A New Method for Searching Keyword in Cloud Servers Using ANFIS
|
|
|
- Caroline Gilbert
- 9 years ago
- Views:
Transcription
1 Journal of mathematics and computer Science 11 (2014) A New Method for Searching Keyword in Cloud Servers Using ANFIS Fatemeh Goli Mirdamad Institute for Higher Education, Gorgan, Iran [email protected] Hossein Momeni Golestan University, Gorgan, Iran [email protected] Ali Yavari Sama technical and vocational training college, Islamic Azad University, Gorgan Branch, Gorgan, Iran [email protected] Article history: Received May 2014 Accepted June 2014 Available online July 2014 Abstract With the popularity of computing cloud in recent decade, sensitive information is stored in cloud systems. To protect the sensitive data before saving, cryptographic operation must be done. In cryptography with the traditional method the user can search its data with high security ability, but the disadvantage of this method is to enter the same items in data for searching. And there is not any virtual error for false type. This major weakness causes not to harmonize the alone mentioned method in searching on cloud servers. In this paper we solve the search problem of cloud encrypted words in light and fuzzy system with maintaining the data security. Its aim is to search in cases which there is not the user's possible errors be changed into the rules using a light and fuzzy network, and discussed with the use of neural network to learning the pattern of the server data, and when searching the network provides the closest option to the user. Our experimental results show that this method of diagnosis is above 90 percent in the scope of the written rules for fuzzy system. Keywords: cloud computing, fuzzy search, neural search, neuro-fuzzy, cryptography 1. Introduction With the popularity of computing cloud in recent decade sensitive information is stored in cloud systems. This information class contains s, medical records, governmental documents, etc. The responsibility for keeping the data owners from data physically is resolved with storing the data and they can enjoy keeping this service when being available. Yet, the data owners and cloud servers may not be too trusting. Owners may also be willing to share their information with certain users. The users also may want to search certain information. One of the methods for this is to select the search by keyword instead of searching all data in encrypted (such as Google). Unfortunately, encrypting data restrict searching by keywords in traditional method. Furthermore, keywords give brief information on the data that it is possible to endanger data security. Although encrypting the keywords can also make it more secure, the searching manner is like traditional methods. To enhance data security, encryption technique search has been in 300
2 past years [1] and [2]. In this method, a remarkable idea (i) with each keyword is considered that it is similar to extracting the features of the keyword, and is stored with the file of the keyword contents that this idea with keeping keywords information and main text can provide the search result. The above method must come the same keyword in the search field and there is not any virtual error for typing error like the words "office" that it was the users "office" or PO Box which it was P.O. Box. The presentation of a mechanism that it just checks the words from grammatical aspects cannot be an appropriate solution. For example, if a user type the word "house" it is correct from grammatical aspect, but in the sentence "go in my house" it is clear that the user has typed the word "house" false. Then grammar checking mechanism cannot be a good solution easily. A neurofuzzy can get a correct result with the correct combination of grammatical correction and the meaning understanding. In this paper we will use on searching the keywords in clause using neurofuzzy. In searching in neurofuzzy method in cases the user types the same item in Cloud, the result will be correct and when there is not the word in cloud, neurofuzzy network find the closest option with its seen trained models. The basis of the work is divided into several categories. Part 2 deals with the definitions, the basic concepts, the description of the system model and the description of the required background for implementation of this article. In part 3 we will collect and review the characteristics of the past works and we will express past problems. In part 4 we present the suggested approaches from the method of this article, and in part 5 we will evaluate our suggested approach. In part 6 the practical results are expressed and part 7 concludes the article. 2. Definitions and basic concepts 2.1. System model In this paper we have a cloud data system including data owner and the users from data and the server. C is the stored data set in the server (C= (F1, F2,.., FN)). And the keywords are W(W= (W1, W2,...,Wp)). The cloud server provides the searching service on the set C. The user types a topic from data and the server is responsible for writing the topic search with the set C and presenting data from the set to him. The fuzzy keyword explorer returns the close topics using the following rules. 1) If the user's the search term was exactly like the keywords W, then the Cloud server return the text associated with it. 2) If from the terms and Or use in searching, then the server returns the closest answer Security model Our assumption on an unreliable server in terms of data protection is information. It means that the server may reveal the other user's sensitive information in reply to searching a user. We will use from the previous security method [3] to protect the sensitive information Design aim Introducing new mechanism for creating the fuzzy keywords set designing an appropriate fuzzy searching set and the designed system validation Distance model There are several methods for grouping similar string. In the paper [4], the chahack distance [5-6] that we used from fuzzy optimization, the distance between w1 and w2 indicates with ed(w1, w2) and equals to the required operations to convert one of them instead of the other including three operations: First) Substitution: Changing characters to the other in words Second) Deleting: Deleting a character from the words 301
3 Third) Insertion: adding a character to the words for each search term the above three actions must continue to become d >ed(w, Wi). The amount of the number d is called simulation rate. We assume that there are the sets C, W and the d. The search string (K, W) is also accessible that K is the distance W from Wi. If w ϵ wi then return (FIDwi) Else if ed(w,wi)< d then return (FIDwi) Provided that ed (W,Wi)< min(k,d) 2.5. The adaptive neuro fuzzy inference system (ANFIS) The structure of fuzzy neural network is shown in figure Y. IN this figure, the output of the nodes of the first layer is the degree of linguistic variables. Typically, bell membership functions are used in the layer. The structure of Bell membership function is shown in this formula [7]: f(x) = exp [ 1 2 (x xi 2 1 ) ] bi 1 The second layer in fuzzy neural network is the law layer. The condition part of rules is calculated by the fuzzy operator of min, and the result is applied as the degree of law enforcement. Learning activities in this layer are done by changing the degree of law enforcement regarding the training data which are injected into the network. In the third layer of the linear combination, results rate law is used to determine the membership degree in a specific category. In the fourth layer, the Sigmund membership function is used. Network training vector is injected into the network based on the following relationship [8]: {(x k, y k ) k = 1,2,, K} Here xk refers to the kth pattern in input vector, then we will have: y k = { (1,0) ifxk belongstoclass 1 (0,1) ifx k belongstoclass 2 Fig. 1. Structure of fuzzy artificial neural network Error function for pattern K is calculated from the following equation. E k = 1 2 [(o 1 k y 1 k ) 2 + (o 2 k y 2 k ) 2 ] 302
4 Equation should be written here. Where YK and OK are the desire output and the calculated output, respectively. 3. Related Works The past works are divided into three categories: The search of the fuzzy keywords: in recent decade, the importance of the fuzzy search has taken into consideration. [9] and [10]. This group allows the user to use from the technique try and see based on the final estimation by the fuzzy system for finding the required term. Researchable encryption: Traditional researchable encryption [1], [2] and [3] is widely used in encrypted texts. The first encrypted search was done by song and his colleagues. [11] GA and the colleagues, [12] have used from bloom filter for extracting the idea from the original text. Chang [13] and Kartmola [3] have used from a kind of the index that corrected the idea table from the original text. Bonch and the colleagues used from a global key such as Sang's work and the colleagues. A remarkable point in the above work is to search on the basis of the same term. Other works: A private watch [15] widely uses from the solidarity factor between data for their searching. This method is used for watching two information sets with each other very much. Private information retrieval PIR [16] is another technique for reaching to information with high security. The use of the fuzzy system for finding the closest option also did by Li and the colleagues [4] by using the corrected distance between the searchable term and Cloud data in It presented the best results until now. The main problem for their method is very high closing for the exit winning number to making the fuzzy with each other increasing the error percent highly. At first we compare how the fuzzy keywords work on encrypted data. The encrypted function is like the following form: E k = 1 2 [(o 1 k y 1 k ) 2 + (o 2 k y 2 k ) 2 ] Where sk is the secret key and setup is secret algorithm with the Landa parameter and enc is encoder and dec is the encoder detector. Twi is to map the way of no return from Wi. This mapping can do these operations with the function f such as [1], p[2] and p[3]. With giving SK and Wi to the function f: Twi=f(SK,Wi) For every wi, we define a set of the fuzzy word d. this set is called Wi and contain all possible form that is d> (w,w')ed. For example, on the first characters from the set W=ray, all possible from for W equals to aay,bay, cay,..., zay. For making an index on Wi the data owner from a mapping with secret key sk use in Twi = f (sk,w'i) where sk share between the user and he. The data owner also encrypts FIDwi with the function ENC(sk, FIDwi). Then, the index Twi and ENC (sk, FIDwi) and the term W by the user, he computes the mapping W with the same Tw =f (sk,w) and send it to the server. Then, the server considers when sending the search term to the server mapping ed(w, W'i) for all W'i and selects the smallest and return ENC (sk,fidwi). Then the user decodes and uses this file. But there is a basic problem in the above method. For example, in English data with the length L for d=1 is the cases number W'i the same with changing the word which equals to 1 multiplies 26. and for d=2 in the cases with the change is L*26 and in the cases with two changing equals to (L(L+1)/2)*26^2 which is for d=2 altogether:26l+(l(l+1)/2)*26^2and for the word with the length 10 bits, the index forms are (26*
5 (SS*26*26)*10000*10=3Gbit and meanwhile the main text includes: 10000*10+97 kbit. Therefore, it is necessary to need a kind of the fuzzy keywords with less size. 4. Proposed approach To eliminate the size problem in fuzzy rules on one hand and the search system is better than to a neurofuzzy model. Hereinafter, our basic aim will be on two principles. First, it is the construction of the neurofuzzy system whenever the search term was different from the user's aim; it can give him the closest aim and second is to design a safe and useful search for the user. For this purpose, first, we assume that the set W contains the English lowercase, then the included keywords in the cloud.servers were encoded. Ski has an equivalent (sk + 97) to (sk + 122) with words using membership functions are fuzzy in figure 1. We use snorm for creating the fuzzy statement and the method snorm is an algebra sum. Fig. 1: Membership functions and language variables Now we must deal with writing the fuzzy rules. It forms a rule for every combined keyword. From creating every letter between its letters. For example, W=ray, all possible cases for w equal to *ray, r*ay, ra*y and ray*.for d=2 is L+(L(L+I)/2) altogether. And for words with the length 10 bits. The index cases numbers are (10+(ss))*10000*10= 6. 1Mbit and this method decrease the data sizes of the fuzzy system 500 times than that of before method. We can consider the following rule for every term sbz which it is the keyword encryption ray with sk=1: If s[0]=1 or s[1]=3 or s[2]=3 or then y=1 where y=1 is the exit fuzzy. In brief this rule is written Where 7 is the lack of the membership function. It can also be written sbz in the following forms:*sbz, s*bz, sb*z,sbz*. Where the four rules are in the following rule:{1, 3, 3, 7, 7, 7, 7, 7, 7, 7}, {1, 7, 3, 3, 7, 7, 7, 7, 7, 7},{1, 3, 7, 3, 7, 7, 7, 7, 7, 7}, {7, 1, 3, 3, 7, 7, 7, 7, 7, 7}. The inference engine used is the product motor with the minimum tnorm. We use from a creative method for non-fuzzy. The fuzzy statement prior to every group from the rules were computed which used from a range and divided by their numbers. So 5 groups of the number obtains from non-fuzzy of every range. We multiply these 5 groups by 50 to become the number which changes into binary 5 bits. Now, we turn into each number to the binary. Now, we bound outputs of each 5 bits into others bits to obtain a 25-bit number from each keyword string. Therefore each term accessible in Cloud server changes into 25 bits. Table1 shows converting 5 keywords daivid, paul, ray, benjamin, anderson is 25 bits. Table 1.Fuzzificationof 5 cloud server's data Name Grade XX a a a a a a a a a a a a a a a a a a a a a a
6 Now we use from a neural network with back propagation architecture with 25 input layers and 100 secret layers and 5 output layers. Among them 25 fuzzy input and output layers which obtained in the previous phase. 5 output layers are 5 fuzzy keywords as 10000=anderson, 01000=benjamin, 00100=ray, 00010=paul, 00001=daivid are saved. We consider the outputs in the following form (Table 2). Table2.Non-fuzzy of output Name Grade XX a a The network architecture is like Figure2. Fig. 2.Architecture of proposed neural network The number of the secret layer was selected in a trial and error method to find recognition and work percent maximum with high speed and the output layers were selected on the basis of experimental keyword numbers. During the learning process was modulated the number of secret layer nerves and learning coefficient and momentum coefficient to obtain the least amount of error and all errors were computed from the following relation: MSE = 1 2 (P(i, j) O(i, j)) 1 i k 1 j m Where O is a real output and P is an aim. The obtained results are observed from training the network from 72 epochs in table3. Table 3. Training results of network (72 epochs) Name Grade XX a a
7 The network is observed after finishing the training in epoch 94 which has learned the output model and the error rate is acceptable (Table 4). Table 4. The network after finishing the training in epoch 94 Name Grade XX a a Evaluating the proposed approach Now we must give the fuzzy data from the term into the network with updated weights to specify the outputs. For this purpose we have two data categories. First, the same exact data with the ones on cloud server to evaluate the made system. Second, different and close data with the server terms. For the first state we use the term search paul. It returns the result in table 5. Table 5.Searching the same term in the server (paul) Name Bmj 31 Npibnnbe 25 Iftbn 2 tbsb 23 ljbsbti 7 Grade And for state2, we do the search benja6amin which is a changed input from benjamin observed in table 6. The written strong neurofuzzy engine could search the use s term with keeping the security among the servers. Table 6.Search the changed term with the server Name Grade Bmj 31 Npibnnbe 25 Iftbn 2 tbsb 23 ljbsbti 7 6. Practical results Proposed methods in this paper implemented in c#.net language in the software Visual studio For testing the software performance after training the neural network with 5 keywords. 3 data groups have given for testing. The first group contained the same term in the server like paul 306
8 and the second group consisted of the terms with one different preposition like benja6min and the third one is the data with two or more difference like benja6mfin who the recognition results are observed in Table7. Table7. Recognition percent of data testy good 10 data 30 data 100 data The same term % 011 % % A difference % 01 % 09 % 09 Some difference % 01 % 02 % 02 It is observed that our system has been very good for one difference and the system is very weak for several differences. Its reason is not to write the relevant rules for some differences. With considering the full fuzzy seta including all rules. This percent must get over 90%. 7. Conclusion Searching in Cloud server has always been a basic challenge when the search term is different from the server data. In this paper a method presented to improve the done works in recent years using a neurofuzzy network until the system outputs of the fuzzy search is close together and the error percent was high using the neurofuzzy of back propagation deal with the learning model of the fuzzy output and suggest the closest option to the user. In written rule field for the fuzzy system, the correct recognition percent of this method is over 90%. As a future work, we can use the optimization algorithms such as particles-gathering algorithms to optimize the keyword search in Cloud servers. Reference [1] M. Bellare, A. Boldyreva, and A. O Neill, Deterministic and efficiently searchable encryption, in Proceedings of Crypto 2007, volume 4622 oflncs. Springer-Verlag, (2007). [2] F. Bao, R. Deng, X. Ding, and Y. Yang, Private query on encrypted data in multi-user settings, in Proc. of ISPEC 08, (2008). [3] R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proc. of ACM CCS 06, (2006). [4] Jin Li, Qian Wang, Cong Wang, Ning Cao, KuiRen, and Wenjing Lou. Fuzzy Keyword Search over Encrypted Data in Cloud Computing, (2010). [5] V. Levenshtein, Binary codes capable of correcting spurious insertions and deletions of ones, Problems of Information Transmission, vol. 1, no. 1, pp. 8 17, (1965). [6] B. Waters, D. Balfanz, G. Durfee, and D. Smetters, Building an encrypted and searchable audit log, in Proc. of 11th Annual Network and Distributed System, (2004). [7] J. M. Zurada, Introduction to artificial neural systems vol. 8: West publishing company New York ;,( 1992). [8] S. Mitra and Y. Hayashi, "Neuro-fuzzy rule generation: survey in soft computing framework," Neural Networks, IEEE Transactions on, vol. 11, pp , (2000). [9] C. Li, J. Lu, and Y. Lu, Efficient merging and filtering algorithms for approximate string searches, in Proc. of ICDE 08, (2008). [10] S. Ji, G. Li, C. Li, and J. Feng, Efficient interactive fuzzy keyword search, in Proc. of WWW 09, (2009). [11] D. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, in Proc. of IEEE Symposium on Security andprivacy 00, [12] E.-J. Goh, Secure indexes, Cryptology eprint Archive, Report2003/216, (2003), 307
9 [13] Y.-C. Chang and M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, in Proc. of ACNS 05, (2005). [14] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search, in Proc. of EUROCRYP 04, (2004). [15] J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss, and R. N.Wright, Secure multiparty computation of approximations, in Proc. Of ICALP 01. [16] R. Ostrovsky, Software protection and simulations on oblivious rams, Ph.D dissertation, Massachusetts Institute of Technology, (1992). 308
Key Laboratory of Computer Networks and Information Security Xidian University, Xi an, P.R. China e-mail: [email protected]
Computing and Informatics, Vol. 32, 2013, 723 738 EFFICIENT MULTI-USER KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING Jin Li Department of Computer Science, Guangzhou University Guangzhou, P.R.
Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing
Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing P. Naga Aswani, K. Chandra Shekar M. Tech Student, Associate Professor, CSE Dept. [email protected],[email protected]
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud
, pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab
Ranked Search over Encrypted Cloud Data using Multiple Keywords
Ranked Search over Encrypted Cloud Data using Multiple Keywords [1] Nita Elizabeth Samuel, [2] Revathi B. R, [3] Sangeetha.M, [4] SreelekshmySelvin, [5] Dileep.V.K [1][2][3][4] LBS Institute of Technology
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
Security over Cloud Data through Encryption Standards
Security over Cloud Data through Encryption Standards Santhi Baskaran 1, Surya A 2, Stephen Pius C 3, Sudesh Goud G 4 1 Professor, 2,3,4 Student, Department of Information Technology, Pondicherry Engineering
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining
An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer
How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)
JJT-029-2015 SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD P.Vidyasagar, R.Karthikeyan, Dr.C.Nalini M.Tech Student, Dept of CSE,Bharath University, Email.Id: [email protected]
Keywords: cloud computing, multiple keywords, service provider, search request, ranked search
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on
Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage
Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage 1 A. MsVaishali Patil, 2 B. Prof. Archana Lomte Dept of Computer,BSIOTR, Pune ABSTRACT Cloud computing is speculated
Assuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data
Assuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data CH. Keerthi prathyusha Department of Computer Science and Engineering, JNTUA College of Engineering, Anantapuramu,
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,
Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing
Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie 3 Department of ECE, Stevens Institute of Technology, Hoboken,
Experiments in Encrypted and Searchable Network Audit Logs
Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Cisco Systems India Pvt. Ltd Nitte Meenakshi Institute of Technology Email: [email protected] Sashank Dara Cisco Systems
Verifiable Symmetric Searchable Encryption for Multiple Groups of Users
Verifiable Symmetric Searchable Encryption for Multiple Groups of Users Zachary A. Kissel and Jie Wang Department of Computer Science, University of Massachusetts Lowell, Lowell, MA, USA Abstract We present
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Privacy-Preserving Data Outsourcing in Cloud Computing
IJCST Vo l. 4, Is s u e Sp l - 4, Oc t - De c 2013 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Privacy-Preserving Data Outsourcing in Cloud Computing Ch.Srinivas Dept. of CSE, SIR CRR College of
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud Bing Wang Shucheng Yu Wening Lou Y. Thomas Hou Virginia Polytechnic Institute and State University, Blacksburg, VA, USA University
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
A Searchable Encryption Scheme for Outsourcing Cloud Storage
A Searchable Encryption Scheme for Outsourcing Cloud Storage Jyun-Yao Huang Department of Computer Science and Engineering National Chung Hsing University Taichung 402, Taiwan [email protected] I-En
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, Email: {ncao, mingli,
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
A Practical Security Framework for Cloud Storage and Computation
A Practical Security Framework for Cloud Storage and Computation Kavya Premkumar 1 *, Aditya Suresh Kumar 1, Saswati Mukherjee 2 1The Department of Computer Science Engineering, Guindy, Chennai, India.
Facilitating Efficient Encrypted Document Storage and Retrieval in a Cloud Framework
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. IV (Sep Oct. 2014), PP 18-24 Facilitating Efficient Encrypted Document Storage and Retrieval
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES
SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES 1 MANJOORULLASHA SHAIK, 2 SYED.ABDULHAQ, 3 P.BABU 1 PG SCHOLAR, CSE (CN), QCET, NELLORE 2,3 ASSOCIATE PROFESSOR, CSE, QCET, NELLORE
Efficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Query Services in Cost Efficient Cloud Using Query Analysis
Query Services in Cost Efficient Cloud Using Query Analysis VanthanaPriya.J 1, ArunKumar.B 2 PG Scholar, Department of CSE, Karpagam University, Coimbatore, Tamil nadu, India 1 Assistant Professor, Department
Secure semantic based search over cloud
Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,
Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment
, pp.257-272 http://dx.doi.org/10.14257/ijsia.2014.8.1.24 Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment Sun-Ho Lee and Im-Yeong Lee 1 Department of Computer Software
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy
Searchable encryption
RESEARCH MASTER S DEGREE IN COMPUTER SCIENCE Searchable encryption BIBLIOGRAPHICAL STUDY 26 January 2012 Tarik Moataz INTERNSHIP at Alcatel-Lucent Bell Labs Supervisors Cuppens Frédéric, SFIIS LabSTICC
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Surveying Cloud Storage Correctness using TPA with BLS
Surveying Cloud Storage Correctness using TPA with BLS Priyanka Dehariya 1, Prof. Shweta Shrivastava 2, Dr. Vineet Richaraya 3 1 M.Tech Scholar (CSE), LNCT, Bhopal 2 Asst.Professors, (CSE Department),
Seclusion Search over Encrypted Data in Cloud Storage Services
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING
SHARED DATA & INDENTITY PRIVACY PRESERVING IN CLOUD AND PUBLIC AUDITING Er. Kavin M 1, Mr.J.Jayavel 2 1 PG Scholar, 2 Teaching Assistant, Department of Information Technology, Anna University Regional
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK
International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Data Integrity and Dynamic Storage Way in Cloud Computing
1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment
Feasibility Study of Searchable Image Encryption System of Streaming Service based on Cloud Computing Environment JongGeun Jeong, ByungRae Cha, and Jongwon Kim Abstract In this paper, we sketch the idea
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage
Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
A Survey on Cloud Computing Architectures for Healthcare
A Survey on Cloud Computing Architectures for Healthcare Pragnya Balamurukesan Department of Computer Engineering Dwarkadas J.Sanghvi College of Engineering, Mumbai,India Dr. Narendra M. Shekokar Head,
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
Parallel and Dynamic Searchable Symmetric Encryption
Parallel and Dynamic Searchable Symmetric Encryption Seny Kamara 1 and Charalampos Papamanthou 2 1 Microsoft Research, [email protected] 2 UC Berkeley, [email protected] Abstract. Searchable symmetric
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Index Terms : cloud computing, Distributed Storage, error detection, data recovery, SHA, dynamic block operations
Revisiting Secure Cloud Storage by Replacing Token Generation With SHA Ms. Bhagyashree Alhat (1), Prof. Amar Buchade(2) Pune Institute of Computer Technology, University of Pune,PG Student(1), Assistant
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing
Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud Computing Dr. T.Nalini 1, Dr.K.Manivannan 2,Vaishnavi Moorthy 3 1 Professor, Department
Private Record Linkage with Bloom Filters
To appear in: Proceedings of Statistics Canada Symposium 2010 Social Statistics: The Interplay among Censuses, Surveys and Administrative Data Private Record Linkage with Bloom Filters Rainer Schnell,
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
Search Result Optimization using Annotators
Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji
