Paper id 28201425

Page 1

International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 E-ISSN: 2321-9637

Secure Ranked Keyword Search Over Cloud Data MS. M. R. GIRME 1, PROF. G.M. BHANDARI 2 ME Computer Engg, 1, 2, JSPM’s BSIOTR, Wagholi, Pune-141, 2, Email: mayura.shelke@gmail.com1 Abstract- Now a day’s cloud computing becoming so popular due to attractive features of cloud, users are storing large amount of data on cloud storage, these data may be users personal or secret. After storing data user can access data any time without any burden of hardware and software. But outsourcing plaintext data is big risk in cloud. So to protect data privacy data has to be encrypted before outsourced to the cloud and also to retrieve the data files correctly, introducing ranked keyword search mechanisms. So, in this paper implementing ranked keyword search over outsourced cloud data. Index Terms- IAAS, OPSE, PAAS, RSSE, SAAS etc 1. INTRODUCTION Today the latest paradigm to emerge is that of Cloud computing provides reliable services delivered through data centers that are built on virtualized compute and storage technologies [1][2]. Cloud Computing becomes more sensitive information are being centralized into the cloud such as e-mails, personal health records, company finance data, and government documents, etc. The fact that data owners and cloud server are no longer in the same trusted domain may put the outsourced unencrypted data at risk the cloud server may be leak data information to unauthorized entities are hacked. Data encryption makes effective data utilization is a very challenging task. Besides, in Cloud Computing, data owners may share their outsourced data with a large number of users, who might want to only retrieve certain specific data files they are interested in during a given session Such keyword search technique allows users to selectively retrieve files of interest and has been widely applied in plain text search scenarios Unfortunately, data encryption, which restricts user’s ability to perform keyword search and further demands the protection of keyword privacy makes the traditional plaintext search methods fail for encrypted cloud data. 2. LITERATURE SURVEY We have done a survey on existing searching methods Practical Techniques for Searches on encrypted data (PTSED) [6], Secure Index (SI)[7] and Public key encryption (PKE)[8] and summarized with following characteristic [5]. We also compared this study with our proposed system. I.

Sequential approach

This method will find a particular keyword in a document, which will check for every one of its elements, and will display the search result one at a

time and in linear order and this will decrease the performance i.e for example Searching ”a[a-z]b” ,needs 26 queries. II. Document Index Storing a secure keyword index in cloud. This kind of index will allow a query to check if the documents contain a keyword and will retrieve the files. It will not search for the entire document based on index keyword will retrieve the documents that are especially useful for large documents and large document. III. Perform keywords filter Indexing of keyword contains unique keywords; it will not contain the duplicate keywords in index files. IV. Public Key authentication This kind of encryption will allow anyone to access the data in cloud, which is not efficient one. Table 1. System comparative analysis Characteristic PTSED

SI

PKE

Proposed System Not supported.

Sequential Approach

Yes

No

Yes

Document Index Keyword Filter Secret Key

No

Yes

No

Yes

No

Yes

No

Yes

Public

No

Public

Cloud computing

No

No

Yes

Private Yes

The following fig.1 shows the comparative analysis of different systems with proposed system. The proposed system satisfied most of the characteristics of existing system. .

39


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Paper id 28201425 by IJRAT - Issuu