Keywords: Searchable Encryption, Multi-Catchphrase Positioned Seek, Dynamic Overhaul, Distributed Computing.

Size: px
Start display at page:

Download "Keywords: Searchable Encryption, Multi-Catchphrase Positioned Seek, Dynamic Overhaul, Distributed Computing."

Transcription

1 ISSN Vol.05,Issue.24 September-2016, Pages: Cloud Data Encrypted on a Secure and Dynamic Multi-Keyword Search Ranking Scheme V.MADHU 1, G. VISWANATH 2 1 PG Scholar, Dept of CSE, Golden Valley Integrated Campus, JNTUA, A.P, India. 2 Assistant Professor, Dept of CSE, Golden Valley Integrated Campus, JNTUA, A.P, India. Abstract: Due to the expanding prominence of distributed computing, increasingly information proprietors are roused to outsource their information to cloud servers for extraordinary accommodation and decreased expense in information administration. Notwithstanding, touchy information ought to be scrambled before outsourcing for security necessities, which obsoletes information use like watchword based record recovery. In this paper, we display a protected multi-watchword positioned seek plan over encoded cloud information, which all the while bolsters dynamic overhaul operations like cancellation and insertion of records. In particular, the vector space model and the broadly utilized TF_IDF model are joined as a part of the record development and inquiry era. We build a unique tree-based list structure and propose an "Insatiable Depth-first Search" calculation to give productive multi-catchphrase positioned look. The safe knn calculation is used to scramble the list and inquiry vectors, and in the mean time guarantee precise importance score computation between encoded record and question vectors. With a specific end goal to oppose measurable assaults, apparition terms are added to the list vector for blinding list items. Because of the utilization of our exceptional tree-based file structure, the proposed plan can accomplish sub-direct pursuit time and manage the cancellation and insertion of records adaptably. Broad tests are directed to exhibit the effectiveness of the proposed plan. Keywords: Searchable Encryption, Multi-Catchphrase Positioned Seek, Dynamic Overhaul, Distributed Computing. I. INTRODUCTION Distributed computing has been considered as another model of big business IT base, which can arrange enormous asset of figuring, stockpiling and applications, and empower clients to appreciate universal, advantageous and on-interest system access to a common pool of configurable registering assets with extraordinary productivity and negligible financial overhead [1]. Pulled in by these engaging elements, both people and undertakings are persuaded to outsource their information to the cloud, rather than buying programming and equipment to deal with the information themselves. Regardless of the different favorable circumstances of cloud administrations, outsourcing delicate data, (for example, messages, individual wellbeing records, organization fund information, government archives, and so forth.) to remote servers brings protection concerns. The cloud administration suppliers (CSPs) that keep the information for clients may get to clients' delicate data without approval. A general way to deal with secure the information secrecy is to scramble the information before outsourcing [2]. Be that as it may, this will bring about a gigantic expense regarding information ease of use. For instance, the current methods on catchphrase based data recovery, which are generally utilized on the plaintext information, can't be specifically connected on the encoded information. Downloading every one of the information from the cloud and decode locally is clearly unrealistic. This paper proposes a protected tree-based pursuit plan over the scrambled cloud information, which underpins multi keyword positioned hunt and element operation on the record gathering. In particular, the vector space model and the generally utilized "term recurrence (TF) opposite record recurrence (IDF)" model are consolidated in the list development and question era to give multi keyword positioned seek. Keeping in mind the end goal to acquire high hunt productivity, we develop a tree-based list structure and propose a "Covetous Depth-first Search" calculation in view of this list tree. Because of the exceptional structure of our tree-based record, the proposed look plan can adaptably accomplish sub-straight inquiry time and manage the cancellation and insertion of archives. The protected knn calculation is used to scramble the record and inquiry vectors, and in the mean time guarantee exact importance score computation between encoded list and question vectors. To oppose distinctive assaults in various risk models, we develop two secure hunt conspires: the fundamental element multi-watchword positioned look (BDMRS) plan in the known ciphertext model, and the improved element multicatchphrase positioned seek (EDMRS) plan in the known foundation model. Our commitments are compressed as takes after: 2016 IJSETR. All rights reserved.

2 We outline a searchable encryption conspire that backings both the precise multi-catchphrase positioned seek and adaptable element operation on archive accumulation. Due to the unique structure of our tree-based list, the inquiry many-sided quality of the proposed plan is on a very basic level kept to logarithmic. What's more, by and by, the proposed plan can accomplish higher inquiry effectiveness by executing our "Ravenous Depth-first Search" calculation. Additionally, parallel hunt can be adaptably performed to advance decrease the time expense of pursuit procedure. II. RELATED WORK Searchable encryption plans empower the customers to store the encoded information to the cloud and execute watchword look over ciphertext area. Because of various cryptography primitives, searchable encryption plans can be developed utilizing open key based cryptography [5], [6] or symmetric key based cryptography [7], [8], [9], [10]. Tune et al. [7] proposed the main symmetric searchable encryption (SSE) plan, and the hunt time of their plan is direct to the span of the information gathering. Goh [8] proposed formal security definitions for SSE and planned a plan in view of Bloom channel. The hunt time of Goh's plan is O (n), where n is the cardinality of the report gathering. Curtmola et al. [10] proposed two plans (SSE-1 and SSE-2) which accomplish the ideal inquiry time. Their SSE-1 plan is secure against picked catchphrase assaults (CKA1) and SSE-2 is secure against versatile picked watchword assaults (CKA2). These early works are single catchphrase boolean hunt plans, which are exceptionally straightforward as far as usefulness. Multi-watchword boolean hunt permits the clients to include numerous question catchphrases to ask for appropriate archives. Among these works, conjunctive watchword seek plans [5], [6], [7] just give back the reports that contain the greater part of the inquiry catchphrases. Disjunctive watchword seek plans [8], [9] give back the greater part of the records that contain a subset of the inquiry catchphrases. Predicate look plans [1], [2], [3] are proposed to bolster both conjunctive and disjunctive hunt. All these multikeyword seek plans recover list items taking into account the presence of catchphrases, which can't give satisfactory result positioning usefulness. Positioned inquiry can empower speedy pursuit of the most important information. Sending back just the top-k most important reports can successfully diminish system activity. Some early works [3], [4], [5] have understood the positioned look utilizing request saving systems, however they are outlined just for single catchphrase hunt. Cao et al. [6] understood the principal protection saving multi-watchword positioned seek plan, in which records and inquiries are spoken to as vectors of word reference size. With the "direction coordinating", the archives are positioned by number of coordinated question catchphrases. In any case, Cao et al's. plan does not consider the significance of the distinctive watchwords, and in this way is not sufficiently exact. What's more, the inquiry effectiveness V.MADHU, G. VISWANATH of the plan is direct with the cardinality of report gathering. Sun et al. [7] exhibited a safe multi-watchword seek conspire that backings closeness based positioning. The creators built a searchable file tree in light of vector space display and received cosine measure together with TF IDF to give positioning results. Sun et al's. pursuit calculation accomplishes superior to anything direct inquiry productivity however brings about accuracy misfortune. O rencik et al. [8] proposed a protected multi-watchword seek technique which used neighborhood touchy hash (LSH) capacities to group the comparable archives. The LSH calculation is reasonable for comparable hunt however can't give accurate positioning. In [9], Zhang et al. proposed a plan to manage secure multi-catchphrase positioned seek in a multiproprietor model. In this plan, distinctive information proprietors use diverse mystery keys to scramble their reports and catchphrases while approved information clients can question without knowing keys of these distinctive information proprietors. The creators proposed an "Added substance Order Preserving Function" to recover the most III. PROBLEM FORMULATION A. Notations and Preliminaries W The word reference, to be specific, the arrangement of catchphrases, signified as W = {w1,w2,..,wm}. m The aggregate number of watchwords in W. Wq The subset of W, speaking to the watchwords in the inquiry. F The plaintext archive accumulation, meant as a gathering of n records F = {f1, f2,..,fn}. Every archive f in the gathering can be considered as an arrangement of catchphrases. n The aggregate number of archives in F. C The scrambled record accumulation put away in the cloud server, indicated as C = {c1,c2,..,cn}. T The decoded type of list tree for the entire record gathering F. I The searchable scrambled tree file produced from T. Q The inquiry vector for catchphrase set Wq. TD The encoded type of Q, which is named as trapdoor for the pursuit demand. Du The record vector put away in tree hub u whose measurement equivalents to the cardinality of the lexicon W. Note that the hub u can be either a leaf hub or an interior hub of the tree. Iu The scrambled type of Du A. Vector Space Model and Relevance Score Function. Vector space model alongside TF IDF tenet is generally utilized as a part of plaintext data recovery, which productively bolsters positioned multi-catchphrase look [4]. Here, the term recurrence (TF) is the quantity of times a given term (watchword) shows up inside a record, and the converse archive recurrence (IDF) is acquired through separating the cardinality of report accumulation by the quantity of records containing the catchphrase. In the vector space demonstrate, every archive is indicated by a vector, whose components are the standardized TF estimations of

3 Cloud Data Encrypted on a Secure and Dynamic Multi-Keyword Search Ranking Scheme catchphrases in this report. Every inquiry is additionally signified as a vector Q, whose components are the standardized IDF estimations of question catchphrases in the archive gathering. Actually, the lengths of both the TF vector and the IDF vector are equivalent to the aggregate number of catchphrases, and the dab result of the TF vector Du and the IDF vector Q can be ascertained to measure the pertinence between the question and comparing report. Taking after are the documentations utilized as a part of our significance assessment capacity: Nf;wi The quantity of catchphrase wi in archive f. N The aggregate number of reports. Nwi The quantity of archives that contain watchword wi. TF f;wi The TF estimation of wi in record f. IDF wi The IDF estimation of wi in record gathering. TFu;wi The standardized TF estimation of watchword wi put away in record vector Du. IDFwi The standardized IDF estimation of watchword wi in archive accumulation. The relevance evaluation function is defined as: 1. Data owner has a collection of documents F ={f1,f2,..,fn} that he needs to outsource to the cloud server in encoded structure while as yet keeping the ability to hunt on them down viable use. In our plan, the information proprietor firstly manufactures a protected searchable tree file I from record accumulation F, and afterward produces a scrambled archive gathering C for F. A short time later, the information proprietor outsources the encoded gathering C and the protected file I to the cloud server, and safely disperses the key data of trapdoor era (counting watchword IDF values) and record unscrambling to the approved information clients. Plus, the information proprietor is in charge of the redesign operation of his reports put away in the cloud server. While upgrading, the information proprietor creates the overhaul data locally and sends it to the server. 2. Data users are approved ones to get to the reports of information proprietor. With t question catchphrases, the approved client can create a trapdoor TD as per pursuit control systems to get k encoded records from cloud server. At that point, the information client can decode the records with the common mystery key. (1) On the off chance that u is an inner hub of the tree, TFu,wi is figured from file vectors in the tyke hubs of u. On the off chance that the u is a leaf hub, TFu,wi is figured as: (2) 1. Keyword Balanced Binary Tree. The adjusted paired tree is broadly used to manage improvement issues [35], [36]. The watchword adjusted parallel (KBB) tree in our plan is a dynamic information structure whose hub stores a vector D. The components of vector D are the standardized TF values. Now and again, we allude the vector D in the hub u to Du for effortlessness. Formally, the hub u in our KBB tree is characterized as takes after: (3) Where ID indicates the personality of hub u, Pl and Pr are separately the pointers to one side and right offspring of hub u. On the off chance that the hub u is a leaf hub of the tree, FID stores the character of an archive, and D indicates a vector comprising of the standardized TF estimations of the watchwords to the record. On the off chance that the hub u is an inner hub, FID is set to invalid, and D signifies a vector comprising of the TF values which is ascertained as takes after: (4) The point by point development procedure of the tree-based file is shown in Section 4, which is indicated as Build Index Tree(F). B. The System and Threat Models The framework model in this paper includes three distinct elements: information proprietor, information client and cloud server, as delineated in Fig Cloud server stores the scrambled report accumulation C and the encoded searchable tree record I for information proprietor. After getting the trapdoor TD from the information client, the cloud server executes look over the record tree I, lastly gives back the comparing accumulation of top-k positioned scrambled reports. Also, after accepting the upgrade data from the information proprietor, the server needs to overhaul the list I and archive gathering C as per the got data. The cloud server in the proposed plan is considered as "legitimate yet inquisitive", which is utilized by loads of takes a shot at secure cloud information seek [5], [6], [7]. In particular, the cloud server sincerely and effectively executes directions in the assigned convention. In the interim, it is interested to induce and dissect got information, which helps it secure extra data. Contingent upon what data the cloud server knows, we embrace the two risk models proposed by Cao et al. [6]. 4. Known Ciphertext Model. In this model, the cloud server just knows the scrambled record gathering C, the searchable list tree I, and the hunt trapdoor TD presented by the approved client. That is to say, the cloud server can lead ciphertext-just assault (COA) [7] in this model. 5. Known Background Model. Contrasted and known ciphertext model, the cloud server in this more grounded model is outfitted with more information, for example, the term recurrence (TF) measurements of the record gathering. This measurable data records what number of reports are there for every term recurrence of a particular watchword in the entire archive gathering, as appeared in Fig.1, which could be utilized as the catchphrase character. Outfitted with such factual data, the cloud server can lead TF measurable assault to conclude or even recognize certain watchwords through examining histogram and worth scope of the relating recurrence circulations [4], [5],[7].

4 V.MADHU, G. VISWANATH (trapdoors) are produced from the same inquiry demand. Keyword Privacy: The cloud server couldn't recognize the particular catchphrase in question, file or report accumulation by breaking down the factual data like term recurrence. Note that our proposed plan is not intended to ensure access design, i.e., the grouping of returned records. Fig.1. The Architecture of Ranked Search over Encrypted Cloud Data. IV. THE PROPOSED SCHEMES In this area, we firstly depict the decoded dynamic multicatchphrase positioned seek (UDMRS) scheme which is built on the premise of vector space model and KBB tree. Taking into account the UDMRS plan, two secure inquiry plans (BDMRS and EDMRS plans) are developed against two risk models, separately. Fig.2. Distribution of Term Frequency (TF) for (a) Keyword Subnet, and (b) Keyword Host C. Design Goals To empower secure, productive, exact and dynamic multi keyword positioned seek over outsourced scrambled cloud information under the above models, our framework has the accompanying configuration objectives. 1. Dynamic: The proposed plan is intended to give not just multi-watchword inquiry and precise result positioning, additionally dynamic overhaul on archive accumulations. 2. Search Efficiency: The plan means to accomplish sub linear seek effectiveness by investigating an exceptional treebased list and a productive pursuit calculation. 3. Privacy-Preserving: The plan is intended to keep the cloud server from taking in extra data about the report accumulation, the file tree, and the question. The particular protection necessities are compressed as takes after, D. Index Confidentiality and Query Confidentiality The basic plaintext data, incorporating watchwords in the list and inquiry, TF estimations of catchphrases put away in the list, and IDF estimations of question catchphrases, ought to be shielded from cloud server. Trapdoor Unlinkability: The cloud server ought not have the capacity to figure out if two encoded questions A. Index Construction of UDMRS Scheme In Section 3, we have quickly presented the KBB file tree structure, which helps us in presenting the list development. During the time spent file development, we first produce a tree hub for every archive in the gathering. These hubs are the leaf hubs of the record tree. At that point, the interior tree hubs are produced based on these leaf hubs. The formal development procedure of the file is introduced in Algorithm 1. A case of our file tree is appeared in Fig. 3. Note that the file tree T worked here is a plaintext. Following are a few documentations for Algorithm 1. Also, the information structure of the tree hub is characterized as ID;D; Pl; Pr; FID, where the unique identity ID for each tree node is generated through the function GenID(). CurrentNodeSet The arrangement of current preparing hubs which have no guardians. On the off chance that the quantity of hubs is even, the cardinality of the set is signified as 2h(h Z+), else the cardinality is denoted as (2h + 1). TempNodeSet The arrangement of the recently produced nodes. In the record, if Du[i] 0 for an interior hub u, there is no less than one way from the hub u to some leaf, which shows a report containing the watchword wi. Likewise, Du[i] dependably stores the greatest standardized TF estimation of wi among its tyke hubs. Consequently, the conceivable biggest significance score of its youngsters can be effectively evaluated. V. CONCLUSION AND FUTURE WORK In this paper, a protected, proficient and dynamic hunt plan is proposed, which underpins the precise multi-catchphrase positioned seek as well as the dynamic cancellation and insertion of reports. We develop an extraordinary watchword adjusted double tree as the list, and propose an "Avaricious Depth-first Search" calculation to get preferable productivity over straight inquiry. Likewise, the parallel pursuit procedure can be completed to assist lessen the time cost. The security of the plan is ensured against two danger models by utilizing the protected knn calculation. Exploratory results show the productivity of our proposed plan. There are still numerous test issues in symmetric SE plans. In the proposed plan, the

5 Cloud Data Encrypted on a Secure and Dynamic Multi-Keyword Search Ranking Scheme information proprietor is in charge of producing overhauling data and sending them to the cloud server. In this manner, the information proprietor needs to store the decoded record tree and the data that are important to recalculate the IDF values. Such a dynamic information proprietor may not be exceptionally appropriate for the distributed computing model. It could be an important however troublesome future work to outline an element searchable encryption conspire whose upgrading operation can be finished by cloud server just, then holding the capacity to bolster multi-watchword positioned seek. Also, as the vast majority of works about searchable encryption, our plan mostly considers the test from the cloud server. Really, there are numerous protected difficulties in a multi-client plan. Firstly, every one of the clients ordinarily keep the same secure key for trapdoor era in a symmetric SE plan. For this situation, the disavowal of the client is enormous test. On the off chance that it is expected to deny a client in this plan, we have to modify the record and disseminate the new secure keys to all the approved clients. Furthermore, symmetric SE plots for the most part expect that every one of the information clients are reliable. It is not handy and an unscrupulous information client will prompt numerous safe issues. For instance, an exploitative information client may seek the records and disseminate the decoded reports to the unapproved ones. Considerably more, an unscrupulous information client may appropriate his/her protected keys to the unapproved ones. Later on works, we will attempt to enhance the SE plan to handle these test issues. VI. REFERENCES [1]K. Ren, C.Wang, Q.Wang et al., "Security challenges for people in general cloud," IEEE Internet Computing, vol. 16, no. 1, pp , [2]S. Kamara and K. Lauter, "Cryptographic distributed storage," in Financial Cryptography and Data Security. Springer, 2010, pp [3]C. Upper class, "A completely homomorphic encryption plan," Ph.D. paper, Stanford University, [4]O. Goldreich and R. Ostrovsky, "Programming assurance and recreation on absent rams," Journal of the ACM (JACM), vol. 43, no. 3, pp , [5]D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, "Open key encryption with catchphrase look," in Advances in Cryptology-Eurocrypt Springer, 2004, pp [6]D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. Skeith III, "Open key encryption that permits pir inquiries," in Advances in Cryptology-CRYPTO Springer, 2007, pp [7]D. X. Melody, D. Wagner, and A. Perrig, "Pragmatic procedures for quests on encoded information," in Security and Privacy, S&P Procedures IEEE Symposium on. IEEE, 2000, pp [8]E.- J. Goh et al., "Secure files." IACR Cryptology eprint Archive, vol. 2003, p. 216, [9]Y.- C. Chang and M. Mitzenmacher, "Protection safeguarding catchphrase looks on remote encoded information," in Proceedings of the Third universal meeting on Applied Cryptography and Network Security. Springer- Verlag, 2005, pp [10]R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: enhanced definitions and proficient developments," in Proceedings of the thirteenth ACM meeting on Computer and correspondences security. ACM, 2006, pp Author s Profile: V. Madhu is currently PG scholar of CSE in Golden Valley Integrated Campus, Madanapalli, Chittoor (Dist), Affiliated to JNTU Anantapur. G.Viswanath working as Assistant Professor in the department of CSE at Golden Valley Integrated Campus, Madanapalli, Chittoor (Dist), Affiliated to JNTU Anantapur.

Ranked Search over Encrypted Cloud Data using Multiple Keywords

Ranked Search over Encrypted Cloud Data using Multiple Keywords Ranked Search over Encrypted Cloud Data using Multiple Keywords [1] Nita Elizabeth Samuel, [2] Revathi B. R, [3] Sangeetha.M, [4] SreelekshmySelvin, [5] Dileep.V.K [1][2][3][4] LBS Institute of Technology

More information

MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD

MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD A.Shanthi 1, M. Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana Bharathi

More information

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud , pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab

More information

MULTI KEYWORD SECURED RANKING FOR AN ENCRYPTED CLOUD DATA

MULTI KEYWORD SECURED RANKING FOR AN ENCRYPTED CLOUD DATA MULTI KEYWORD SECURED RANKING FOR AN ENCRYPTED CLOUD DATA P.S.S Kiranmai 1, B. Narsimha 2 1 Pursuing M.Tech (CSE), 2 Working as Associate Professor (CSE) Holy Mary Institute of Technology and Science(HITS),

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

Assuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data

Assuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data Assuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data CH. Keerthi prathyusha Department of Computer Science and Engineering, JNTUA College of Engineering, Anantapuramu,

More information

How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)

How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse) JJT-029-2015 SEARCHABLE SYMMETRIC ENCRYPTION METHOD FOR ENCRYPTED DATA IN CLOUD P.Vidyasagar, R.Karthikeyan, Dr.C.Nalini M.Tech Student, Dept of CSE,Bharath University, Email.Id: vsagarp@rediffmail.com

More information

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer

More information

Secure semantic based search over cloud

Secure semantic based search over cloud Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,

More information

Security over Cloud Data through Encryption Standards

Security over Cloud Data through Encryption Standards Security over Cloud Data through Encryption Standards Santhi Baskaran 1, Surya A 2, Stephen Pius C 3, Sudesh Goud G 4 1 Professor, 2,3,4 Student, Department of Information Technology, Pondicherry Engineering

More information

Enabling Protection and Well-Organized MRSE over Encrypted Cloud Data Using CP-ABE

Enabling Protection and Well-Organized MRSE over Encrypted Cloud Data Using CP-ABE Enabling Protection and Well-Organized MRSE over Encrypted Cloud Data Using CP-ABE Revathy B.D #1, Tejaswini.B #2, Abstract By means of the new arrival of cloud computing, data proprietors are provoked

More information

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,

More information

Seclusion Search over Encrypted Data in Cloud Storage Services

Seclusion Search over Encrypted Data in Cloud Storage Services Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information

Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data

Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, Email: {ncao, mingli,

More information

SECURE VARIOUS-KEYWORD STRATIFIED SEARCH THROUGH ENCRYPTED DATA IN CLOUD

SECURE VARIOUS-KEYWORD STRATIFIED SEARCH THROUGH ENCRYPTED DATA IN CLOUD SECURE VARIOUS-KEYWORD STRATIFIED SEARCH THROUGH ENCRYPTED DATA IN CLOUD 1 SK. MASTAN, 2 RADHA 1 M.Tech Student, Department of CSE, Malla Reddy College of Engineering, Dulapally(v), Medchal(m), RangaReddy(d),

More information

A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications

A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications Wei Song 1,2, Yihui Cui 2, and Zhiyong Peng 1,2(B) 1 State Key Laboratory of Software Engineering, Wuhan University, Wuhan,

More information

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES 1 MANJOORULLASHA SHAIK, 2 SYED.ABDULHAQ, 3 P.BABU 1 PG SCHOLAR, CSE (CN), QCET, NELLORE 2,3 ASSOCIATE PROFESSOR, CSE, QCET, NELLORE

More information

Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing

Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie 3 Department of ECE, Stevens Institute of Technology, Hoboken,

More information

Facilitating Efficient Encrypted Document Storage and Retrieval in a Cloud Framework

Facilitating Efficient Encrypted Document Storage and Retrieval in a Cloud Framework IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. IV (Sep Oct. 2014), PP 18-24 Facilitating Efficient Encrypted Document Storage and Retrieval

More information

Privacy-Preserving Data Outsourcing in Cloud Computing

Privacy-Preserving Data Outsourcing in Cloud Computing IJCST Vo l. 4, Is s u e Sp l - 4, Oc t - De c 2013 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Privacy-Preserving Data Outsourcing in Cloud Computing Ch.Srinivas Dept. of CSE, SIR CRR College of

More information

Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE

Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE I.J. Wireless and Microwave Technologies, 2015, 6, 19-25 Published Online November 2015 in MECS(http://www.mecs-press.net) DOI: 10.5815/ijwmt.2015.06.03 Available online at http://www.mecs-press.net/ijwmt

More information

Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data

Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Ning Cao, Cong Wang, Ming Li, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, Email: {ncao, mingli,

More information

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

Security Saving Open Examining for Secure Cloud storage

Security Saving Open Examining for Secure Cloud storage ISSN (Online): 2349-7084 GLOBAL IMPACT FACTOR 0.238 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING IN RESEARCH TRENDS VOLUME 1, ISSUE 3, SEPTEMBER 2014, PP 131-136 Security Saving Open Examining for Secure

More information

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD

A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD A FRAMEWORK FOR SECURE ACCESS OF HEALTH DATA WITH AUDIT ABILITY IN CLOUD Ch. Kousalya Devi 1, B Dada Khalande 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana Bharathi

More information

Keyword Search over Shared Cloud Data without Secure Channel or Authority

Keyword Search over Shared Cloud Data without Secure Channel or Authority Keyword Search over Shared Cloud Data without Secure Channel or Authority Yilun Wu, Jinshu Su, and Baochun Li College of Computer, National University of Defense Technology, Changsha, Hunan, China Department

More information

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy

More information

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,

More information

Query Services in Cost Efficient Cloud Using Query Analysis

Query Services in Cost Efficient Cloud Using Query Analysis Query Services in Cost Efficient Cloud Using Query Analysis VanthanaPriya.J 1, ArunKumar.B 2 PG Scholar, Department of CSE, Karpagam University, Coimbatore, Tamil nadu, India 1 Assistant Professor, Department

More information

A study on keyword searchable frameworks for efficient data utilization in cloud storage

A study on keyword searchable frameworks for efficient data utilization in cloud storage A study on able frameworks for efficient data utilization in cloud storage Bhagyashree M V 1, Pushpalatha M N 2 1 Student, Dept. of ISE, M S Ramaiah institute of technology, Karnataka, India 2Asst. professor,

More information

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD

More information

K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT

K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT Journal homepage: www.mjret.in K-NN CLASSIFICATION OVER SECURE ENCRYPTED RELATIONAL DATA IN OUTSOURCED ENVIRONMENT Akshay Dabi, Arslan Shaikh, Pranay Bamane, Vivek Thorat, Prof.Popat Borse. Computer Engineering.

More information

Selective dependable storage services for providing security in cloud computing

Selective dependable storage services for providing security in cloud computing Selective dependable storage services for providing security in cloud computing Gade Lakshmi Thirupatamma*1, M.Jayaram*2, R.Pitchaiah*3 M.Tech Scholar, Dept of CSE, UCET, Medikondur, Dist: Guntur, AP,

More information

Iaas for Private and Public Cloud using Openstack

Iaas for Private and Public Cloud using Openstack Iaas for Private and Public Cloud using Openstack J. Beschi Raja, Assistant Professor, Department of CSE, Kalasalingam Institute of Technology, TamilNadu, India, K.Vivek Rabinson, PG Student, Department

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

Keywords: cloud computing, multiple keywords, service provider, search request, ranked search

Keywords: cloud computing, multiple keywords, service provider, search request, ranked search Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on

More information

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING

AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept

More information

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor

More information

Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics

Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics 577 Hitachi Review Vol. 63 (2014),. 9 Featured Articles Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics Ken Naganuma Masayuki Yoshino, Ph.D. Hisayoshi Sato, Ph.D. Yoshinori

More information

Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud

Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the Cloud Bing Wang Shucheng Yu Wening Lou Y. Thomas Hou Virginia Polytechnic Institute and State University, Blacksburg, VA, USA University

More information

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,

More information

Efficient Multi-keyword Ranked Search over Outsourced Cloud Data based on Homomorphic Encryption

Efficient Multi-keyword Ranked Search over Outsourced Cloud Data based on Homomorphic Encryption Efficient Multi-keyword Ranked Search over Outsourced Cloud Data based on Homomorphic Encryption Mengxi Nie 1,2, Peng Ran 1 and HaoMiao Yang 1,2 1 University of Electronic Science and Technology of China,

More information

To Provide Security & Integrity for Storage Services in Cloud Computing

To Provide Security & Integrity for Storage Services in Cloud Computing To Provide Security & Integrity for Storage Services in Cloud Computing 1 vinothlakshmi.s Assistant Professor, Dept of IT, Bharath Unversity, Chennai, TamilNadu, India ABSTRACT: we propose in this paper

More information

Cryptographic Data Security over Cloud

Cryptographic Data Security over Cloud Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.

More information

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage 1 A. MsVaishali Patil, 2 B. Prof. Archana Lomte Dept of Computer,BSIOTR, Pune ABSTRACT Cloud computing is speculated

More information

Guntur (Dt.) Andhra Pradesh, India

Guntur (Dt.) Andhra Pradesh, India Volume 5, Issue 10, October-2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Secure Multi-Owner

More information

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD Yerragudi Vasistakumar Reddy 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana

More information

Verifiable Symmetric Searchable Encryption for Multiple Groups of Users

Verifiable Symmetric Searchable Encryption for Multiple Groups of Users Verifiable Symmetric Searchable Encryption for Multiple Groups of Users Zachary A. Kissel and Jie Wang Department of Computer Science, University of Massachusetts Lowell, Lowell, MA, USA Abstract We present

More information

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------

More information

A Practical Security Framework for Cloud Storage and Computation

A Practical Security Framework for Cloud Storage and Computation A Practical Security Framework for Cloud Storage and Computation Kavya Premkumar 1 *, Aditya Suresh Kumar 1, Saswati Mukherjee 2 1The Department of Computer Science Engineering, Guindy, Chennai, India.

More information

A SURVEY ON USER REVOCATION IN THE PUBLIC CLOUD FOR SHARED DATA

A SURVEY ON USER REVOCATION IN THE PUBLIC CLOUD FOR SHARED DATA Journal homepage: www.mjret.in A SURVEY ON USER REVOCATION IN THE PUBLIC CLOUD FOR SHARED DATA Suryakant Kadam, Prof. Pankaj Agarkar Department of Computer Engineering, Savitribai Phule Pune University

More information

Secure Information Recovery for Decentralized Interruption Tolerant Defense Data Network

Secure Information Recovery for Decentralized Interruption Tolerant Defense Data Network Secure Information Recovery for Decentralized Interruption Tolerant Defense Data Network Korra Bichya Abstract-Portable nodes in military environments, for example, a front line or an antagonistic area

More information

Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing

Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing P. Naga Aswani, K. Chandra Shekar M. Tech Student, Associate Professor, CSE Dept. puduru.aswani@gmail.com,chandhra2k7@gmail.com

More information

Experiments in Encrypted and Searchable Network Audit Logs

Experiments in Encrypted and Searchable Network Audit Logs Experiments in Encrypted and Searchable Network Audit Logs Bhanu Prakash Gopularam Cisco Systems India Pvt. Ltd Nitte Meenakshi Institute of Technology Email: bhanprak@cisco.com Sashank Dara Cisco Systems

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment

Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment , pp.257-272 http://dx.doi.org/10.14257/ijsia.2014.8.1.24 Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment Sun-Ho Lee and Im-Yeong Lee 1 Department of Computer Software

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud

A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud A Survey Paper on Secure Auditing and Maintaining Block Level Integrity with Reliability of Data in Cloud Aishwarya R. Kumthekar 1, Prof. Jyoti Raghatwan 2 1 M.E. II Computer, aish275@gmail.com, 8806967523

More information

Privacy Preserving Public Auditing for Data in Cloud Storage

Privacy Preserving Public Auditing for Data in Cloud Storage Privacy Preserving Public Auditing for Data in Cloud Storage M.Priya 1, E. Anitha 2, V.Murugalakshmi 3 M.E, Department of CSE, Karpagam University, Coimbatore, Tamilnadu, India 1, 3 M.E, Department of

More information

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD

CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF DYNAMIC STORAGE ATTRIBUTES IN CLOUD Ravi Sativada 1, M.Prabhakar Rao 2 1 M.Tech Student, Dept of CSE, Chilkur Balaji

More information

Implementation of Data Sharing in Cloud Storage Using Data Deduplication

Implementation of Data Sharing in Cloud Storage Using Data Deduplication Implementation of Data Sharing in Cloud Storage Using Data Deduplication 1. M.JITHENDRA, 2. Dr. G.V.S.N.R.V. PRASAD M.S, Ph.D. 1. M.Tech, Department of CSE, Gudlavalleru Engineering College. 2. Professor

More information

Toward Privacy-Assured and Searchable Cloud Data Storage Services

Toward Privacy-Assured and Searchable Cloud Data Storage Services Toward Privacy-Assured and Searchable Cloud Data Storage Services Ming Li, Utah State University Shucheng Yu, University of Arkansas at Little Rock Kui Ren, University at Buffalo Wenjing Lou and Y. Thomas

More information

A SURVEY ON SECURE STORAGE TECHNIQUES IN CLOUD COMPUTING

A SURVEY ON SECURE STORAGE TECHNIQUES IN CLOUD COMPUTING A SURVEY ON SECURE STORAGE TECHNIQUES IN CLOUD COMPUTING T.lavanya Pg scholar, jayam college of engineering and technology, India Abstract: In this Review paper, it is intended to survey on several existing

More information

Secure Index Management Scheme on Cloud Storage Environment

Secure Index Management Scheme on Cloud Storage Environment Secure Index Management Scheme on Cloud Storage Environment Sun-Ho Lee and Im-Yeong Lee 1 Dept. of Computer Software Engineering, Soonchunhyang University, Korea 1 Dept. of Computer Software Engineering,

More information

Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee

Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee Inverted Index Based Multi-Keyword Public-key Searchable Encryption with Strong Privacy Guarantee Bing Wang Wei Song Wenjing Lou Y. Thomas Hou Virginia Polytechnic Institute and State University, Blacksburg,

More information

Professor Radha Poovendran EE Department, University of Washington, Seattle, WA & Professor Dawn Song EECS Department, University of California,

Professor Radha Poovendran EE Department, University of Washington, Seattle, WA & Professor Dawn Song EECS Department, University of California, Professor Radha Poovendran EE Department, University of Washington, Seattle, WA & Professor Dawn Song EECS Department, University of California, Berkeley, CA 1 Summer School Objectives Exposure to current

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

Distributing, Ensuring and Recovery of Data Stored in Cloud

Distributing, Ensuring and Recovery of Data Stored in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2

EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2 INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS Dokuri Sravanthi 1, P.Rupa 2 1 M.Tech Student, Dept of CSE, CMR Institute

More information

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION Akheel Mohammed 1, Dr.Vasumathi 2, Mir Ahmed Ali

More information

DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS

DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS Ankita N.Madde 1, Minal J. Joshi 2, Suchita Gutte 3, Sonal Asawa 4, # Prashant Jawalkar 5 1,2,3,4 UG Student, 5 Project Guide, Computer Dept.,

More information

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,

More information

Amalgam Attribute Based Encryption Scheme over the Cloud Data for Secure Access in the Hybrid Cloud Raj Priyadarshini. R 1 and Kanchanadevi.

Amalgam Attribute Based Encryption Scheme over the Cloud Data for Secure Access in the Hybrid Cloud Raj Priyadarshini. R 1 and Kanchanadevi. Amalgam Attribute Based Encryption Scheme over the Cloud Data for Secure Access in the Hybrid Cloud Raj Priyadarshini. R 1 and Kanchanadevi. P 2 1 Department Of Computer Science and Engineering, Alpha

More information

Cloud Data Storage Security and Public Auditing

Cloud Data Storage Security and Public Auditing A Meticulous Description of Applying Watermarking Technique for Secure Cloud Storage 1 M. Guresh, 2 R. Suresh 1 M.Tech 2 nd Year, Department of CSE, CREC Tirupati, AP, India 2 Professor & HOD, Department

More information

Searchable encryption

Searchable encryption RESEARCH MASTER S DEGREE IN COMPUTER SCIENCE Searchable encryption BIBLIOGRAPHICAL STUDY 26 January 2012 Tarik Moataz INTERNSHIP at Alcatel-Lucent Bell Labs Supervisors Cuppens Frédéric, SFIIS LabSTICC

More information

Development of Secure Multikeyword Retrieval Methodology for Encrypted Cloud Data

Development of Secure Multikeyword Retrieval Methodology for Encrypted Cloud Data Development of Secure Multikeyword Retrieval Methodology for Encrypted Cloud Data Deepak I M 1, K.R. Shylaja 2, Ravinandan M E 3 1 M.Tech IV Sem, Dept. of CSE, Dr. Ambedkar Institute of Technology, Bangalore,

More information

Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems

Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems S.Palani 1 E.Sujith 2 Poun Kumar.V 3 Assistant Professor MCA Scholar MCA Scholar Department of Master of Computer Applications Sri

More information

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS V. Anand 1, Ahmed Abdul Moiz Qyser 2 1 Muffakham Jah College of Engineering and Technology, Hyderabad, India 2 Muffakham Jah College

More information

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption

Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption 1 Thota Naresh Kumar, 2 K.SRINIVAS, 3 Y.Raju 2 Associate Professor, 3 Associate Professor 1,2,3 Department

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

A Searchable Encryption Scheme for Outsourcing Cloud Storage

A Searchable Encryption Scheme for Outsourcing Cloud Storage A Searchable Encryption Scheme for Outsourcing Cloud Storage Jyun-Yao Huang Department of Computer Science and Engineering National Chung Hsing University Taichung 402, Taiwan allen501pc@gmail.com I-En

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

How To Search Over Encrypted Cloud Data

How To Search Over Encrypted Cloud Data Xia et al. Journal of Cloud Computing: Advances, Systems and Applications 2014, 3:8 RESEARCH Open Access Secure semantic expansion based search over encrypted cloud data supporting similarity ranking Zhihua

More information

An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data

An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data , pp.323-332 http://dx.doi.org/10.14257/isia.2014.8.2.33 An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data Li Chen, Xingming Sun, *Zhihua Xia and Qi Liu

More information

SURVEY ON DISTRIBUTED DEDUPLICATION SYSTEM WITH AUDITING AND IMPROVED RELIABILITY IN CLOUD Rekha R 1, ChandanRaj BR 2

SURVEY ON DISTRIBUTED DEDUPLICATION SYSTEM WITH AUDITING AND IMPROVED RELIABILITY IN CLOUD Rekha R 1, ChandanRaj BR 2 SURVEY ON DISTRIBUTED DEDUPLICATION SYSTEM WITH AUDITING AND IMPROVED RELIABILITY IN CLOUD Rekha R 1, ChandanRaj BR 2 1 MTech, 4th Sem, Dept. Of Computer Science and Engineering EWIT, Bengaluru-91 2 Assistant

More information

Parallel and Dynamic Searchable Symmetric Encryption

Parallel and Dynamic Searchable Symmetric Encryption Parallel and Dynamic Searchable Symmetric Encryption Seny Kamara 1 and Charalampos Papamanthou 2 1 Microsoft Research, senyk@microsoft.com 2 UC Berkeley, cpap@cs.berkeley.edu Abstract. Searchable symmetric

More information

A Secure Decentralized Access Control Scheme for Data stored in Clouds

A Secure Decentralized Access Control Scheme for Data stored in Clouds A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University

More information

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA Mahammad Zennyfor Sulthana 1, Shaik Habeeba 2 1 M.Tech Student, Dept of CS

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730

More information

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant

More information