Robust And Enhanced Secured Multiple-keyword Search over Encrypted Cloud Data

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-24 Number-1
Year of Publication : 2015
Authors : M. Nandha Kishore, K.Thulasiram Reddy, T.Charan kumar


M. Nandha Kishore, K.Thulasiram Reddy, T.Charan kumar "Robust And Enhanced Secured Multiple-keyword Search over Encrypted Cloud Data". International Journal of Computer Trends and Technology (IJCTT) V24(1):5-10, June 2015. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
As distributed computing turn out to be more adaptable & compelling regarding economy, information proprietors are inspired to outsource their mind boggling information frameworks from nearby destinations to business open cloud. In any case, for security of information, touchy information must be scrambled before outsourcing, which succeeds system for conventional information use taking into account plaintext essential word seek. Considering the huge number of information clients also, archives in cloud, it is important for the inquiry administration to permit multiwatchword question and give result similitude positioning to meet the viable information recovery need. Recovering of all the records having questioned pivotal word won't be moderate in pay according to utilize cloud ideal model. In this paper, we propose the issue of Secured Multi-catchphrase look (SMS) over scrambled cloud information (ECD), and build a gathering of security approaches for such a safe cloud information use framework. From number of multi-essential word semantics, we select the very productive standard of direction coordinating, i.e., whatever number matches as could reasonably be expected, to distinguish the looseness between hunt question and information, and for further coordinating we utilize inward information correspondence to quantitatively formalize such guideline for similitude estimation. We first propose a fundamental Secured multi pivotal word positioned hunt plan utilizing secure inward item reckoning, and after that enhance it to meet diverse security prerequisites. The Ranked result gives top k recovery results. Additionally we propose an alarm framework which will create alarms when un-approved client tries to get to the information from cloud, the ready will create in the type of mail and message.

[1] NingCaoy, Cong Wangz, Ming Liy, KuiRenz, and WenjingLouyPrivacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
[2] Weifeng Su, Jiying Wang, and Frederick H. Lochovsky, Member, IEEE Computer Society Record Matching over Query Results from Multiple Web Databases
[3] Y.Srikanth,M.VeereshBabu, P.Narasimhulu Combined Keyword Search over Encrypted Cloud Data Providing Security and Confidentiality
[4] Cong Wang†, Ning Cao‡, Jin Li†, KuiRen†, and Wenjing Lou‡†Department of ECE, Illinois Institute of Technology, Chicago, IL 60616 ‡Department of ECE, Worcester Polytechnic Institute, Worcester, MA 01609 Secure Ranked Keyword Search over Encrypted Cloud Data
[5] A. Singhal, Modern information retrieval: A brief overview, IEEE Data Engineering Bulletin, vol. 24, no. 4, pp. 3543, 2001.
[6] R. Ananthakrishna, S. Chaudhuri, and V. Ganti, Eliminating Fuzzy Duplicates in DataWarehouses, Proc. 28th Intl Conf. Very Large Data Bases, pp. 586-597, 2002.
[7] R. Baeza-Yates and B. Ribeiro-Neto, Modern Information Retrieval. ACM Press,1999.
[8] I. H. Witten, A. Moffat, and T. C. Bell, Managing gigabytes: Compressing and indexing documents and images, Morgan Kaufmann Publishing, San Francisco, May 1999.
[9] E.-J. Goh, Secure indexes, Cryptology ePrint Archive, 2003,
[10] D. Song, D. Wagner, and A. Perrig, ―Practical techniques for searches on encrypted data, in Proc. of IEEE Symposium on Security and Privacy’00, 2000.

Encryption, Inner item similitude, Multi-watchword pursuit, positioning.