An Efficient Verification of Data Integrity and Keyword Search for Multi Data Owners by Preserving Privacy in Cloud

International Journal of Computer Trends and Technology (IJCTT)          
© 2018 by IJCTT Journal
Volume-59 Number-2
Year of Publication : 2018
Authors : Jincy Easow, Prof. Jisha P Abraham
DOI :  10.14445/22312803/IJCTT-V59P114


Jincy Easow, Prof. Jisha P Abraham "An Efficient Verification of Data Integrity and Keyword Search for Multi Data Owners by Preserving Privacy in Cloud". International Journal of Computer Trends and Technology (IJCTT) V59(2):85-89, May 2018. ISSN:2231-2803. Published by Seventh Sense Research Group.

Cloud is an emerging technology which is widely used today for various applications. By going day by day, the size of the data to be processed, stored, and manipulated also increases frequently. Such giant amount of data from various areas are necessary to store in a perfectly secured platform. It is impractical to maintain such huge amount of data in a single machine or hard disk. In such situation, cloud is the platform in which can store any amount of data. Major advantage of using cloud is that the stored data can be access by the users at anytime, anywhere and from any device. But security of the residing data is the major problem with the cloud. Due to this reason, most of the users are reluctant to outsource their documents to the cloud in spite of the benefits. This problem can be avoided by encrypt the data before outsource it to the cloud. By doing so, the security of the documents can be improved to a level best. While doing so, searching over the encrypted file is another problem faced by the users. The proposed system introduced a novel approach to search data over encrypted files without affecting the privacy and security of the file to be outsourced by multiple data owners. For the effective implementation of encrypted searching of data by using paillier homomorphic encryption algorithm, which provides the ability to make computations over the encrypted data without decryption.

[1] CongWang, Ning Cao, Jin Li, Kui Ren andWenjing Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data",in Proc. IEEE Distrib. Comput. Syst., Genoa, Italy, Jun. 2010, pp. 253-262.
[2] Anuradha Meharwade, G. A. Patil, “Efficient Keyword Search Over Encrypted Cloud data", International Conference on Information Security and Privacy, Dec. 2015, vol. 28, pp.37-73.
[3] Quin Liu, Guojun Wang and Jie Wuz, “Secure and Privacy Preserving Keyword Search on Encrypted Cloud Data", ELSEVIER Journel of Network and Computer Application, March 2011
[4] Wenhai Sun, Bing Wang, and Ning Cao,”Privacy Preserving Muli-Keyword Text Search in Cloud Supporting Similarity based Ranking", ACM Symposium on Information and Computer security, May 2013.
[5] Zhang Xu, W kang, Rin Li, K Yow and C Xu, “Efficient Multi-keyword Ranked Query on Encrypted Cloud Data", IEEE Int. Conf. Parallel Distribution System,vol. 25, pp. 222{233, December 2012.
[6] C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage", IEEE Trans. Comput., Feb 2013, pp. 10-12
[7] D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data", in Proc. IEEE Int. Symp. Security Privacy, Nagoya, Japan, vol. 52, no. 7, pp. 1218-1226, Jan. 2000.
[8] R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: Improved definitions and efficient constructions" in Proc. 13th ACM Conf. Comput. Commun. Security,Oct. 2006.
[9] Ayantika Chatterjee and Indranil Sengupta, “Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud", Commun. ACM, vol. 53, no. 3, pp. 97 - 105, Mar. 2010.
[10] F. Baldimtsi and O. Ohrimenko, “Sorting and searching behind the curtain," in Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers, 2015, pp. 127-146.
[11] Stuart Rose, Dave Engel, Nick Cramer and Wendy Cowley, "Automatic keyword extraction from individual documents", Research Gate Text Mining:Applications and Theory, Oct. 2017.
[12] Tanyaporn Sridokmai and Somchai Prakanchareon, "The Homomorphic Other Property of Paillier Cryptosystem", IEEE Int. Conf. Science and Technology, Jan. 2016.

Cloud Computing, Paillier Homomorphic Encryption.