Efficient Privacy Preserving Clustering Based Multi Keyword Search

IRJET Journal
IRJET JournalFast Track Publications

https://irjet.net/archives/V4/i7/IRJET-V4I7418.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2000
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Shital Agrawal 1, Prof. Bharati Dixit2
1,2Department of Information Engineering, MIT College of Engineering.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Recently, cloudcomputingbecomemorepopular,
data owners shows their interest or prefer the cloud for
storing their personal data, by storing data intothecloudsave
the economical funds and gives the great flexibility. As
providing security to the data is the challenging task for the
researchers, for protecting the data sensitive data have to be
encoded before outsourcing the data. To accomplish the
privacy preserving effective search over encoded cloud
information this paper presents the hierarchical clustering
approach. Alongside this precise and proficient search over
outsourced information, security is additionally considered
with user revocation approach. Another more imperative
component of this framework is data duplication checking
with SHA1 hashing strategy. This strategy will not permit the
data owner to store the duplicate data at cloud server. By
using the data duplication technique memory overload is
reduce on cloud. In this framework for clustering process EM
clustering is used, and finally compare the EM clustering
algorithm with K-means clustering algorithm. Experimental
results demonstrate that the framework has numerous
advantages like efficient and effective memory and time
utilization, efficient and secure search over encrypted data,
secure data storage and data duplication checking.
Key Words: Cloud computing, cipher text search,
ranked search, multi-keyword search, hierarchical
clustering, big data, security.
1. INTRODUCTION
Now a days cloud computing becomes more interesting
methodology in differentapplicationslikeacademicsandthe
industries. Cloud computing has a number of features, for
example resource management, economical cost andsimple
and quick deployment. Due to the tremendous economic
advantages cloud computing, most of the organization
deployed their cloud centers. Such cloud centers are Elastic
Compute Cloud of Amazon, the App Engine of Google, the
Azure of Microsoft, and Blue Cloud of IBM. Despite the fact
that data is sometime sensitive information, for example,
personal records, financial records pass record and so on.,
because once the data is outsourced, owner can not directly
control the data. It is accessible online at some point. The
Cloud Service provider (CSP) can keep up the security of
such sensitive data by utilizing a few methods like fire ware,
virtualization, and Intrusion Detection System(IDS).Forthis
situation, CSP increases full control over such information.
But there is no guarantee or full trust on the representative
of CSP [1][10]. They can leak or alter the information.That is
they can uncover the sensitive data of data owners. So to
defeat the issue of security of outsource information,
information encryption is one of the best solutions.
The encryption system may have reinforced the data
security of cloud data; in any case it has additionally
corrupted the proficiency of the data on the groundsthatthe
encryption will decreases the search capacity of the data.
Especially in the cloud computing environment, it is illogical
for the customer to download and decrypt the entire
encoded data from the remote cloud server before a search
happens. Along these lines, an proficient plan that backings
search over encrypted informationincloudcomputingturns
out to be extremely noteworthy before much organization
can exploit the cloud storage [8][9].
Consistently, accessible encryption strategies have been
made to give the capacity to explicitly recovering the
encrypted reports through a keyword search. Typically,
these systems manufacture a protected index structure and
outsource it nearby the encoded records to the remote
server. Approved customers show their requests as secret
trapdoors that are coordinated legitimately with the stored
index data. The server uses the got trapdoor to discover the
put away file, and gets the coordinating encoded files [10].
Numerous analysts have created many cipher content
search framework by utilizing the cryptography strategies.
These procedures have demonstrated provable security,
however as they requests enormous operations and huge
complexity in time. Henceforth already composed systems
are not valuable for huge data where size of the data is huge
likewise it needs online data processing. Because of the
visually impaired encryption, important property has been
covered in the customary techniques. Along these lines,
proposing a technique which can keep up and use this
relationship to speed the search phase is desirable
Proposed system includes following points:
 Propose a clustering method to solveproblemof
maintaining the close relationship between
different plain documents over an encrypted
domain.
 Proposed theMRSE-HCIarchitecturetospeedup
server side searching phase.
 Design a search strategy to improve the rank
privacy.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2001
 Provide a verification mechanism to assure the
correctness and completeness of search results.
 Generate ranked top-k documents.
 Provide user revocation method for security.
To achieve above features and for better performance of
system, we have used following algorithms and
techniques in system.
 AES encryption algorithm and User revocation
method for Security
 EM clustering algorithm to enhance the clusters
generation accuracy.
 Hierarchical algorithm to generate clusters
hierarchically.
 SHA-1 algorithm for hashing
 Perform the data duplication operation for
checking the duplicate data.
In this paper study about the related work done, in
section II, the proposed approach modules description,
mathematical modeling, algorithm and expectedresultin
section III. And at final provide a conclusion in sectionIV.
2. LITERATURE REVIEW
Chen, Chi, et al.[1], a hierarchical clustering strategy is
proposed to support more search semanticsfurthermore
to meet the demand for fast cipher text search within a
big data environment. The proposed hierarchical
approach clusters the documents based on the minimum
relevance threshold and then partitions the resulting
clusters into sub-clusters until the constraint on the
maximum size of cluster is reached. In the search stage,
this methodology can achieve a linear computational
complexity against an exponential size increment of
document collection. All together to confirm the
authenticity of searchresults,a structurecalledminimum
hash sub-tree is designed.
Various well-known [2] authentication protocols are
considered with contextof nextgenerationmobileandCE
network services. The potential weaknesses of current
protocol scan be overcome utilizing Zero Knowledge
Proof (ZKP) strategies to ensure client passwords so an
alternative ZKP protocol, Se Di Ci 2.0, is depicted. This
offers mutual and also two-factor authentication that is
viewed as more secure against different phishing
endeavors than existing trusted outsider protocols. The
suitability of such a ZKP protocol for different CE-based
cloud computing applications is illustrated.
Wang et al. [3], characterize and solve the issue of
secure ranked keyword search over encrypted cloud data.
Ranked searchenormouslyupgradesframework usability by
enabling search result relevance ranking instead of sending
un differentiated results and further guarantees the file
retrieval accuracy. In particular, they investigate the
statistical measure approach, i.e., relevance score, fromdata
recovery to manufacture secure searchable index, and build
up a one-to-many order-preserving mapping strategy to
appropriately secure those sensitive score data. The
resulting design is able to facilitate efficient server-side
ranking without losing keyword privacy.
Pang et al. [4], presenta privacy-preserving,similarity-based
text retrieval scheme that preventstheserverfromprecisely
reproducing the term composition of queries and
documents, and anonymize the search results from
unauthorized observers. In the meantime, their plan
preserves the relevance-ranking of the search server, and
empowers accounting of the number of documents that
every client opens. The effectiveness of the scheme is
verified empirically with two real text corpora.
Cao et al. [5], interestingly, authors characterize and tackle
the challenging issue of privacy-preserving multi-keyword
ranked search over encrypted information in cloud
computing (MRSE). They build up a set of strict privacy
requirements for for such a secure cloud information usage
framework. Among different multi-keywordsemantics,they
choose the proficient similarity measure of “coordinate
matching,” i.e., whatever number matches as possible, to
capture the relevance of datadocumentstothesearchquery.
They further utilize “inner product similarity” to
quantitatively assess such similarity measure. They first
propose a fundamental thought for the MRSE based on
secure inner product computation, and after that give two
essentially enhanced MRSE plans to accomplish different
stringent privacy requirements in two distinctive threat
models.
Sun et al. [6], authors present a privacy-preserving multi-
keyword text search (MTS) theme with similarity-based
ranking to address this issue. To support multi-keyword
search and search result ranking, they propose to create the
search index based on term frequency and also the vector
area model with cosine similarity live to attainhighersearch
result accuracy. To enhance the search efficiency, they
propose a tree-based index structure and numerous
adaption ways for multi-dimensional (MD) algorithmic rule
so the sensible search efficiency is way higher than that of
linear search. To further enhance the search privacy, they
propose two secure index schemes to fulfill the stringent
privacy needs under strong threat models,i.e.,knowncipher
text model and known background model.
Chen et al. [7], a hierarchical clustering technique for cipher
text search within a big data environment is proposed. The
proposed approach clusters the documents based on the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2002
minimum similarity threshold, and after that segments the
resultant clusters into sub-clusters until the constraint on
the maximum size of cluster is reached. In the search phase,
this methodology can achieve a linear computational
complexity against exponential size of document collection.
In addition, retrieved documents have a better relationship
with each other than traditional methods.
3. PROPOSED APPROACH
3.1 Problem statement
To design a system that provides relevant rank results by
using hierarchical clustering index and data duplication
check is performed to reduce memory overhead and
searching time. It provides more security byuser-revocation
approach.
3.2 Proposed System overview
Figure 1.Proposed System Architecture
The propose system consist of three entities data owner,
the data user and the cloud server. The data owner is
responsible for collecting documents, building document
index and outsourcing them in an encrypted format to the
cloud server. Aside from that, the data user needs to get the
authorization from the data owner before getting to the
information. The cloud servergivesa hugestoragespaceand
the computation resources required by cipher text search.
Upon receiving a legal request from the data user, thecloud
server searches the encrypted index, and sends back top-k
documents that are most likely to match users query. The
number k is appropriately chosen by the data user. This
framework goes for protecting data from leaking
information to the cloud server while improving the
efficiency of cipher text search. In this model, both the data
owner and the data user are trusted, while the cloud server
is semi-trusted.
The proposed system consists of different modules the
main modules are listed below:
 Cloud Server:
Cloud server is the storage medium on which the data is
stored. Data stored on the cloud is in encrypted form by
which only authenticated users are able to access the data
in this way security is provided for data stored on cloud
 Data Owner:
Data owner are the user which uses the cloud storage to
store the data on cloud for the sharing purpose with the
different user present in the group. He is the one
responsible for encryption of data while storing it on
cloud.
 User Group:
This is the group of users who are willing to use the data
stored on the cloud. They have made a request in order to
access the data.
 Access control module:
At the time when user enters in the group or leaves the
group this module is responsible for providing the access
keys when one user enters in the group also responsible
for the key revocation at the time when the userleavesthe
group.
 Search Control:
This module is brought in to action whenusersearchesfor
specific keywords on the cloud. This module is able to
retrieve the files with the top k ranked documents
acceding to the user search.
 User Revocation and Data Deduplication:
To provide the security this system used user revocation
approach. To enhance the searching speed data
deduplication check is performed at client side. In this
approach the repeated or duplicate data is removed and
minimize memory overhead and searching time.
Steps of the proposed system are as follows:
Document Vector Generation
Initially User browse the dataset file, perform the operation
of stemming, stop word which remove the redundant data,
and improve the performance of the system,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2003
Figure -2: Document Vector Generation
K-Means Clustering
After document vector generation, clustering process is
performed. User enter the number of clusters and perform
the k-means clustering operation
Figure-3: K-means Clustering
 Check Deduplication
System generates the indexing file, encrypt index file,
encrypt files and generate the hash value by using SHA1
algorithm. And final system checks for the deduplication
file.
Figure -4: Duplication Check
EM Clustering
As EM clustering is our contribution work, we test the
performance of the system, by implementing the system by
using EM clustering algorithm
Figure-5 EM Clustering
3.3 ALGORITHM
In MRSE-HCI architecture the data owner builds the
encrypted index depending on the dictionary, random
numbers and secret key, the data user submitsa queryto the
cloud server for getting desired documents, and the cloud
server returns the target documents to the data user. This
architecture mainly consists of following algorithms.
 It isusedtogeneratethesecret
key to encrypt index and documents.
 Encrypted index is generated in this
phase by using the above mentioned secret key. At the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2004
same time, clustering process is also included current
phase.
 Thedocumentcollectionisencrypted bya
symmetric encryption algorithm which achievessemantic
security.
 It generates encrypted query
vector with users input keywords and secret key.
 In this phase, cloud
server compares trapdoor with index to get the top-k
retrieval results.
 he returned encrypted documents are
decrypted by the key generated in the first step.
Algorithm 2: Deduplication Checking
1. input the initial set of k cluster Centers C
2. set the threshold TH min
3. while k is not stable
4. generate a new set of cluster centersCϴ byk-means
5. for every cluster centers Cϴλ
6. get the minimum relevance score: min (Si)
7. if the min (Si) <THmin
8. add a new cluster center: k = k + 1
9. go to while
10. until k is steady
Algorithm 3: K-means Algorithm
1. db Hash=getting files hash from the client side database
which are successfully uploaded to the server
2. File Hash=users chunked file’s hash
H(New file) = h
H(Old n chunks) = hn
Compare h and hn
If H(New chunk) == H(Old n files)
Chunk is duplicate and refuses it to store on public
server
Else
Chunk is not duplicate and allowed to store on public
server
Algorithm 4: SHA-1 Algorithm
Steps of SHA-1
Step 1: Append Padding Bits Message is“padded” with a 1
and as many 0’s as necessaryto bring the message
length to 64 bitsfewer than an even multiple of 512.
Step 2: Append Length 64 bits are appendedto the endofthe
padded message. These bitshold thebinaryformatof
64 bits indicating thelength of the original message.
Algorithm 5: User Revocation
Input: User Name
Output: User terminated from system
Retrieve user List
Select user from the retrieve user list
Closed all operation from system (Selected User).
Then put that selected user in revoked list.
4. RESULTS AND DISCUSSION
In this section discussed the experimental result of the
proposed system.
4.1 Time Comparison Graph for Clustering
Following chart 1 shows the time comparison graph of the
different clustering algorithm. Existingsystemusedk means
algorithm for the clustering process, proposed system used
the EM clustering algorithm for the clustering process. As
from the following graph it is concludethattime required for
completing the process of clustering by using the K-means
algorithm is more than the EM clustering algorithm. Hence
by using the EM clustering algorithm performance of the
system is improved.
Chart -1: Time Comparison graph for clustering
4.2 Time Comparison Graph for Deduplication
As if the duplicate file exist in the system,theperformance of
the system may be low, therefore in the proposedsystem we
implement the concept of deduplication. In the following
chart 2 shows the comparison of existing system without
using the concept of deduplication and proposed system
with using the concept of deduplication. From the figure it is
conclude that time required for the system with
deduplication is less than the time required for the system
without deduplication.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2005
Chart 2. Time Comparison graph for deduplication
4.3 Time Comparison Graph for Searching
keyword
The search accuracy can measure the clients fulfillment.The
Retrieval accuracy is identified with two components: the
relevance amongst reportsandthe queriesandtherelevance
of documents between each other.
Chart-3.Time Comparison graph for searching Keyword
4.4 Relevance of Document
From the chart4, we can observe that the relevance of
retrieved documents in the MRSE-with clustering is almost
twice as many as that in the MRSE-HCI, which means
retrieved documents generatedbyMRSE-withclustering are
much closer to each other.
Chart-4 : Relevance of Document
4.6 Search Time Graph
Chart5 describes search efficiency using the different size of
document set with unchanged dictionary size, number of
retrieved documents and number of query keywords,
Chart. 5: Search Time Graph
5. CONCLUSIONS
This system examined cipher text search in the
circumstances of cloud storage. Also discuss the issues of
maintaining the semantic relationship between different
plain documents over the related encrypted documents and
give the design method to enhance the performance of the
semantic search. The existing MRSE-HCIarchitectureadapts
the requirements of data explosion, online information
retrieval and semantic search. The experimentresultproves
that the proposed architecture not only properly solves the
multi-keyword ranked search problem, but also brings and
improvement in search efficiency, rank security, and the
relevance between retrieved documents The proposed
system enhance the system performance by implementing
user revocation method where user group revocate Also
system reduces the memory overhead and enhances
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2006
searching speed by implementing data deduplication
approach where duplicate data is removed.
REFERENCES
[1]. Chen, Chi, et al.“An efficient privacy-preserving ranked
keyword search method.”IEEE Transactions on Parallel
and Distributed Systems 27.4 (2016): 951-963.
[2] S. Grzonkowski, P. M. Corcoran, and T. Coughlin,
“Security analysis of authenticationprotocols for next-
generation mobile and CE cloud services,” in Proc.
IEEEInt. Conf. Consumer Electron., 2011, Berlin,
Germany, 2011, pp. 83-87.
[3] C. Wang, N. Cao, K. Ren, and W. J. Lou, ``Enabling secure
and efficient rankedkeyword search over outsourced
cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 23,
no. 8, pp. 1467-1479, Aug. 2012.
[4] H. Pang, J. Shen, and R. Krishnan, “Privacy-preserving
similarity based text retrieval,”ACM Trans. Internet
Technol., vol. 10, no. 1, pp. 39, Feb. 2010.
[5] N. Cao, C.Wang, M. Li, K. Ren, andW. J. Lou, “Privacy-
preserving multi-keywordrankedsearchover encrypted
cloud data,” in Proc. IEEE INFOCOM,Shanghai,China,
2011, pp. 829-837.
[6] W. Sun, B.Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li,
“Privacy-preservingmulti-keyword text search in the
cloud supporting similarity-based ranking,”inProc. 8th
ACM SIGSAC Symp.Inform.,Comput. Commun.Security,
Hangzhou,China, 2013, pp. 71-82.
[7] C. Chen, X. J. Zhu, P. S. Shen, and J. K. Hu, “A hierarchical
clustering methodFor big data oriented cipher text
search,” in Proc. IEEE INFOCOM, Workshop onSecurity
and Privacy in Big Data, Toronto, Canada, 2014, pp.
559ˆa564.
[8] Cash, David, et al. “Dynamic Searchable Encryption in
Very-Large
[9] Yanzhu Liu, Zhi Li, Wang Guo and Wu Chaoxia, “Privacy-
preserving multikeyword rankedsearchover encrypted
big data,” Third InternationalConferenceonCyberspace
Technology (CCT 2015), Beijing, 2015, pp.1-3.
[10] Ching-Yang Tseng, ChangChun Lu and Cheng-Fu Chou,
“Efficient privacypreserving multi-keyword ranked
search utilizing document replication and partition,”
2015 12th Annual IEEE Consumer Communicationsand
Networking Conference(CCNC),LasVegas,NV,2015,pp.
[11] C. Wang, N. Cao, K. Ren, and W. J. Lou, “Secure ranked
keyword search over encrypted cloud data"The 30th
International Conference on Distributed Computing
Systems (ICDCS'10), Genoa, Italy, June 21-25, 2010.
[12] S. C. Yu, C. Wang, K. Ren, and W. J. Lou, “Achieving
Secure, Scalable, and Fine-grained Data Access Control
in Cloud Computing,” in Proc. IEEEINFOCOM,SanDiego,
CA, 2010, pp. 1-9.

Recomendados

Efficient Similarity Search over Encrypted Data por
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataIRJET Journal
37 visualizações4 slides
Data Search in Cloud using the Encrypted Keywords por
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
34 visualizações4 slides
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... por
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
5.4K visualizações12 slides
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ... por
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET Journal
11 visualizações4 slides
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou... por
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
526 visualizações9 slides
Enabling secure and efficient ranked keyword por
Enabling secure and efficient ranked keywordEnabling secure and efficient ranked keyword
Enabling secure and efficient ranked keywordIMPULSE_TECHNOLOGY
2.1K visualizações4 slides

Mais conteúdo relacionado

Mais procurados

Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...redpel dot com
416 visualizações12 slides
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme por
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeIRJET Journal
32 visualizações3 slides
Final 1st por
Final 1stFinal 1st
Final 1stgokulprema
1K visualizações15 slides
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD por
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
3.8K visualizações10 slides
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud por
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
12 visualizações3 slides
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In... por
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET Journal
14 visualizações5 slides

Mais procurados(20)

Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por redpel dot com
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com416 visualizações
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme por IRJET Journal
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal32 visualizações
Final 1st por gokulprema
Final 1stFinal 1st
Final 1st
gokulprema1K visualizações
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD por Nexgen Technology
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology 3.8K visualizações
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud por IRJET Journal
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal12 visualizações
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In... por IRJET Journal
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal14 visualizações
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ... por LeMeniz Infotech
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
LeMeniz Infotech424 visualizações
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method por IRJET Journal
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal33 visualizações
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in... por IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal29 visualizações
J017547478 por IOSR Journals
J017547478J017547478
J017547478
IOSR Journals173 visualizações
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ... por CloudTechnologies
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
CloudTechnologies1.9K visualizações
A secure and dynamic multi keyword ranked por jpstudcorner
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
jpstudcorner1.2K visualizações
Privacy preserving multi-keyword ranked search over encrypted cloud data por Nexgen Technology
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Nexgen Technology 7.2K visualizações
Privacy preserving multi-keyword ranked search over encrypted cloud data por Papitha Velumani
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani2.8K visualizações
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme por IRJET Journal
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET Journal52 visualizações
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ... por Shakas Technologies
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Shakas Technologies275 visualizações
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ... por Pvrtechnologies Nellore
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Pvrtechnologies Nellore227 visualizações
IRJET- Privacy Preserving Keyword Search over Cloud Data por IRJET Journal
IRJET-  	  Privacy Preserving Keyword Search over Cloud DataIRJET-  	  Privacy Preserving Keyword Search over Cloud Data
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET Journal28 visualizações
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp... por IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal6 visualizações
Privacy preserving multi-keyword ranked search over encrypted cloud data por IGEEKS TECHNOLOGIES
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES3.6K visualizações

Similar a Efficient Privacy Preserving Clustering Based Multi Keyword Search

Cloud java titles adrit solutions por
Cloud java titles adrit solutionsCloud java titles adrit solutions
Cloud java titles adrit solutionsAdrit Techno Solutions
247 visualizações23 slides
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique por
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
2 visualizações4 slides
Multi-Keyword Ranked Search in Encrypted Cloud Storage por
Multi-Keyword Ranked Search in Encrypted Cloud StorageMulti-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud StorageIRJET Journal
30 visualizações5 slides
Privacy preserving multi-keyword ranked search over encrypted cloud data 2 por
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Swathi Rampur
527 visualizações9 slides
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw... por
Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...ASAITHAMBIRAJAA
273 visualizações9 slides
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw... por
Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...ASAITHAMBIRAJAA
326 visualizações9 slides

Similar a Efficient Privacy Preserving Clustering Based Multi Keyword Search (20)

Cloud java titles adrit solutions por Adrit Techno Solutions
Cloud java titles adrit solutionsCloud java titles adrit solutions
Cloud java titles adrit solutions
Adrit Techno Solutions247 visualizações
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique por IRJET Journal
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal2 visualizações
Multi-Keyword Ranked Search in Encrypted Cloud Storage por IRJET Journal
Multi-Keyword Ranked Search in Encrypted Cloud StorageMulti-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal30 visualizações
Privacy preserving multi-keyword ranked search over encrypted cloud data 2 por Swathi Rampur
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur527 visualizações
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw... por ASAITHAMBIRAJAA
Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA273 visualizações
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw... por ASAITHAMBIRAJAA
Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA326 visualizações
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor... por hemanthbbc
Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
hemanthbbc261 visualizações
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... por dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications57 visualizações
IRJET- Privacy Preserving Encrypted Keyword Search Schemes por IRJET Journal
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal35 visualizações
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... por 1crore projects
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects70 visualizações
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... por 1crore projects
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects60 visualizações
Retrieving Secure Data from Cloud Using OTP por AM Publications
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
AM Publications245 visualizações
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS450 visualizações
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage por IRJET Journal
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal30 visualizações
Efficient and Empiric Keyword Search Using Cloud por IRJET Journal
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal0 visão
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM por IRJET Journal
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET Journal11 visualizações
International Journal of Computational Engineering Research(IJCER) por ijceronline
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline275 visualizações
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over por IEEEFINALSEMSTUDENTPROJECTS
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
IEEEFINALSEMSTUDENTPROJECTS520 visualizações
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove... por Editor IJCATR
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Editor IJCATR110 visualizações
IRJET-Auditing and Resisting Key Exposure on Cloud Storage por IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal31 visualizações

Mais de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
20 visualizações7 slides
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 visualizações7 slides
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
7 visualizações5 slides
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 visualizações11 slides
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 visualizações6 slides
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 visualizações5 slides

Mais de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal20 visualizações
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 visualizações
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal7 visualizações
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 visualizações
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 visualizações
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 visualizações
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 visualizações
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 visualizações
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 visualizações
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 visualizações
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 visualizações
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal44 visualizações
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal10 visualizações
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 visualizações
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 visualizações
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 visualizações
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 visualizações
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 visualizações
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal4 visualizações
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 visualizações

Último

SWM L1-L14_drhasan (Part 1).pdf por
SWM L1-L14_drhasan (Part 1).pdfSWM L1-L14_drhasan (Part 1).pdf
SWM L1-L14_drhasan (Part 1).pdfMahmudHasan747870
48 visualizações150 slides
SUMIT SQL PROJECT SUPERSTORE 1.pptx por
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptxSumit Jadhav
11 visualizações26 slides
IWISS Catalog 2022 por
IWISS Catalog 2022IWISS Catalog 2022
IWISS Catalog 2022Iwiss Tools Co.,Ltd
26 visualizações66 slides
DESIGN OF SPRINGS-UNIT4.pptx por
DESIGN OF SPRINGS-UNIT4.pptxDESIGN OF SPRINGS-UNIT4.pptx
DESIGN OF SPRINGS-UNIT4.pptxgopinathcreddy
18 visualizações47 slides
CHEMICAL KINETICS.pdf por
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdfAguedaGutirrez
8 visualizações337 slides
Object Oriented Programming with JAVA por
Object Oriented Programming with JAVAObject Oriented Programming with JAVA
Object Oriented Programming with JAVADemian Antony D'Mello
107 visualizações28 slides

Último(20)

SWM L1-L14_drhasan (Part 1).pdf por MahmudHasan747870
SWM L1-L14_drhasan (Part 1).pdfSWM L1-L14_drhasan (Part 1).pdf
SWM L1-L14_drhasan (Part 1).pdf
MahmudHasan74787048 visualizações
SUMIT SQL PROJECT SUPERSTORE 1.pptx por Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 11 visualizações
DESIGN OF SPRINGS-UNIT4.pptx por gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptxDESIGN OF SPRINGS-UNIT4.pptx
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy18 visualizações
CHEMICAL KINETICS.pdf por AguedaGutirrez
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdf
AguedaGutirrez8 visualizações
Object Oriented Programming with JAVA por Demian Antony D'Mello
Object Oriented Programming with JAVAObject Oriented Programming with JAVA
Object Oriented Programming with JAVA
Demian Antony D'Mello107 visualizações
A multi-microcontroller-based hardware for deploying Tiny machine learning mo... por IJECEIAES
A multi-microcontroller-based hardware for deploying Tiny machine learning mo...A multi-microcontroller-based hardware for deploying Tiny machine learning mo...
A multi-microcontroller-based hardware for deploying Tiny machine learning mo...
IJECEIAES13 visualizações
Design and analysis of a new undergraduate Computer Engineering degree – a me... por WaelBadawy6
Design and analysis of a new undergraduate Computer Engineering degree – a me...Design and analysis of a new undergraduate Computer Engineering degree – a me...
Design and analysis of a new undergraduate Computer Engineering degree – a me...
WaelBadawy656 visualizações
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy29 visualizações
How I learned to stop worrying and love the dark silicon apocalypse.pdf por Tomasz Kowalczewski
How I learned to stop worrying and love the dark silicon apocalypse.pdfHow I learned to stop worrying and love the dark silicon apocalypse.pdf
How I learned to stop worrying and love the dark silicon apocalypse.pdf
Tomasz Kowalczewski26 visualizações
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome23 visualizações
Thermal aware task assignment for multicore processors using genetic algorithm por IJECEIAES
Thermal aware task assignment for multicore processors using genetic algorithm Thermal aware task assignment for multicore processors using genetic algorithm
Thermal aware task assignment for multicore processors using genetic algorithm
IJECEIAES31 visualizações
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,... por AakashShakya12
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
AakashShakya1263 visualizações
SEMI CONDUCTORS por pavaniaalla2005
SEMI CONDUCTORSSEMI CONDUCTORS
SEMI CONDUCTORS
pavaniaalla200520 visualizações
Saikat Chakraborty Java Oracle Certificate.pdf por SaikatChakraborty787148
Saikat Chakraborty Java Oracle Certificate.pdfSaikat Chakraborty Java Oracle Certificate.pdf
Saikat Chakraborty Java Oracle Certificate.pdf
SaikatChakraborty78714815 visualizações
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra812 visualizações

Efficient Privacy Preserving Clustering Based Multi Keyword Search

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2000 Efficient Privacy Preserving Clustering Based Multi Keyword Search Shital Agrawal 1, Prof. Bharati Dixit2 1,2Department of Information Engineering, MIT College of Engineering. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Recently, cloudcomputingbecomemorepopular, data owners shows their interest or prefer the cloud for storing their personal data, by storing data intothecloudsave the economical funds and gives the great flexibility. As providing security to the data is the challenging task for the researchers, for protecting the data sensitive data have to be encoded before outsourcing the data. To accomplish the privacy preserving effective search over encoded cloud information this paper presents the hierarchical clustering approach. Alongside this precise and proficient search over outsourced information, security is additionally considered with user revocation approach. Another more imperative component of this framework is data duplication checking with SHA1 hashing strategy. This strategy will not permit the data owner to store the duplicate data at cloud server. By using the data duplication technique memory overload is reduce on cloud. In this framework for clustering process EM clustering is used, and finally compare the EM clustering algorithm with K-means clustering algorithm. Experimental results demonstrate that the framework has numerous advantages like efficient and effective memory and time utilization, efficient and secure search over encrypted data, secure data storage and data duplication checking. Key Words: Cloud computing, cipher text search, ranked search, multi-keyword search, hierarchical clustering, big data, security. 1. INTRODUCTION Now a days cloud computing becomes more interesting methodology in differentapplicationslikeacademicsandthe industries. Cloud computing has a number of features, for example resource management, economical cost andsimple and quick deployment. Due to the tremendous economic advantages cloud computing, most of the organization deployed their cloud centers. Such cloud centers are Elastic Compute Cloud of Amazon, the App Engine of Google, the Azure of Microsoft, and Blue Cloud of IBM. Despite the fact that data is sometime sensitive information, for example, personal records, financial records pass record and so on., because once the data is outsourced, owner can not directly control the data. It is accessible online at some point. The Cloud Service provider (CSP) can keep up the security of such sensitive data by utilizing a few methods like fire ware, virtualization, and Intrusion Detection System(IDS).Forthis situation, CSP increases full control over such information. But there is no guarantee or full trust on the representative of CSP [1][10]. They can leak or alter the information.That is they can uncover the sensitive data of data owners. So to defeat the issue of security of outsource information, information encryption is one of the best solutions. The encryption system may have reinforced the data security of cloud data; in any case it has additionally corrupted the proficiency of the data on the groundsthatthe encryption will decreases the search capacity of the data. Especially in the cloud computing environment, it is illogical for the customer to download and decrypt the entire encoded data from the remote cloud server before a search happens. Along these lines, an proficient plan that backings search over encrypted informationincloudcomputingturns out to be extremely noteworthy before much organization can exploit the cloud storage [8][9]. Consistently, accessible encryption strategies have been made to give the capacity to explicitly recovering the encrypted reports through a keyword search. Typically, these systems manufacture a protected index structure and outsource it nearby the encoded records to the remote server. Approved customers show their requests as secret trapdoors that are coordinated legitimately with the stored index data. The server uses the got trapdoor to discover the put away file, and gets the coordinating encoded files [10]. Numerous analysts have created many cipher content search framework by utilizing the cryptography strategies. These procedures have demonstrated provable security, however as they requests enormous operations and huge complexity in time. Henceforth already composed systems are not valuable for huge data where size of the data is huge likewise it needs online data processing. Because of the visually impaired encryption, important property has been covered in the customary techniques. Along these lines, proposing a technique which can keep up and use this relationship to speed the search phase is desirable Proposed system includes following points:  Propose a clustering method to solveproblemof maintaining the close relationship between different plain documents over an encrypted domain.  Proposed theMRSE-HCIarchitecturetospeedup server side searching phase.  Design a search strategy to improve the rank privacy.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2001  Provide a verification mechanism to assure the correctness and completeness of search results.  Generate ranked top-k documents.  Provide user revocation method for security. To achieve above features and for better performance of system, we have used following algorithms and techniques in system.  AES encryption algorithm and User revocation method for Security  EM clustering algorithm to enhance the clusters generation accuracy.  Hierarchical algorithm to generate clusters hierarchically.  SHA-1 algorithm for hashing  Perform the data duplication operation for checking the duplicate data. In this paper study about the related work done, in section II, the proposed approach modules description, mathematical modeling, algorithm and expectedresultin section III. And at final provide a conclusion in sectionIV. 2. LITERATURE REVIEW Chen, Chi, et al.[1], a hierarchical clustering strategy is proposed to support more search semanticsfurthermore to meet the demand for fast cipher text search within a big data environment. The proposed hierarchical approach clusters the documents based on the minimum relevance threshold and then partitions the resulting clusters into sub-clusters until the constraint on the maximum size of cluster is reached. In the search stage, this methodology can achieve a linear computational complexity against an exponential size increment of document collection. All together to confirm the authenticity of searchresults,a structurecalledminimum hash sub-tree is designed. Various well-known [2] authentication protocols are considered with contextof nextgenerationmobileandCE network services. The potential weaknesses of current protocol scan be overcome utilizing Zero Knowledge Proof (ZKP) strategies to ensure client passwords so an alternative ZKP protocol, Se Di Ci 2.0, is depicted. This offers mutual and also two-factor authentication that is viewed as more secure against different phishing endeavors than existing trusted outsider protocols. The suitability of such a ZKP protocol for different CE-based cloud computing applications is illustrated. Wang et al. [3], characterize and solve the issue of secure ranked keyword search over encrypted cloud data. Ranked searchenormouslyupgradesframework usability by enabling search result relevance ranking instead of sending un differentiated results and further guarantees the file retrieval accuracy. In particular, they investigate the statistical measure approach, i.e., relevance score, fromdata recovery to manufacture secure searchable index, and build up a one-to-many order-preserving mapping strategy to appropriately secure those sensitive score data. The resulting design is able to facilitate efficient server-side ranking without losing keyword privacy. Pang et al. [4], presenta privacy-preserving,similarity-based text retrieval scheme that preventstheserverfromprecisely reproducing the term composition of queries and documents, and anonymize the search results from unauthorized observers. In the meantime, their plan preserves the relevance-ranking of the search server, and empowers accounting of the number of documents that every client opens. The effectiveness of the scheme is verified empirically with two real text corpora. Cao et al. [5], interestingly, authors characterize and tackle the challenging issue of privacy-preserving multi-keyword ranked search over encrypted information in cloud computing (MRSE). They build up a set of strict privacy requirements for for such a secure cloud information usage framework. Among different multi-keywordsemantics,they choose the proficient similarity measure of “coordinate matching,” i.e., whatever number matches as possible, to capture the relevance of datadocumentstothesearchquery. They further utilize “inner product similarity” to quantitatively assess such similarity measure. They first propose a fundamental thought for the MRSE based on secure inner product computation, and after that give two essentially enhanced MRSE plans to accomplish different stringent privacy requirements in two distinctive threat models. Sun et al. [6], authors present a privacy-preserving multi- keyword text search (MTS) theme with similarity-based ranking to address this issue. To support multi-keyword search and search result ranking, they propose to create the search index based on term frequency and also the vector area model with cosine similarity live to attainhighersearch result accuracy. To enhance the search efficiency, they propose a tree-based index structure and numerous adaption ways for multi-dimensional (MD) algorithmic rule so the sensible search efficiency is way higher than that of linear search. To further enhance the search privacy, they propose two secure index schemes to fulfill the stringent privacy needs under strong threat models,i.e.,knowncipher text model and known background model. Chen et al. [7], a hierarchical clustering technique for cipher text search within a big data environment is proposed. The proposed approach clusters the documents based on the
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2002 minimum similarity threshold, and after that segments the resultant clusters into sub-clusters until the constraint on the maximum size of cluster is reached. In the search phase, this methodology can achieve a linear computational complexity against exponential size of document collection. In addition, retrieved documents have a better relationship with each other than traditional methods. 3. PROPOSED APPROACH 3.1 Problem statement To design a system that provides relevant rank results by using hierarchical clustering index and data duplication check is performed to reduce memory overhead and searching time. It provides more security byuser-revocation approach. 3.2 Proposed System overview Figure 1.Proposed System Architecture The propose system consist of three entities data owner, the data user and the cloud server. The data owner is responsible for collecting documents, building document index and outsourcing them in an encrypted format to the cloud server. Aside from that, the data user needs to get the authorization from the data owner before getting to the information. The cloud servergivesa hugestoragespaceand the computation resources required by cipher text search. Upon receiving a legal request from the data user, thecloud server searches the encrypted index, and sends back top-k documents that are most likely to match users query. The number k is appropriately chosen by the data user. This framework goes for protecting data from leaking information to the cloud server while improving the efficiency of cipher text search. In this model, both the data owner and the data user are trusted, while the cloud server is semi-trusted. The proposed system consists of different modules the main modules are listed below:  Cloud Server: Cloud server is the storage medium on which the data is stored. Data stored on the cloud is in encrypted form by which only authenticated users are able to access the data in this way security is provided for data stored on cloud  Data Owner: Data owner are the user which uses the cloud storage to store the data on cloud for the sharing purpose with the different user present in the group. He is the one responsible for encryption of data while storing it on cloud.  User Group: This is the group of users who are willing to use the data stored on the cloud. They have made a request in order to access the data.  Access control module: At the time when user enters in the group or leaves the group this module is responsible for providing the access keys when one user enters in the group also responsible for the key revocation at the time when the userleavesthe group.  Search Control: This module is brought in to action whenusersearchesfor specific keywords on the cloud. This module is able to retrieve the files with the top k ranked documents acceding to the user search.  User Revocation and Data Deduplication: To provide the security this system used user revocation approach. To enhance the searching speed data deduplication check is performed at client side. In this approach the repeated or duplicate data is removed and minimize memory overhead and searching time. Steps of the proposed system are as follows: Document Vector Generation Initially User browse the dataset file, perform the operation of stemming, stop word which remove the redundant data, and improve the performance of the system,
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2003 Figure -2: Document Vector Generation K-Means Clustering After document vector generation, clustering process is performed. User enter the number of clusters and perform the k-means clustering operation Figure-3: K-means Clustering  Check Deduplication System generates the indexing file, encrypt index file, encrypt files and generate the hash value by using SHA1 algorithm. And final system checks for the deduplication file. Figure -4: Duplication Check EM Clustering As EM clustering is our contribution work, we test the performance of the system, by implementing the system by using EM clustering algorithm Figure-5 EM Clustering 3.3 ALGORITHM In MRSE-HCI architecture the data owner builds the encrypted index depending on the dictionary, random numbers and secret key, the data user submitsa queryto the cloud server for getting desired documents, and the cloud server returns the target documents to the data user. This architecture mainly consists of following algorithms.  It isusedtogeneratethesecret key to encrypt index and documents.  Encrypted index is generated in this phase by using the above mentioned secret key. At the
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2004 same time, clustering process is also included current phase.  Thedocumentcollectionisencrypted bya symmetric encryption algorithm which achievessemantic security.  It generates encrypted query vector with users input keywords and secret key.  In this phase, cloud server compares trapdoor with index to get the top-k retrieval results.  he returned encrypted documents are decrypted by the key generated in the first step. Algorithm 2: Deduplication Checking 1. input the initial set of k cluster Centers C 2. set the threshold TH min 3. while k is not stable 4. generate a new set of cluster centersCϴ byk-means 5. for every cluster centers Cϴλ 6. get the minimum relevance score: min (Si) 7. if the min (Si) <THmin 8. add a new cluster center: k = k + 1 9. go to while 10. until k is steady Algorithm 3: K-means Algorithm 1. db Hash=getting files hash from the client side database which are successfully uploaded to the server 2. File Hash=users chunked file’s hash H(New file) = h H(Old n chunks) = hn Compare h and hn If H(New chunk) == H(Old n files) Chunk is duplicate and refuses it to store on public server Else Chunk is not duplicate and allowed to store on public server Algorithm 4: SHA-1 Algorithm Steps of SHA-1 Step 1: Append Padding Bits Message is“padded” with a 1 and as many 0’s as necessaryto bring the message length to 64 bitsfewer than an even multiple of 512. Step 2: Append Length 64 bits are appendedto the endofthe padded message. These bitshold thebinaryformatof 64 bits indicating thelength of the original message. Algorithm 5: User Revocation Input: User Name Output: User terminated from system Retrieve user List Select user from the retrieve user list Closed all operation from system (Selected User). Then put that selected user in revoked list. 4. RESULTS AND DISCUSSION In this section discussed the experimental result of the proposed system. 4.1 Time Comparison Graph for Clustering Following chart 1 shows the time comparison graph of the different clustering algorithm. Existingsystemusedk means algorithm for the clustering process, proposed system used the EM clustering algorithm for the clustering process. As from the following graph it is concludethattime required for completing the process of clustering by using the K-means algorithm is more than the EM clustering algorithm. Hence by using the EM clustering algorithm performance of the system is improved. Chart -1: Time Comparison graph for clustering 4.2 Time Comparison Graph for Deduplication As if the duplicate file exist in the system,theperformance of the system may be low, therefore in the proposedsystem we implement the concept of deduplication. In the following chart 2 shows the comparison of existing system without using the concept of deduplication and proposed system with using the concept of deduplication. From the figure it is conclude that time required for the system with deduplication is less than the time required for the system without deduplication.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2005 Chart 2. Time Comparison graph for deduplication 4.3 Time Comparison Graph for Searching keyword The search accuracy can measure the clients fulfillment.The Retrieval accuracy is identified with two components: the relevance amongst reportsandthe queriesandtherelevance of documents between each other. Chart-3.Time Comparison graph for searching Keyword 4.4 Relevance of Document From the chart4, we can observe that the relevance of retrieved documents in the MRSE-with clustering is almost twice as many as that in the MRSE-HCI, which means retrieved documents generatedbyMRSE-withclustering are much closer to each other. Chart-4 : Relevance of Document 4.6 Search Time Graph Chart5 describes search efficiency using the different size of document set with unchanged dictionary size, number of retrieved documents and number of query keywords, Chart. 5: Search Time Graph 5. CONCLUSIONS This system examined cipher text search in the circumstances of cloud storage. Also discuss the issues of maintaining the semantic relationship between different plain documents over the related encrypted documents and give the design method to enhance the performance of the semantic search. The existing MRSE-HCIarchitectureadapts the requirements of data explosion, online information retrieval and semantic search. The experimentresultproves that the proposed architecture not only properly solves the multi-keyword ranked search problem, but also brings and improvement in search efficiency, rank security, and the relevance between retrieved documents The proposed system enhance the system performance by implementing user revocation method where user group revocate Also system reduces the memory overhead and enhances
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2006 searching speed by implementing data deduplication approach where duplicate data is removed. REFERENCES [1]. Chen, Chi, et al.“An efficient privacy-preserving ranked keyword search method.”IEEE Transactions on Parallel and Distributed Systems 27.4 (2016): 951-963. [2] S. Grzonkowski, P. M. Corcoran, and T. Coughlin, “Security analysis of authenticationprotocols for next- generation mobile and CE cloud services,” in Proc. IEEEInt. Conf. Consumer Electron., 2011, Berlin, Germany, 2011, pp. 83-87. [3] C. Wang, N. Cao, K. Ren, and W. J. Lou, ``Enabling secure and efficient rankedkeyword search over outsourced cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012. [4] H. Pang, J. Shen, and R. Krishnan, “Privacy-preserving similarity based text retrieval,”ACM Trans. Internet Technol., vol. 10, no. 1, pp. 39, Feb. 2010. [5] N. Cao, C.Wang, M. Li, K. Ren, andW. J. Lou, “Privacy- preserving multi-keywordrankedsearchover encrypted cloud data,” in Proc. IEEE INFOCOM,Shanghai,China, 2011, pp. 829-837. [6] W. Sun, B.Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Privacy-preservingmulti-keyword text search in the cloud supporting similarity-based ranking,”inProc. 8th ACM SIGSAC Symp.Inform.,Comput. Commun.Security, Hangzhou,China, 2013, pp. 71-82. [7] C. Chen, X. J. Zhu, P. S. Shen, and J. K. Hu, “A hierarchical clustering methodFor big data oriented cipher text search,” in Proc. IEEE INFOCOM, Workshop onSecurity and Privacy in Big Data, Toronto, Canada, 2014, pp. 559ˆa564. [8] Cash, David, et al. “Dynamic Searchable Encryption in Very-Large [9] Yanzhu Liu, Zhi Li, Wang Guo and Wu Chaoxia, “Privacy- preserving multikeyword rankedsearchover encrypted big data,” Third InternationalConferenceonCyberspace Technology (CCT 2015), Beijing, 2015, pp.1-3. [10] Ching-Yang Tseng, ChangChun Lu and Cheng-Fu Chou, “Efficient privacypreserving multi-keyword ranked search utilizing document replication and partition,” 2015 12th Annual IEEE Consumer Communicationsand Networking Conference(CCNC),LasVegas,NV,2015,pp. [11] C. Wang, N. Cao, K. Ren, and W. J. Lou, “Secure ranked keyword search over encrypted cloud data"The 30th International Conference on Distributed Computing Systems (ICDCS'10), Genoa, Italy, June 21-25, 2010. [12] S. C. Yu, C. Wang, K. Ren, and W. J. Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” in Proc. IEEEINFOCOM,SanDiego, CA, 2010, pp. 1-9.