SlideShare a Scribd company logo
Suche senden
Hochladen
Efficient Similarity Search over Encrypted Data
Melden
Teilen
IRJET Journal
Fast Track Publications
Folgen
•
0 gefällt mir
•
37 views
Ingenieurwesen
https://www.irjet.net/archives/V4/i6/IRJET-V4I6356.pdf
Mehr lesen
Efficient Similarity Search over Encrypted Data
•
0 gefällt mir
•
37 views
IRJET Journal
Fast Track Publications
Folgen
Melden
Teilen
Ingenieurwesen
https://www.irjet.net/archives/V4/i6/IRJET-V4I6356.pdf
Mehr lesen
Efficient Similarity Search over Encrypted Data
1 von 4
Jetzt herunterladen
Recomendados
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method von
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
33 views
•
3 Folien
Efficient Similarity Search Over Encrypted Data von
Efficient Similarity Search Over Encrypted Data
IRJET Journal
29 views
•
3 Folien
Efficient Privacy Preserving Clustering Based Multi Keyword Search von
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET Journal
38 views
•
7 Folien
Enabling efficient multi keyword ranked von
Enabling efficient multi keyword ranked
Sakthi Sundaram
160 views
•
12 Folien
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD von
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
3.8K views
•
10 Folien
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud von
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
12 views
•
3 Folien
Más contenido relacionado
Was ist angesagt?
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha... von
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
13 views
•
5 Folien
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab... von
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET Journal
26 views
•
4 Folien
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ... von
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
11 views
•
4 Folien
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus... von
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET Journal
41 views
•
4 Folien
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto... von
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
69 views
•
4 Folien
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... von
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
5.4K views
•
12 Folien
Was ist angesagt?
(18)
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha... von IRJET Journal
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
•
13 views
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab... von IRJET Journal
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET Journal
•
26 views
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ... von IRJET Journal
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
•
11 views
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus... von IRJET Journal
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET Journal
•
41 views
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto... von IRJET Journal
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
•
69 views
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... von Nexgen Technology
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
•
5.4K views
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over von IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
•
450 views
Final 1st von gokulprema
Final 1st
gokulprema
•
1K views
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ... von nexgentechnology
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology
•
161 views
Paper id 28201425 von IJRAT
Paper id 28201425
IJRAT
•
231 views
An efficeient privacy preserving ranked keyword search von redpel dot com
An efficeient privacy preserving ranked keyword search
redpel dot com
•
429 views
IJARCCE 20 von Nahan Rahman
IJARCCE 20
Nahan Rahman
•
211 views
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing von IRJET Journal
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET Journal
•
17 views
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme von IRJET Journal
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET Journal
•
52 views
IRJET- Privacy Preserving Encrypted Keyword Search Schemes von IRJET Journal
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
•
35 views
3 ijece 1 ed iqbal qc von IAESIJEECS
3 ijece 1 ed iqbal qc
IAESIJEECS
•
26 views
Retrieving Secure Data from Cloud Using OTP von AM Publications
Retrieving Secure Data from Cloud Using OTP
AM Publications
•
245 views
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M... von IRJET Journal
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
•
298 views
Similar a Efficient Similarity Search over Encrypted Data
Data Search in Cloud using the Encrypted Keywords von
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
34 views
•
4 Folien
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp... von
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
6 views
•
2 Folien
Multi-Keyword Ranked Search in Encrypted Cloud Storage von
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
30 views
•
5 Folien
J017547478 von
J017547478
IOSR Journals
173 views
•
5 Folien
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud von
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET Journal
10 views
•
3 Folien
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... von
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com
416 views
•
12 Folien
Similar a Efficient Similarity Search over Encrypted Data
(20)
Data Search in Cloud using the Encrypted Keywords von IRJET Journal
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
•
34 views
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp... von IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
•
6 views
Multi-Keyword Ranked Search in Encrypted Cloud Storage von IRJET Journal
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
•
30 views
J017547478 von IOSR Journals
J017547478
IOSR Journals
•
173 views
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud von IRJET Journal
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET Journal
•
10 views
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... von redpel dot com
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com
•
416 views
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in... von IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
•
29 views
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... von 1crore projects
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
•
60 views
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... von Pvrtechnologies Nellore
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Pvrtechnologies Nellore
•
244 views
Cloud java titles adrit solutions von Adrit Techno Solutions
Cloud java titles adrit solutions
Adrit Techno Solutions
•
247 views
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ... von IJCI JOURNAL
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
IJCI JOURNAL
•
310 views
A secure and dynamic multi keyword ranked von nexgentech15
A secure and dynamic multi keyword ranked
nexgentech15
•
279 views
2016 BE Final year Projects in chennai - 1 Crore Projects von 1crore projects
2016 BE Final year Projects in chennai - 1 Crore Projects
1crore projects
•
127 views
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN von IRJET Journal
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
IRJET Journal
•
7 views
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme von IRJET Journal
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
•
32 views
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ... von ASAITHAMBIRAJAA
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
ASAITHAMBIRAJAA
•
242 views
Ieeepro techno solutions 2014 ieee java project - query services in cost ef... von hemanthbbc
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
hemanthbbc
•
96 views
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ... von IJSRD
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD
•
246 views
IRJET- Data Mining - Secure Keyword Manager von IRJET Journal
IRJET- Data Mining - Secure Keyword Manager
IRJET Journal
•
8 views
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing von IJERA Editor
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
IJERA Editor
•
1.4K views
Más de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL von
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
25 views
•
7 Folien
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 views
•
7 Folien
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
8 views
•
5 Folien
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 views
•
11 Folien
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 views
•
6 Folien
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 views
•
5 Folien
Más de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL von IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
25 views
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... von IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 views
Identification, Discrimination and Classification of Cotton Crop by Using Mul... von IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
8 views
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... von IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 views
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... von IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 views
Performance Analysis of Aerodynamic Design for Wind Turbine Blade von IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 views
Heart Failure Prediction using Different Machine Learning Techniques von IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 views
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel von IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 views
Metro Development and Pedestrian Concerns von IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 views
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... von IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 views
Data Analytics and Artificial Intelligence in Healthcare Industry von IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 views
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... von IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
62 views
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... von IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
12 views
Development of Effective Tomato Package for Post-Harvest Preservation von IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 views
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” von IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 views
Understanding the Nature of Consciousness with AI von IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 views
Augmented Reality App for Location based Exploration at JNTUK Kakinada von IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 views
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... von IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 views
Enhancing Real Time Communication and Efficiency With Websocket von IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
5 views
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... von IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 views
Último
MongoDB.pdf von
MongoDB.pdf
ArthyR3
49 views
•
6 Folien
Plant Design Report-Oil Refinery.pdf von
Plant Design Report-Oil Refinery.pdf
Safeen Yaseen Ja'far
7 views
•
10 Folien
Pitchbook Repowerlab.pdf von
Pitchbook Repowerlab.pdf
VictoriaGaleano
6 views
•
12 Folien
MK__Cert.pdf von
MK__Cert.pdf
Hassan Khan
19 views
•
1 Folie
Searching in Data Structure von
Searching in Data Structure
raghavbirla63
17 views
•
8 Folien
Ansari: Practical experiences with an LLM-based Islamic Assistant von
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous
9 views
•
29 Folien
Último
(20)
MongoDB.pdf von ArthyR3
MongoDB.pdf
ArthyR3
•
49 views
Plant Design Report-Oil Refinery.pdf von Safeen Yaseen Ja'far
Plant Design Report-Oil Refinery.pdf
Safeen Yaseen Ja'far
•
7 views
Pitchbook Repowerlab.pdf von VictoriaGaleano
Pitchbook Repowerlab.pdf
VictoriaGaleano
•
6 views
MK__Cert.pdf von Hassan Khan
MK__Cert.pdf
Hassan Khan
•
19 views
Searching in Data Structure von raghavbirla63
Searching in Data Structure
raghavbirla63
•
17 views
Ansari: Practical experiences with an LLM-based Islamic Assistant von M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous
•
9 views
SUMIT SQL PROJECT SUPERSTORE 1.pptx von Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav
•
22 views
REACTJS.pdf von ArthyR3
REACTJS.pdf
ArthyR3
•
37 views
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... von csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn
•
8 views
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx von lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78
•
180 views
Global airborne satcom market report von defencereport78
Global airborne satcom market report
defencereport78
•
6 views
Créativité dans le design mécanique à l’aide de l’optimisation topologique von LIEGE CREATIVE
Créativité dans le design mécanique à l’aide de l’optimisation topologique
LIEGE CREATIVE
•
8 views
Design_Discover_Develop_Campaign.pptx von ShivanshSeth6
Design_Discover_Develop_Campaign.pptx
ShivanshSeth6
•
49 views
Robotics in construction enterprise von Khalid Abdel Naser Abdel Rahim
Robotics in construction enterprise
Khalid Abdel Naser Abdel Rahim
•
5 views
START Newsletter 3 von Start Project
START Newsletter 3
Start Project
•
7 views
Web Dev Session 1.pptx von VedVekhande
Web Dev Session 1.pptx
VedVekhande
•
17 views
GDSC Mikroskil Members Onboarding 2023.pdf von gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil
•
63 views
DESIGN OF SPRINGS-UNIT4.pptx von gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
•
21 views
sam_software_eng_cv.pdf von sammyigbinovia
sam_software_eng_cv.pdf
sammyigbinovia
•
10 views
Renewal Projects in Seismic Construction von Engineering & Seismic Construction
Renewal Projects in Seismic Construction
Engineering & Seismic Construction
•
5 views
Efficient Similarity Search over Encrypted Data
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1864 Efficient Similarity Search over Encrypted Data Mohit Kulkarni1, Nikhil Kumar2, Santosh Vaidande3, B.S.Satpute4 1,2,3 Student, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India. 4Professor, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – In this present time, due to engaging components of appropriated processing, the colossal measure of data has been secured in the cloud. In spite of the way that cloud-based organizations offer many favorable circumstances yet assurance and security of the delicate data is a noteworthy issue. These issues are settled by securing sensitive datafitasa fiddle. Encoded limit secures the data against unapproved get to, yet it cripples some basic and basic handiness like interest operation on the data, i.e. looking the required data by the customer on the mixed data obliges data to be unscrambled first and a short time later look for, so this at last, backs offthe route toward looking for. To achieve this various encryption arranges have been proposed, regardless, most of the arrangements handle amend Query organizing however not Similarity planning. While customer exchanges the record, components are expelled from each report. Right when the customer fires a request, trapdoor of that question is created and interest is performed by finding the relationship among files set away on cloud and request watchword, using Locality Sensitive Hashing. Key Words - Locality sensitive hashing, Encrypted data, Similarity search, Cloud computing, AES Encryption, Trapdoor Construction 1. INTRODUCTION In present information far reaching condition, cloud computing is normal since it expels the weight of gigantic information administration in a savvy way. The touchy information send to non-trusted cloud servers will prompt protection issues. To reduce the stresses, delicate information must be sent in the encoded shape which maintains a strategic distance from unlawful get to. There are numerous calculations which bolster the operation which is called Searchable Encryption Scheme. Ordinarily, all plans are intended for correct question coordinating. Inquiry coordinatingisthewaytowardfinding the client's coveted information from the cloud as indicated by the expressed element. In any case, it is more sensible to perform recovery as per the closeness with the expressed element rather than the presence of it. Comparabilityhuntis an issue that upgrades and finds the point in a given set that is nearest to a given point. It is predefined that efficient techniques are required to do closeness seek over the gigantic measure of encoded information. The fundamental calculation of our venture is the rough close neighbor seeks calculation called Locality Sensitive Hashing (LSH). LSH is comprehensively utilized for quick likeness look on information in data recovery. Our venture has two sections: User 'Transferring the information' and 'Seeking the question'. Fig 1: Complete Process Right off the bat, the client transfers the information. At that point record components are extricated by preprocessingit. Stop words expulsion and Stemming id is the following procedure. The words are part at the specific character to shape pails and proceed till the aggregate length of theword after which they are put away in a document. After that Encryption of both Plaintext and the Indexed document is done and put away in the cloud. 2. LITERATURE SURVEY Cong Wang et al. [1] presents secured rank watch word scan for information put away in the cloud. Right off the bat, they positioned the watch words utilizing compellingpositioning compositions while keeping up security over the cloud and effectiveness of information looked. The positioning is done in view of file development and utilizations positioning capacity to give a score to watchwords. The significant issue in this is computational overhead to rank catchphrases.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1865 Cheng and Mitzenmacher [2] offer to seek on encoded information put away remotely utilizing catchphrases that protect the security of information. Here they portray recovering scrambled information utilizing the watchword record (i.e. lexicon) which is made by the client itself. The word reference is available on the remote server including the record, utilizing which the client can recover the scrambled information while looking after security. It requires additional capacity to store watchword record. Jan Li et al. [3] created plans to recover the scrambled information on the cloud utilizing fluffy catchphrase look while protecting the security and productivity. They have created two plans (trump card based method and gram- based strategy) to develop fluffy catchphrase set which produces coordinating records or shut coordinating documents. The proprietor stores fluffy catchphrases set alongside the record which is changed over into file frame. The proficiency of proposed framework can even now be additionally enhanced for achieving better conceivable outcomes. Qin Lv [4] expounds on multi test LHS composition for ordering which helps effective closeness coordinating for looked inquiry and delivers most ideal outcomes. It utilizes KNN-calculation for coordinating records from numerous pails for a given information question by the client. In this way it requires few hash tables because of examining different basins and spares storage room required to store countless tables. They even lookedatentropybasedLSHand multi-test LSH demonstrating the upsides of multi-test LSH over entropy based LSH. Dan Boneh and Brent Waters [5] offerspeopleingeneral key framework that backings correlation questions on encoded information and additionally more broad inquiries, for example, subset inquiries. These frameworks bolster conjunctive questions which are discretionary in nature without spilling data on individual conjuncts. Also, a general structure for developing and breaking down open key frameworks supporting queries on scrambled information. Openly key frameworks, a mystery key can create tokens for testing any upheld inquiry predicate. The token gives anybody a chance to test the predicate on a given figure content without adapting some other data about the plaintext. It speaks to the general structure to dissect the security of looking on scrambled information frameworks. Mehmet Kuzu [6] proposes an approach which utilizes Locality Sensitive Hashing (LSH) which is the closest neighbor calculation for the file creation. Comparative elements are put into a similar basin with a high likelihood because of the property of LSH while the elementswhichare not comparative are kept in the distinctive pails. On the off chance that the informational index is little, then the correspondence cost and pursuit time required by this plan is better. Yet, in the event that the database measure expands, then the time required for correspondence and for looking additionally increments quickly. They utilize sprout channel for interpretationof strings.However,thedisservice of this structure is that it is a probabilistic information structure. Wenjun Lu et al. [7] offer’s a method to retrieve encrypted multimedia file without decrypting it from cloud while maintaining the confidentiality and privacy of data. They have used different encryption algorithms, securedinverted index and secure min-hash algorithm to achieve the goals. Firstly, the features of image are extracted and indexis build and then the image is encrypted andstoredinremoteserver. The user can retrieve the image by using different queries. The efficiency and security of given system can be further improved. Bing Wang et al. [8] introduces about privacy preserving multi-keyword fuzzy search over encrypted data which is stored on the cloud. Here the author has used different encryption and hashing techniques to maintain privacy of data over cloud. The given method eliminates the need of dictionary. 3. PROPOSED METHODOLOGY Step 1: Uploading of Data Initially data in text file format is been uploaded by data owner. Subsequently three sub process occurs. Initially original data is been encrypted using AES and pattern buckets are stored in Encrypted format in cloud. Secondly data is been preprocessed, matrix Translation is been done creating buckets, data is been stored in as feature data in private cloud. An original copy of data is been stored as complete data in other cloud. Step 2: Input Query preprocessing Input Query is been submitted by Data user to System. System Accepts query performing preprocessing on query. Future query is been Trapdoor to create Query words pattern in encrypted format. Every word is been sent matrix translation creating buckets, this buckets are future encrypted using AES Algorithm.HereinThisprocesspattern
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1866 are been generated using bucket generation. A bucket is set of word list for every word starting from trigram to N gram Approach. Bucket generation Process is as below: “Computing” generates bucket as shown below- “Computing”{ com,comp,compu,comput,computi,computi,computin} Step 3: Bloom Filter Application Data in cloud Stored as feature data is been dynamically copied in feature vector consisting of File name and File Feature. This complete Data is termed as Bloom Filter Data. Step 4: Search correlation Search correlation Pattern matching is beendonewithInput Query and Trapdoor query. Both vectors arebeencompared and Correlation vector for input query is been generated. This vector is been sent for future correlation evaluation. Step 5: Ginix index Search results are been displayed in all files that have been matched for given query input 4. ALGORITHM ALGORITHM 1: BUILD MATRIX Require: D: data item collection, Ψ : security parameter, MAX: maximum possible number of features Kid ← Keygen(Ψ), Kpayload ← Keygen(Ψ) for all Di € D do Fi ← extract features of Di for all fij € Fi do fij ← apply metric space translation on fij for all gk € g do if gk(fij ) € bucket identifier list then add gk(fij ) to the bucket identifier list Initialize Vgk(fij) as a zero vector of size |D| Increment recordCount end if Vgk(fij)[id(Di)] ← 1 end for end for end for for all Bk € bucket identifier list do VBk ← retrieve payload of Bk πBk ← EncKid (Bk), σVBk ← EncKpayload (VBk ) add (πBk , σVBk) to I end for return I ALGORITHM 2: MATRIX SPACE TRANSLATION //Input : Data collection Set D ={ Di } //Output: Matrix space Set MS Step 0:Start Step 1: Get the Set D Step 2: FOR i=0 to Size of D Step 3: get Si of Di Step 4: FOR j=0 to length of si Step 5: sbi=substring(si,2→j) Step 6: Add sbi to MS Step 7: END FOR Step 8: END FOR Step 9: return MS Step 10: Stop 5. RESULTS Some trial assessments are performed to demonstrate the adequacy of the framework. What's more,theseanalysesare led on windows based java machine with generally utilized IDE Net beans. Likewise the quantities of recovered records are utilized to set benchmark for execution assessment. Quantities of applicable recovered archives from the cloud for the arrangement of catchphrases are utilized to demonstrate the adequacy of the framework. The following are the meaning of the utilized measuring methods i.e. exactness and review. Exactness: it is a proportion of quantities of appropriate archives recovered to the total of aggregate quantities of important and immaterial records recovered. Relative viability of the framework is very much communicated by utilizing accuracy parameters. Review: it is a proportion of aggregate quantities of applicable archives recovered to the aggregate quantities of pertinent records not recovered. Supreme precision of the framework is all around described by utilizing review parameter.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1867 Quantities of situations presents where one measuring parameter rules the other. By thinking about such parameters we utilized two measuring parameters, for example, accuracy and review. For Detailed Examination • A = No. of relevant docs retrieved • B =No of relevant documents not retrieved • C = No of irrelevant documents are retrieved. So, Precision = (A/ (A+ C))*100 And Recall = (A/ (A+ B))*100 Fig.3.Average precision of the similarity search method In Fig. 3, by observing figure 3 it is clear that average precision obtained by using similarity search method is approximately 65%. Fig.4. Average Recall of the similarity search method In Fig. 4, figure shows that the system gives 95% recall for the similarity search method. By comparing these two graphs we can conclude that the similarity search method gives high recall value compare to the precision value. 6. CONCLUSION Search over encrypted System assist in retrieving file that contains required information without decryption process. This would enhance search processincloudwherefiles areb been encrypted and stored. In above project work search time has been found to be low. Effective retrieval of documents measuring precision and recall. REFERENCES [1] Cong Wang, Ning Cao, Jin Li, Kui Ren and Wenjing Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data”, IEEE 30th International Conference on Distributed Computing Systems, 2010, pp. 253-262, doi:10.1109/ICDCS.2010.34. [2] Yan-Cheng Chang and Michael Mitzenmacher, “Privacy Preserving Keyword Searches on Remote Encrypted Data”, in Proc. of ACNS’05, 2005, pp. 442-455, Springer Berlin Heidelberg. [3] Jan Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, “Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing”, Proc. of IEEE INFOCOM’10 Mini- Conference, March 2010, pp. 1-5, IEEE. [4] Qin Lv, William Josephson, Zhe Wang, Moses Charikar, Kai Li, “Multi-Probe LSH: Efficient Indexing for High Dimensional Similarity Search”, in Proceedings of the 33rd international conferenceon verylargedatabases,September 2007, pp. 950-961, VLDB Endowment. [5] Dan Boneh and Brent Waters, “Conjunctive, Subset and Range Queries on Encrypted Data”, in Theory of Cryptography Conference, February 2007, pp. 535-554, Springer Berlin Heidelberg. [6] Kuzu Mehmet, Mohammad Saiful Islam, Murat Kantarcioglu, “Efficient Similarity Search Over Encrypted Data”, in Data Engineering (ICDE), 2012 IEEE28th International Conference, IEEE, 2012. [7] Wenjun Lu, Ashwin Swami Nathan, Avinash L. Varna, and Min Wu, “Enabling search over encrypted multimedia databases” InIS&T/SPIE Electronic Imaging, Feb 2009 , pp. 725418-725418, International Society for Optics and Photonics. [8] Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, “Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud” InINFOCOM, 2014Proceedings IEEE, April 2014, pp. 2112-2120, IEEE.
Jetzt herunterladen