Ijctt v9p116

Page 1

International Journal of Computer Trends and Technology (IJCTT) – volume 9 number 2– Mar 2014

Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data Juvairiya K P (Department of Computer Science & Engineering ,Shree Devi Institute Of Technology, Mangalore),

Rasheeda Z Khan ( Professor & HOD,Department of Information Science , Shree Devi Institute Of Technology, Mangalore)

ABSTRACT : Cloud computing has recently

Keywords - Cloud, data privacy, relevance

emerged as a new platform for deploying,

score, similarity relevance, homomorphic

managing, and provisioning large-scale services

encryption, vector space model

through an Internet-based infrastructure. However, concerns

of

cloud

I

Data

Cloud computing, a critical pattern for

encryption protects data security to some extent,

advanced data service, has become a necessary

but at the cost of compromised efficiency.

feasibility for data users to outsource data.

Searchable symmetric encryption (SSE) allows

Controversies on privacy, however, have been

retrieval of encrypted data over cloud. Here, focus

incessantly presented as outsourcing of sensitive

on addressing data privacy issues using SSE. For

Information including e-mails, health history and

the first time, formulate the privacy issue from the

personal photos is explosively expanding. Reports

aspect

of data loss and privacy breaches in cloud

potentially

of

sensitive information on cause

privacy

similarity

problems.

relevance

and

scheme

robustness. We observe that server-side ranking

Introduction

computing systems appear from time to time.

based on order-preserving encryption (OPE)

Cloud computing is a long dreamed vision

inevitably leaks data privacy. To eliminate the

of computing as a utility, where cloud customers

leakage,

searchable

can remotely store their data into the cloud as to

encryption (TRSE) scheme that supports top-k

enjoy the on-demand high-quality application and

multi keyword retrieval. In TRSE, employ a vector

services from a shared pool of configurable

space model and homomorphic encryption. The

computing resources. The main threat on data

vector space model helps to provide sufficient

privacy roots in the cloud itself. When users

search accuracy, and the homomorphic encryption

outsource their private data onto the cloud, the

enables users to involve in the ranking while the

cloud service providers are able to control and

majority of computing work is done on the server

monitor the data and the communication between

side by operations only on cipher text. As a result,

users and the cloud at will, lawfully or unlawfully

propose

a

two-round

information leakage can be eliminated and data security is ensured. Thorough analysis shows that

1.1

Existing System

proposed solution enjoys “as-strong-as possible” security guarantee compared to previous SSE

Besides, in order to improve feasibility

schemes, while correctly realizing the goal of

and save on the expense in the cloud paradigm, it is

keyword search. Extensive experimental results

preferred to get the retrieval result with the most

demonstrate the efficiency of the proposed solution.

relevant files that match users’ interest instead of

ISSN: 2231-2803

www.internationaljournalssrg.org

Page 72


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.