Efficient Similarity Search over Encrypted Data

IRJET Journal
IRJET JournalFast Track Publications

https://www.irjet.net/archives/V4/i6/IRJET-V4I6356.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1864
Efficient Similarity Search over Encrypted Data
Mohit Kulkarni1, Nikhil Kumar2, Santosh Vaidande3, B.S.Satpute4
1,2,3 Student, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India.
4Professor, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – In this present time, due to engaging components
of appropriated processing, the colossal measure of data has
been secured in the cloud. In spite of the way that cloud-based
organizations offer many favorable circumstances yet
assurance and security of the delicate data is a noteworthy
issue. These issues are settled by securing sensitive datafitasa
fiddle. Encoded limit secures the data against unapproved get
to, yet it cripples some basic and basic handiness like interest
operation on the data, i.e. looking the required data by the
customer on the mixed data obliges data to be unscrambled
first and a short time later look for, so this at last, backs offthe
route toward looking for. To achieve this various encryption
arranges have been proposed, regardless, most of the
arrangements handle amend Query organizing however not
Similarity planning. While customer exchanges the record,
components are expelled from each report. Right when the
customer fires a request, trapdoor of that question is created
and interest is performed by finding the relationship among
files set away on cloud and request watchword, using Locality
Sensitive Hashing.
Key Words - Locality sensitive hashing, Encrypted data,
Similarity search, Cloud computing, AES Encryption,
Trapdoor Construction
1. INTRODUCTION
In present information far reaching condition, cloud
computing is normal since it expels the weight of gigantic
information administration in a savvy way. The touchy
information send to non-trusted cloud servers will prompt
protection issues. To reduce the stresses, delicate
information must be sent in the encoded shape which
maintains a strategic distance from unlawful get to. There
are numerous calculations which bolster the operation
which is called Searchable Encryption Scheme.
Ordinarily, all plans are intended for correct question
coordinating. Inquiry coordinatingisthewaytowardfinding
the client's coveted information from the cloud as indicated
by the expressed element. In any case, it is more sensible to
perform recovery as per the closeness with the expressed
element rather than the presence of it. Comparabilityhuntis
an issue that upgrades and finds the point in a given set that
is nearest to a given point. It is predefined that efficient
techniques are required to do closeness seek over the
gigantic measure of encoded information. The fundamental
calculation of our venture is the rough close neighbor seeks
calculation called Locality Sensitive Hashing (LSH). LSH is
comprehensively utilized for quick likeness look on
information in data recovery. Our venture has two sections:
User 'Transferring the information' and 'Seeking the
question'.
Fig 1: Complete Process
Right off the bat, the client transfers the information. At that
point record components are extricated by preprocessingit.
Stop words expulsion and Stemming id is the following
procedure. The words are part at the specific character to
shape pails and proceed till the aggregate length of theword
after which they are put away in a document. After that
Encryption of both Plaintext and the Indexed document is
done and put away in the cloud.
2. LITERATURE SURVEY
Cong Wang et al. [1] presents secured rank watch word scan
for information put away in the cloud. Right off the bat, they
positioned the watch words utilizing compellingpositioning
compositions while keeping up security over the cloud and
effectiveness of information looked. The positioning is done
in view of file development and utilizations positioning
capacity to give a score to watchwords. The significant issue
in this is computational overhead to rank catchphrases.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1865
Cheng and Mitzenmacher [2] offer to seek on encoded
information put away remotely utilizing catchphrases that
protect the security of information. Here they portray
recovering scrambled information utilizing the watchword
record (i.e. lexicon) which is made by the client itself. The
word reference is available on the remote server including
the record, utilizing which the client can recover the
scrambled information while looking after security. It
requires additional capacity to store watchword record.
Jan Li et al. [3] created plans to recover the scrambled
information on the cloud utilizing fluffy catchphrase look
while protecting the security and productivity. They have
created two plans (trump card based method and gram-
based strategy) to develop fluffy catchphrase set which
produces coordinating records or shut coordinating
documents. The proprietor stores fluffy catchphrases set
alongside the record which is changed over into file frame.
The proficiency of proposed framework can even now be
additionally enhanced for achieving better conceivable
outcomes.
Qin Lv [4] expounds on multi test LHS composition for
ordering which helps effective closeness coordinating for
looked inquiry and delivers most ideal outcomes. It utilizes
KNN-calculation for coordinating records from numerous
pails for a given information question by the client. In this
way it requires few hash tables because of examining
different basins and spares storage room required to store
countless tables. They even lookedatentropybasedLSHand
multi-test LSH demonstrating the upsides of multi-test LSH
over entropy based LSH.
Dan Boneh and Brent Waters [5] offerspeopleingeneral key
framework that backings correlation questions on encoded
information and additionally more broad inquiries, for
example, subset inquiries. These frameworks bolster
conjunctive questions which are discretionary in nature
without spilling data on individual conjuncts. Also, a general
structure for developing and breaking down open key
frameworks supporting queries on scrambled information.
Openly key frameworks, a mystery key can create tokens for
testing any upheld inquiry predicate. The token gives
anybody a chance to test the predicate on a given figure
content without adapting some other data about the
plaintext. It speaks to the general structure to dissect the
security of looking on scrambled information frameworks.
Mehmet Kuzu [6] proposes an approach which utilizes
Locality Sensitive Hashing (LSH) which is the closest
neighbor calculation for the file creation. Comparative
elements are put into a similar basin with a high likelihood
because of the property of LSH while the elementswhichare
not comparative are kept in the distinctive pails. On the off
chance that the informational index is little, then the
correspondence cost and pursuit time required by this plan
is better. Yet, in the event that the database measure
expands, then the time required for correspondence and for
looking additionally increments quickly. They utilize sprout
channel for interpretationof strings.However,thedisservice
of this structure is that it is a probabilistic information
structure.
Wenjun Lu et al. [7] offer’s a method to retrieve encrypted
multimedia file without decrypting it from cloud while
maintaining the confidentiality and privacy of data. They
have used different encryption algorithms, securedinverted
index and secure min-hash algorithm to achieve the goals.
Firstly, the features of image are extracted and indexis build
and then the image is encrypted andstoredinremoteserver.
The user can retrieve the image by using different queries.
The efficiency and security of given system can be further
improved.
Bing Wang et al. [8] introduces about privacy preserving
multi-keyword fuzzy search over encrypted data which is
stored on the cloud. Here the author has used different
encryption and hashing techniques to maintain privacy of
data over cloud. The given method eliminates the need of
dictionary.
3. PROPOSED METHODOLOGY
Step 1: Uploading of Data
Initially data in text file format is been uploaded by data
owner. Subsequently three sub process occurs. Initially
original data is been encrypted using AES and pattern
buckets are stored in Encrypted format in cloud. Secondly
data is been preprocessed, matrix Translation is been done
creating buckets, data is been stored in as feature data in
private cloud. An original copy of data is been stored as
complete data in other cloud.
Step 2: Input Query preprocessing
Input Query is been submitted by Data user to System.
System Accepts query performing preprocessing on query.
Future query is been Trapdoor to create Query words
pattern in encrypted format. Every word is been sent matrix
translation creating buckets, this buckets are future
encrypted using AES Algorithm.HereinThisprocesspattern
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1866
are been generated using bucket generation. A bucket is set
of word list for every word starting from trigram to N gram
Approach.
Bucket generation Process is as below:
“Computing” generates bucket as shown below-
“Computing”{
com,comp,compu,comput,computi,computi,computin}
Step 3: Bloom Filter Application
Data in cloud Stored as feature data is been dynamically
copied in feature vector consisting of File name and File
Feature. This complete Data is termed as Bloom Filter Data.
Step 4: Search correlation
Search correlation Pattern matching is beendonewithInput
Query and Trapdoor query. Both vectors arebeencompared
and Correlation vector for input query is been generated.
This vector is been sent for future correlation evaluation.
Step 5: Ginix index
Search results are been displayed in all files that have been
matched for given query input
4. ALGORITHM
ALGORITHM 1: BUILD MATRIX
Require: D: data item collection,
Ψ : security parameter,
MAX: maximum possible number of features
Kid ← Keygen(Ψ), Kpayload ← Keygen(Ψ)
for all Di € D do
Fi ← extract features of Di
for all fij € Fi do
fij ← apply metric space translation on fij
for all gk € g do
if gk(fij ) € bucket identifier list then
add gk(fij ) to the bucket identifier list
Initialize Vgk(fij) as a zero vector of size |D|
Increment recordCount
end if
Vgk(fij)[id(Di)] ← 1
end for
end for
end for
for all Bk € bucket identifier list do
VBk ← retrieve payload of Bk
πBk ← EncKid (Bk), σVBk ← EncKpayload (VBk )
add (πBk , σVBk) to I
end for
return I
ALGORITHM 2: MATRIX SPACE TRANSLATION
//Input : Data collection Set D ={ Di }
//Output: Matrix space Set MS
Step 0:Start
Step 1: Get the Set D
Step 2: FOR i=0 to Size of D
Step 3: get Si of Di
Step 4: FOR j=0 to length of si
Step 5: sbi=substring(si,2→j)
Step 6: Add sbi to MS
Step 7: END FOR
Step 8: END FOR
Step 9: return MS
Step 10: Stop
5. RESULTS
Some trial assessments are performed to demonstrate the
adequacy of the framework. What's more,theseanalysesare
led on windows based java machine with generally utilized
IDE Net beans. Likewise the quantities of recovered records
are utilized to set benchmark for execution assessment.
Quantities of applicable recovered archives from the cloud
for the arrangement of catchphrases are utilized to
demonstrate the adequacy of the framework. The following
are the meaning of the utilized measuring methods i.e.
exactness and review.
Exactness: it is a proportion of quantities of appropriate
archives recovered to the total of aggregate quantities of
important and immaterial records recovered. Relative
viability of the framework is very much communicated by
utilizing accuracy parameters.
Review: it is a proportion of aggregate quantities of
applicable archives recovered to the aggregate quantities of
pertinent records not recovered. Supreme precision of the
framework is all around described by utilizing review
parameter.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1867
Quantities of situations presents where one measuring
parameter rules the other. By thinking about such
parameters we utilized two measuring parameters, for
example, accuracy and review.
For Detailed Examination
• A = No. of relevant docs retrieved
• B =No of relevant documents not retrieved
• C = No of irrelevant documents are retrieved.
So, Precision = (A/ (A+ C))*100
And Recall = (A/ (A+ B))*100
Fig.3.Average precision of the similarity search method
In Fig. 3, by observing figure 3 it is clear that average
precision obtained by using similarity search method is
approximately 65%.
Fig.4. Average Recall of the similarity search method
In Fig. 4, figure shows that the system gives 95% recall for
the similarity search method. By comparing these two
graphs we can conclude that the similarity search method
gives high recall value compare to the precision value.
6. CONCLUSION
Search over encrypted System assist in retrieving file that
contains required information without decryption process.
This would enhance search processincloudwherefiles areb
been encrypted and stored. In above project work search
time has been found to be low. Effective retrieval of
documents measuring precision and recall.
REFERENCES
[1] Cong Wang, Ning Cao, Jin Li, Kui Ren and Wenjing Lou,
“Secure Ranked Keyword Search over Encrypted Cloud
Data”, IEEE 30th International Conference on Distributed
Computing Systems, 2010, pp. 253-262,
doi:10.1109/ICDCS.2010.34.
[2] Yan-Cheng Chang and Michael Mitzenmacher, “Privacy
Preserving Keyword Searches on Remote Encrypted Data”,
in Proc. of ACNS’05, 2005, pp. 442-455, Springer Berlin
Heidelberg.
[3] Jan Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, “Enabling
Efficient Fuzzy Keyword Search over Encrypted Data in
Cloud Computing”, Proc. of IEEE INFOCOM’10 Mini-
Conference, March 2010, pp. 1-5, IEEE.
[4] Qin Lv, William Josephson, Zhe Wang, Moses Charikar,
Kai Li, “Multi-Probe LSH: Efficient Indexing for High
Dimensional Similarity Search”, in Proceedings of the 33rd
international conferenceon verylargedatabases,September
2007, pp. 950-961, VLDB Endowment.
[5] Dan Boneh and Brent Waters, “Conjunctive, Subset and
Range Queries on Encrypted Data”, in Theory of
Cryptography Conference, February 2007, pp. 535-554,
Springer Berlin Heidelberg.
[6] Kuzu Mehmet, Mohammad Saiful Islam, Murat
Kantarcioglu, “Efficient Similarity Search Over Encrypted
Data”, in Data Engineering (ICDE), 2012 IEEE28th
International Conference, IEEE, 2012.
[7] Wenjun Lu, Ashwin Swami Nathan, Avinash L. Varna,
and Min Wu, “Enabling search over encrypted multimedia
databases” InIS&T/SPIE Electronic Imaging, Feb 2009 ,
pp. 725418-725418, International Society for Optics and
Photonics.
[8] Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou,
“Privacy-preserving multi-keyword fuzzy search over
encrypted data in the cloud” InINFOCOM, 2014Proceedings
IEEE, April 2014, pp. 2112-2120, IEEE.

Recomendados

A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method von
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodIRJET Journal
33 views3 Folien
Efficient Similarity Search Over Encrypted Data von
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataIRJET Journal
29 views3 Folien
Efficient Privacy Preserving Clustering Based Multi Keyword Search von
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search IRJET Journal
38 views7 Folien
Enabling efficient multi keyword ranked von
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword rankedSakthi Sundaram
160 views12 Folien
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD von
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
3.8K views10 Folien
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud von
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
12 views3 Folien

Más contenido relacionado

Was ist angesagt?

IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha... von
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET Journal
13 views5 Folien
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab... von
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET Journal
26 views4 Folien
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ... von
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET Journal
11 views4 Folien
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus... von
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...IRJET Journal
41 views4 Folien
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto... von
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
69 views4 Folien
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... von
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
5.4K views12 Folien

Was ist angesagt?(18)

IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha... von IRJET Journal
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal13 views
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab... von IRJET Journal
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET Journal26 views
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ... von IRJET Journal
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal11 views
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus... von IRJET Journal
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET Journal41 views
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto... von IRJET Journal
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal69 views
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... von Nexgen Technology
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology 5.4K views
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ... von nexgentechnology
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology161 views
Paper id 28201425 von IJRAT
Paper id 28201425Paper id 28201425
Paper id 28201425
IJRAT231 views
An efficeient privacy preserving ranked keyword search von redpel dot com
An efficeient privacy preserving ranked keyword searchAn efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword search
redpel dot com429 views
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing von IRJET Journal
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET Journal17 views
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme von IRJET Journal
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET Journal52 views
IRJET- Privacy Preserving Encrypted Keyword Search Schemes von IRJET Journal
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal35 views
3 ijece 1 ed iqbal qc von IAESIJEECS
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
IAESIJEECS26 views
Retrieving Secure Data from Cloud Using OTP von AM Publications
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
AM Publications245 views
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M... von IRJET Journal
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal298 views

Similar a Efficient Similarity Search over Encrypted Data

Data Search in Cloud using the Encrypted Keywords von
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
34 views4 Folien
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp... von
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...IRJET Journal
6 views2 Folien
Multi-Keyword Ranked Search in Encrypted Cloud Storage von
Multi-Keyword Ranked Search in Encrypted Cloud StorageMulti-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud StorageIRJET Journal
30 views5 Folien
J017547478 von
J017547478J017547478
J017547478IOSR Journals
173 views5 Folien
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud von
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET Journal
10 views3 Folien
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... von
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...redpel dot com
416 views12 Folien

Similar a Efficient Similarity Search over Encrypted Data(20)

Data Search in Cloud using the Encrypted Keywords von IRJET Journal
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
IRJET Journal34 views
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp... von IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal6 views
Multi-Keyword Ranked Search in Encrypted Cloud Storage von IRJET Journal
Multi-Keyword Ranked Search in Encrypted Cloud StorageMulti-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal30 views
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud von IRJET Journal
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET Journal10 views
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... von redpel dot com
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com416 views
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in... von IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal29 views
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... von 1crore projects
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects60 views
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... von Pvrtechnologies Nellore
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ... von IJCI JOURNAL
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
IJCI JOURNAL310 views
A secure and dynamic multi keyword ranked von nexgentech15
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
nexgentech15279 views
2016 BE Final year Projects in chennai - 1 Crore Projects von 1crore projects
2016 BE Final year Projects in chennai - 1 Crore Projects 2016 BE Final year Projects in chennai - 1 Crore Projects
2016 BE Final year Projects in chennai - 1 Crore Projects
1crore projects127 views
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN von IRJET Journal
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINCLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
IRJET Journal7 views
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme von IRJET Journal
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal32 views
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ... von ASAITHAMBIRAJAA
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
ASAITHAMBIRAJAA242 views
Ieeepro techno solutions 2014 ieee java project - query services in cost ef... von hemanthbbc
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
hemanthbbc96 views
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ... von IJSRD
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD 246 views
IRJET- Data Mining - Secure Keyword Manager von IRJET Journal
IRJET- Data Mining - Secure Keyword ManagerIRJET- Data Mining - Secure Keyword Manager
IRJET- Data Mining - Secure Keyword Manager
IRJET Journal8 views
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing von IJERA Editor
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
IJERA Editor1.4K views

Más de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL von
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
25 views7 Folien
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 views7 Folien
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
8 views5 Folien
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 views11 Folien
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 views6 Folien
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 views5 Folien

Más de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL von IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal25 views
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 views
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal8 views
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 views
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 views
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 views
Heart Failure Prediction using Different Machine Learning Techniques von IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 views
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel von IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 views
Metro Development and Pedestrian Concerns von IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 views
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... von IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 views
Data Analytics and Artificial Intelligence in Healthcare Industry von IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 views
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... von IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal62 views
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... von IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal12 views
Development of Effective Tomato Package for Post-Harvest Preservation von IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 views
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” von IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 views
Understanding the Nature of Consciousness with AI von IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 views
Augmented Reality App for Location based Exploration at JNTUK Kakinada von IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 views
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... von IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 views
Enhancing Real Time Communication and Efficiency With Websocket von IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal5 views
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... von IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 views

Último

MongoDB.pdf von
MongoDB.pdfMongoDB.pdf
MongoDB.pdfArthyR3
49 views6 Folien
Plant Design Report-Oil Refinery.pdf von
Plant Design Report-Oil Refinery.pdfPlant Design Report-Oil Refinery.pdf
Plant Design Report-Oil Refinery.pdfSafeen Yaseen Ja'far
7 views10 Folien
Pitchbook Repowerlab.pdf von
Pitchbook Repowerlab.pdfPitchbook Repowerlab.pdf
Pitchbook Repowerlab.pdfVictoriaGaleano
6 views12 Folien
MK__Cert.pdf von
MK__Cert.pdfMK__Cert.pdf
MK__Cert.pdfHassan Khan
19 views1 Folie
Searching in Data Structure von
Searching in Data StructureSearching in Data Structure
Searching in Data Structureraghavbirla63
17 views8 Folien
Ansari: Practical experiences with an LLM-based Islamic Assistant von
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic AssistantM Waleed Kadous
9 views29 Folien

Último(20)

MongoDB.pdf von ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR349 views
Ansari: Practical experiences with an LLM-based Islamic Assistant von M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic AssistantAnsari: Practical experiences with an LLM-based Islamic Assistant
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous9 views
SUMIT SQL PROJECT SUPERSTORE 1.pptx von Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 22 views
REACTJS.pdf von ArthyR3
REACTJS.pdfREACTJS.pdf
REACTJS.pdf
ArthyR337 views
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... von csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn8 views
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx von lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78180 views
Créativité dans le design mécanique à l’aide de l’optimisation topologique von LIEGE CREATIVE
Créativité dans le design mécanique à l’aide de l’optimisation topologiqueCréativité dans le design mécanique à l’aide de l’optimisation topologique
Créativité dans le design mécanique à l’aide de l’optimisation topologique
LIEGE CREATIVE8 views
Design_Discover_Develop_Campaign.pptx von ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth649 views
Web Dev Session 1.pptx von VedVekhande
Web Dev Session 1.pptxWeb Dev Session 1.pptx
Web Dev Session 1.pptx
VedVekhande17 views
GDSC Mikroskil Members Onboarding 2023.pdf von gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil63 views

Efficient Similarity Search over Encrypted Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1864 Efficient Similarity Search over Encrypted Data Mohit Kulkarni1, Nikhil Kumar2, Santosh Vaidande3, B.S.Satpute4 1,2,3 Student, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India. 4Professor, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – In this present time, due to engaging components of appropriated processing, the colossal measure of data has been secured in the cloud. In spite of the way that cloud-based organizations offer many favorable circumstances yet assurance and security of the delicate data is a noteworthy issue. These issues are settled by securing sensitive datafitasa fiddle. Encoded limit secures the data against unapproved get to, yet it cripples some basic and basic handiness like interest operation on the data, i.e. looking the required data by the customer on the mixed data obliges data to be unscrambled first and a short time later look for, so this at last, backs offthe route toward looking for. To achieve this various encryption arranges have been proposed, regardless, most of the arrangements handle amend Query organizing however not Similarity planning. While customer exchanges the record, components are expelled from each report. Right when the customer fires a request, trapdoor of that question is created and interest is performed by finding the relationship among files set away on cloud and request watchword, using Locality Sensitive Hashing. Key Words - Locality sensitive hashing, Encrypted data, Similarity search, Cloud computing, AES Encryption, Trapdoor Construction 1. INTRODUCTION In present information far reaching condition, cloud computing is normal since it expels the weight of gigantic information administration in a savvy way. The touchy information send to non-trusted cloud servers will prompt protection issues. To reduce the stresses, delicate information must be sent in the encoded shape which maintains a strategic distance from unlawful get to. There are numerous calculations which bolster the operation which is called Searchable Encryption Scheme. Ordinarily, all plans are intended for correct question coordinating. Inquiry coordinatingisthewaytowardfinding the client's coveted information from the cloud as indicated by the expressed element. In any case, it is more sensible to perform recovery as per the closeness with the expressed element rather than the presence of it. Comparabilityhuntis an issue that upgrades and finds the point in a given set that is nearest to a given point. It is predefined that efficient techniques are required to do closeness seek over the gigantic measure of encoded information. The fundamental calculation of our venture is the rough close neighbor seeks calculation called Locality Sensitive Hashing (LSH). LSH is comprehensively utilized for quick likeness look on information in data recovery. Our venture has two sections: User 'Transferring the information' and 'Seeking the question'. Fig 1: Complete Process Right off the bat, the client transfers the information. At that point record components are extricated by preprocessingit. Stop words expulsion and Stemming id is the following procedure. The words are part at the specific character to shape pails and proceed till the aggregate length of theword after which they are put away in a document. After that Encryption of both Plaintext and the Indexed document is done and put away in the cloud. 2. LITERATURE SURVEY Cong Wang et al. [1] presents secured rank watch word scan for information put away in the cloud. Right off the bat, they positioned the watch words utilizing compellingpositioning compositions while keeping up security over the cloud and effectiveness of information looked. The positioning is done in view of file development and utilizations positioning capacity to give a score to watchwords. The significant issue in this is computational overhead to rank catchphrases.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1865 Cheng and Mitzenmacher [2] offer to seek on encoded information put away remotely utilizing catchphrases that protect the security of information. Here they portray recovering scrambled information utilizing the watchword record (i.e. lexicon) which is made by the client itself. The word reference is available on the remote server including the record, utilizing which the client can recover the scrambled information while looking after security. It requires additional capacity to store watchword record. Jan Li et al. [3] created plans to recover the scrambled information on the cloud utilizing fluffy catchphrase look while protecting the security and productivity. They have created two plans (trump card based method and gram- based strategy) to develop fluffy catchphrase set which produces coordinating records or shut coordinating documents. The proprietor stores fluffy catchphrases set alongside the record which is changed over into file frame. The proficiency of proposed framework can even now be additionally enhanced for achieving better conceivable outcomes. Qin Lv [4] expounds on multi test LHS composition for ordering which helps effective closeness coordinating for looked inquiry and delivers most ideal outcomes. It utilizes KNN-calculation for coordinating records from numerous pails for a given information question by the client. In this way it requires few hash tables because of examining different basins and spares storage room required to store countless tables. They even lookedatentropybasedLSHand multi-test LSH demonstrating the upsides of multi-test LSH over entropy based LSH. Dan Boneh and Brent Waters [5] offerspeopleingeneral key framework that backings correlation questions on encoded information and additionally more broad inquiries, for example, subset inquiries. These frameworks bolster conjunctive questions which are discretionary in nature without spilling data on individual conjuncts. Also, a general structure for developing and breaking down open key frameworks supporting queries on scrambled information. Openly key frameworks, a mystery key can create tokens for testing any upheld inquiry predicate. The token gives anybody a chance to test the predicate on a given figure content without adapting some other data about the plaintext. It speaks to the general structure to dissect the security of looking on scrambled information frameworks. Mehmet Kuzu [6] proposes an approach which utilizes Locality Sensitive Hashing (LSH) which is the closest neighbor calculation for the file creation. Comparative elements are put into a similar basin with a high likelihood because of the property of LSH while the elementswhichare not comparative are kept in the distinctive pails. On the off chance that the informational index is little, then the correspondence cost and pursuit time required by this plan is better. Yet, in the event that the database measure expands, then the time required for correspondence and for looking additionally increments quickly. They utilize sprout channel for interpretationof strings.However,thedisservice of this structure is that it is a probabilistic information structure. Wenjun Lu et al. [7] offer’s a method to retrieve encrypted multimedia file without decrypting it from cloud while maintaining the confidentiality and privacy of data. They have used different encryption algorithms, securedinverted index and secure min-hash algorithm to achieve the goals. Firstly, the features of image are extracted and indexis build and then the image is encrypted andstoredinremoteserver. The user can retrieve the image by using different queries. The efficiency and security of given system can be further improved. Bing Wang et al. [8] introduces about privacy preserving multi-keyword fuzzy search over encrypted data which is stored on the cloud. Here the author has used different encryption and hashing techniques to maintain privacy of data over cloud. The given method eliminates the need of dictionary. 3. PROPOSED METHODOLOGY Step 1: Uploading of Data Initially data in text file format is been uploaded by data owner. Subsequently three sub process occurs. Initially original data is been encrypted using AES and pattern buckets are stored in Encrypted format in cloud. Secondly data is been preprocessed, matrix Translation is been done creating buckets, data is been stored in as feature data in private cloud. An original copy of data is been stored as complete data in other cloud. Step 2: Input Query preprocessing Input Query is been submitted by Data user to System. System Accepts query performing preprocessing on query. Future query is been Trapdoor to create Query words pattern in encrypted format. Every word is been sent matrix translation creating buckets, this buckets are future encrypted using AES Algorithm.HereinThisprocesspattern
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1866 are been generated using bucket generation. A bucket is set of word list for every word starting from trigram to N gram Approach. Bucket generation Process is as below: “Computing” generates bucket as shown below- “Computing”{ com,comp,compu,comput,computi,computi,computin} Step 3: Bloom Filter Application Data in cloud Stored as feature data is been dynamically copied in feature vector consisting of File name and File Feature. This complete Data is termed as Bloom Filter Data. Step 4: Search correlation Search correlation Pattern matching is beendonewithInput Query and Trapdoor query. Both vectors arebeencompared and Correlation vector for input query is been generated. This vector is been sent for future correlation evaluation. Step 5: Ginix index Search results are been displayed in all files that have been matched for given query input 4. ALGORITHM ALGORITHM 1: BUILD MATRIX Require: D: data item collection, Ψ : security parameter, MAX: maximum possible number of features Kid ← Keygen(Ψ), Kpayload ← Keygen(Ψ) for all Di € D do Fi ← extract features of Di for all fij € Fi do fij ← apply metric space translation on fij for all gk € g do if gk(fij ) € bucket identifier list then add gk(fij ) to the bucket identifier list Initialize Vgk(fij) as a zero vector of size |D| Increment recordCount end if Vgk(fij)[id(Di)] ← 1 end for end for end for for all Bk € bucket identifier list do VBk ← retrieve payload of Bk πBk ← EncKid (Bk), σVBk ← EncKpayload (VBk ) add (πBk , σVBk) to I end for return I ALGORITHM 2: MATRIX SPACE TRANSLATION //Input : Data collection Set D ={ Di } //Output: Matrix space Set MS Step 0:Start Step 1: Get the Set D Step 2: FOR i=0 to Size of D Step 3: get Si of Di Step 4: FOR j=0 to length of si Step 5: sbi=substring(si,2→j) Step 6: Add sbi to MS Step 7: END FOR Step 8: END FOR Step 9: return MS Step 10: Stop 5. RESULTS Some trial assessments are performed to demonstrate the adequacy of the framework. What's more,theseanalysesare led on windows based java machine with generally utilized IDE Net beans. Likewise the quantities of recovered records are utilized to set benchmark for execution assessment. Quantities of applicable recovered archives from the cloud for the arrangement of catchphrases are utilized to demonstrate the adequacy of the framework. The following are the meaning of the utilized measuring methods i.e. exactness and review. Exactness: it is a proportion of quantities of appropriate archives recovered to the total of aggregate quantities of important and immaterial records recovered. Relative viability of the framework is very much communicated by utilizing accuracy parameters. Review: it is a proportion of aggregate quantities of applicable archives recovered to the aggregate quantities of pertinent records not recovered. Supreme precision of the framework is all around described by utilizing review parameter.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1867 Quantities of situations presents where one measuring parameter rules the other. By thinking about such parameters we utilized two measuring parameters, for example, accuracy and review. For Detailed Examination • A = No. of relevant docs retrieved • B =No of relevant documents not retrieved • C = No of irrelevant documents are retrieved. So, Precision = (A/ (A+ C))*100 And Recall = (A/ (A+ B))*100 Fig.3.Average precision of the similarity search method In Fig. 3, by observing figure 3 it is clear that average precision obtained by using similarity search method is approximately 65%. Fig.4. Average Recall of the similarity search method In Fig. 4, figure shows that the system gives 95% recall for the similarity search method. By comparing these two graphs we can conclude that the similarity search method gives high recall value compare to the precision value. 6. CONCLUSION Search over encrypted System assist in retrieving file that contains required information without decryption process. This would enhance search processincloudwherefiles areb been encrypted and stored. In above project work search time has been found to be low. Effective retrieval of documents measuring precision and recall. REFERENCES [1] Cong Wang, Ning Cao, Jin Li, Kui Ren and Wenjing Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data”, IEEE 30th International Conference on Distributed Computing Systems, 2010, pp. 253-262, doi:10.1109/ICDCS.2010.34. [2] Yan-Cheng Chang and Michael Mitzenmacher, “Privacy Preserving Keyword Searches on Remote Encrypted Data”, in Proc. of ACNS’05, 2005, pp. 442-455, Springer Berlin Heidelberg. [3] Jan Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, “Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing”, Proc. of IEEE INFOCOM’10 Mini- Conference, March 2010, pp. 1-5, IEEE. [4] Qin Lv, William Josephson, Zhe Wang, Moses Charikar, Kai Li, “Multi-Probe LSH: Efficient Indexing for High Dimensional Similarity Search”, in Proceedings of the 33rd international conferenceon verylargedatabases,September 2007, pp. 950-961, VLDB Endowment. [5] Dan Boneh and Brent Waters, “Conjunctive, Subset and Range Queries on Encrypted Data”, in Theory of Cryptography Conference, February 2007, pp. 535-554, Springer Berlin Heidelberg. [6] Kuzu Mehmet, Mohammad Saiful Islam, Murat Kantarcioglu, “Efficient Similarity Search Over Encrypted Data”, in Data Engineering (ICDE), 2012 IEEE28th International Conference, IEEE, 2012. [7] Wenjun Lu, Ashwin Swami Nathan, Avinash L. Varna, and Min Wu, “Enabling search over encrypted multimedia databases” InIS&T/SPIE Electronic Imaging, Feb 2009 , pp. 725418-725418, International Society for Optics and Photonics. [8] Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, “Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud” InINFOCOM, 2014Proceedings IEEE, April 2014, pp. 2112-2120, IEEE.