International Journal of Computer Trends and Technology (IJCTT) – volume 9 number 2– Mar 2014
Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data Juvairiya K P (Department of Computer Science & Engineering ,Shree Devi Institute Of Technology, Mangalore),
Rasheeda Z Khan ( Professor & HOD,Department of Information Science , Shree Devi Institute Of Technology, Mangalore)
ABSTRACT : Cloud computing has recently
Keywords - Cloud, data privacy, relevance
emerged as a new platform for deploying,
score, similarity relevance, homomorphic
managing, and provisioning large-scale services
encryption, vector space model
through an Internet-based infrastructure. However, concerns
of
cloud
I
Data
Cloud computing, a critical pattern for
encryption protects data security to some extent,
advanced data service, has become a necessary
but at the cost of compromised efficiency.
feasibility for data users to outsource data.
Searchable symmetric encryption (SSE) allows
Controversies on privacy, however, have been
retrieval of encrypted data over cloud. Here, focus
incessantly presented as outsourcing of sensitive
on addressing data privacy issues using SSE. For
Information including e-mails, health history and
the first time, formulate the privacy issue from the
personal photos is explosively expanding. Reports
aspect
of data loss and privacy breaches in cloud
potentially
of
sensitive information on cause
privacy
similarity
problems.
relevance
and
scheme
robustness. We observe that server-side ranking
Introduction
computing systems appear from time to time.
based on order-preserving encryption (OPE)
Cloud computing is a long dreamed vision
inevitably leaks data privacy. To eliminate the
of computing as a utility, where cloud customers
leakage,
searchable
can remotely store their data into the cloud as to
encryption (TRSE) scheme that supports top-k
enjoy the on-demand high-quality application and
multi keyword retrieval. In TRSE, employ a vector
services from a shared pool of configurable
space model and homomorphic encryption. The
computing resources. The main threat on data
vector space model helps to provide sufficient
privacy roots in the cloud itself. When users
search accuracy, and the homomorphic encryption
outsource their private data onto the cloud, the
enables users to involve in the ranking while the
cloud service providers are able to control and
majority of computing work is done on the server
monitor the data and the communication between
side by operations only on cipher text. As a result,
users and the cloud at will, lawfully or unlawfully
propose
a
two-round
information leakage can be eliminated and data security is ensured. Thorough analysis shows that
1.1
Existing System
proposed solution enjoys “as-strong-as possible” security guarantee compared to previous SSE
Besides, in order to improve feasibility
schemes, while correctly realizing the goal of
and save on the expense in the cloud paradigm, it is
keyword search. Extensive experimental results
preferred to get the retrieval result with the most
demonstrate the efficiency of the proposed solution.
relevant files that match users’ interest instead of
ISSN: 2231-2803
www.internationaljournalssrg.org
Page 72