encryption scheme we need to use locality
sensitive hashing for fast similarity search in high-
dimensional spaces for plain data. In such a context, it
is also very critical not to sacrifice the confidentiality of
the sensitive data while providing functionality. Use
LSH based secure index and a search scheme to enable
fast similarity search in the context of encrypted data.
Finally, show the performance of the proposed scheme
with empirical analysis on a real data.
REFERENCES
[1] Cong Wang, Ning Cao, Jin Li, Kui Ren and Wenjing
Lou, “Secure Ranked Keyword Search over Encrypted
Cloud Data”, IEEE 30th International Conference on
Distributed Computing Systems, 2010, pp. 253-262,
doi:10.1109/ICDCS.2010.34.
[2] Yan-Cheng Chang and Michael Mitzenmacher,
“Privacy Preserving Keyword Searches on Remote
Encrypted Data”, in Proc. of ACNS’05, 2005, pp. 442-
455, Springer Berlin Heidelberg.
[3] Jan Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou,
“Enabling Efficient Fuzzy Keyword Search over
Encrypted Data in Cloud Computing”, Proc. of IEEE
INFOCOM’10 Mini-Conference, March 2010, pp. 1-5,
IEEE.
[4] Qin Lv, William Josephson, Zhe Wang, Moses
Charikar, Kai Li, “Multi-Probe LSH: Efficient Indexing
for High Dimensional Similarity Search”, in Proceedings
of the 33rd international conference on very large
databases, September 2007, pp. 950-961, VLDB
Endowment.
[5] Dan Boneh and Brent Waters, “Conjunctive, Subset
and Range Queries on Encrypted Data”, in Theory of
Cryptography Conference, February 2007, pp. 535-554,
Springer Berlin Heidelberg.
[6] Kuzu Mehmet, Mohammad Saiful Islam, Murat
Kantarcioglu, “Efficient Similarity Search Over
Encrypted Data”, in Data Engineering (ICDE), 2012
IEEE28th International Conference, IEEE, 2012.

Weitere ähnliche Inhalte

Was ist angesagt?

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883
Editor IJARCET
 

Was ist angesagt? (18)

Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
 
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keywordEnabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
 
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET-  	  Privacy Preserving Keyword Search over Cloud DataIRJET-  	  Privacy Preserving Keyword Search over Cloud Data
IRJET- Privacy Preserving Keyword Search over Cloud Data
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
 
Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883
 
IRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud Data
 

Ähnlich wie Efficient Similarity Search Over Encrypted Data

2016 BE Final year Projects in chennai - 1 Crore Projects
2016 BE Final year Projects in chennai - 1 Crore Projects 2016 BE Final year Projects in chennai - 1 Crore Projects
2016 BE Final year Projects in chennai - 1 Crore Projects
1crore projects
 

Ähnlich wie Efficient Similarity Search Over Encrypted Data (20)

J017547478
J017547478J017547478
J017547478
 
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
 
Sub1522
Sub1522Sub1522
Sub1522
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
IRJET- Data Mining - Secure Keyword Manager
IRJET- Data Mining - Secure Keyword ManagerIRJET- Data Mining - Secure Keyword Manager
IRJET- Data Mining - Secure Keyword Manager
 
An efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword searchAn efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword search
 
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
 
2016 BE Final year Projects in chennai - 1 Crore Projects
2016 BE Final year Projects in chennai - 1 Crore Projects 2016 BE Final year Projects in chennai - 1 Crore Projects
2016 BE Final year Projects in chennai - 1 Crore Projects
 
O01761103112
O01761103112O01761103112
O01761103112
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
 
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Kürzlich hochgeladen (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 

Efficient Similarity Search Over Encrypted Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 p-ISSN: 2395-0072Volume: 04 Issue: 03 | Mar -2017 www.irjet.net © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2133 Efficient Similarity Search over Encrypted Data Mohit Kulkarni1, Nikhil Kumar2, Santosh Vaidande3, B.S.Satpute4 1Mohit Kulkarni: Student, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India. 2Nikhil Kumar: Student, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India. 3Santosh Vaidande: Student, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India. 4B.S. Satpute: Professor, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – In the present time, due to attractive features of cloud computing, the massive amount of data has been stored in the cloud. Though cloud-based services offer many benefits but privacy and security of the sensitive data is a big issue. These issues are resolved by storing sensitive data in encrypted form. Encrypted storage protects the data against unauthorized access, but it weakens some basic and important functionality like search operation on the data, i.e. searching the required data by the user on the encrypted data requires data to be decrypted first and then search, so this eventually, slows down the process of searching. To achieve this many encryption schemes have been proposed, however, all of the schemes handle exact Query matching but not Similarity matching. While user uploads the file, features are extracted from each document. When the user fires a query, trapdoor of that query is generated and search is performed by finding the correlation among documents stored on cloud and query keyword, using Locality Sensitive Hashing. Key Words - Locality sensitive hashing, Encrypted data, Similarity search, Cloud computing, Data privacy and Query matching. 1. INTRODUCTION In present data comprehensive environment, cloud computing is common because it removes the burden of enormous data management in a cost effective way. The sensitive data send to untrusted cloud servers will lead to privacy issues. To lessen the worries, sensitive data must be deployed in the encrypted form which avoids illegal access. Though encryption provides protection, it complicates the fundamental search operation. There are many algorithms which support the operation which is called Searchable Encryption Scheme. Conventionally, almost all schemes are designed for exact query matching. Query matching is the process of finding the user’s desired data from the cloud according to the stated feature. But actually, it is more logical to perform retrieval according to the similarity with the stated feature instead of the existence of it. Similarity search is a problem that optimizes and finds the point in a given set that is closest to a given point. It is predefined that efficient methods are required to do similarity search over the huge amount of encrypted data. The basic algorithm of our project is the approximate near neighbor search algorithm called Locality Sensitive Hashing (LSH). LSH is broadly used for fast similarity search on data in information retrieval. Our project has two parts: User ‘Uploading the data’ and ‘Searching the query’. Fig 1: Complete Process
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 p-ISSN: 2395-0072Volume: 04 Issue: 03 | Mar -2017 www.irjet.net © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2134 Firstly, the user uploads the data. Then file features are extracted by preprocessing it. Stop words removal and Stemming id is the next process. The words are split at the certain character to form buckets and continue till the total length of the word after which they are stored in a file. After that Encryption of both Plaintext and the Indexed file is done and stored in the cloud. The second part is sending the file from cloud storage to the receiver. For this, the receiver will send a request for a list of files. When the user fires a query, the trapdoor is constructed i.e. - it is preprocessed and the bucket of that query is formed. Trapdoor helps to search on encrypted data. Cloud performs a search by using LSH. Document having max similarity to the query will be returned to the user. Then the user can choose the file he wants to download. Eventually, this proposed system will reduce the time required to get desired data by directly searching over encrypted data. 2. LITERATURE SURVEY Cong Wang et al. [1] introduces secured rank keyword search for data stored in the cloud. Firstly, they ranked the keywords using effective ranking schemas while maintaining security over the cloud and efficiency of data searched. The ranking is done based on index construction and uses ranking function to give a score to keywords. The major issue in this is computational overhead for ranking keywords. Cheng and Mitzenmacher [2] offer to search on encrypted data stored remotely using keywords that preserve the privacy of data. Here they describe retrieving the encrypted data using the keyword index (i.e. dictionary) which is created by the user itself. The dictionary is present on the remote server including the file, using which the user can retrieve the encrypted data while maintaining privacy. It requires extra storage to store keyword index. Jan Li et al. [3] developed schemes to retrieve the encrypted data on the cloud using fuzzy keyword search while preserving the privacy and efficiency. They have developed two schemes (wildcard-based technique and gram-based technique) to construct fuzzy keyword set which produces matching files or closed matching files. The owner stores fuzzy keywords set along with the file which is converted into index form. The efficiency of proposed system can still be further improved for attaining better possible results. Qin Lv et al. [4] elaborates on multi-probe LHS schema for indexing which helps in efficient similarity matching for searched query and produces best possible results. It uses KNN-algorithm for matching files from multiple buckets for a given input query by the user. Thus it requires few hash tables due to probing multiple buckets and saves storage space required to store a large number of hash tables. They even compared entropy based LSH and multi-probe LSH showing the advantages of multi-probe LSH over entropy based LSH. Dan Boneh and Brent Waters [5] offers the public-key system that supports comparison queries on encrypted data as well as more general queries such as subset queries. These systems support conjunctive queries which are arbitrary in nature without leaking information on individual conjuncts. In addition, a general framework for constructing and analyzing public-key systems supporting queries on encrypted data. In public key systems, a secret key can produce tokens for testing any supported query predicate. The token lets anyone test the predicate on a given cipher text without learning any other information about the plaintext. It represents the general framework to analyze the security of searching on encrypted data systems. Mehmet Kuzu [6] proposes an approach which uses Locality Sensitive Hashing (LSH) which is the nearest neighbor algorithm for the index creation. Similar features are put into the same bucket with a high probability due to the property of LSH while the features which are not similar are kept in the different buckets. If the data set is small, then the communication cost and search time required by this scheme is better. But if the database size increases, then the time required for communication and for searching also increases rapidly. They use bloom filter for translation of strings. But the disadvantage of this structure is that it is a probabilistic data structure.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 p-ISSN: 2395-0072Volume: 04 Issue: 03 | Mar -2017 www.irjet.net © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2135 3. CONCLUSION Thus we can conclude that to get an efficient similarity searchable encryption scheme we need to use locality sensitive hashing for fast similarity search in high- dimensional spaces for plain data. In such a context, it is also very critical not to sacrifice the confidentiality of the sensitive data while providing functionality. Use LSH based secure index and a search scheme to enable fast similarity search in the context of encrypted data. Finally, show the performance of the proposed scheme with empirical analysis on a real data. REFERENCES [1] Cong Wang, Ning Cao, Jin Li, Kui Ren and Wenjing Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data”, IEEE 30th International Conference on Distributed Computing Systems, 2010, pp. 253-262, doi:10.1109/ICDCS.2010.34. [2] Yan-Cheng Chang and Michael Mitzenmacher, “Privacy Preserving Keyword Searches on Remote Encrypted Data”, in Proc. of ACNS’05, 2005, pp. 442- 455, Springer Berlin Heidelberg. [3] Jan Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, “Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing”, Proc. of IEEE INFOCOM’10 Mini-Conference, March 2010, pp. 1-5, IEEE. [4] Qin Lv, William Josephson, Zhe Wang, Moses Charikar, Kai Li, “Multi-Probe LSH: Efficient Indexing for High Dimensional Similarity Search”, in Proceedings of the 33rd international conference on very large databases, September 2007, pp. 950-961, VLDB Endowment. [5] Dan Boneh and Brent Waters, “Conjunctive, Subset and Range Queries on Encrypted Data”, in Theory of Cryptography Conference, February 2007, pp. 535-554, Springer Berlin Heidelberg. [6] Kuzu Mehmet, Mohammad Saiful Islam, Murat Kantarcioglu, “Efficient Similarity Search Over Encrypted Data”, in Data Engineering (ICDE), 2012 IEEE28th International Conference, IEEE, 2012.