SlideShare a Scribd company logo
Enviar pesquisa
Carregar
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Denunciar
Compartilhar
IRJET Journal
Fast Track Publications
Seguir
•
1 gostou
•
38 visualizações
Engenharia
https://irjet.net/archives/V4/i7/IRJET-V4I7418.pdf
Leia mais
Efficient Privacy Preserving Clustering Based Multi Keyword Search
•
1 gostou
•
38 visualizações
IRJET Journal
Fast Track Publications
Seguir
Denunciar
Compartilhar
Engenharia
https://irjet.net/archives/V4/i7/IRJET-V4I7418.pdf
Leia mais
Efficient Privacy Preserving Clustering Based Multi Keyword Search
1 de 7
Baixar agora
Recomendados
Efficient Similarity Search over Encrypted Data por
Efficient Similarity Search over Encrypted Data
IRJET Journal
37 visualizações
•
4 slides
Data Search in Cloud using the Encrypted Keywords por
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
34 visualizações
•
4 slides
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... por
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
5.4K visualizações
•
12 slides
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ... por
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
11 visualizações
•
4 slides
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou... por
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
526 visualizações
•
9 slides
Enabling secure and efficient ranked keyword por
Enabling secure and efficient ranked keyword
IMPULSE_TECHNOLOGY
2.1K visualizações
•
4 slides
Mais conteúdo relacionado
Mais procurados
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com
416 visualizações
•
12 slides
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme por
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
32 visualizações
•
3 slides
Final 1st por
Final 1st
gokulprema
1K visualizações
•
15 slides
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD por
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
3.8K visualizações
•
10 slides
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud por
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
12 visualizações
•
3 slides
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In... por
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
14 visualizações
•
5 slides
Mais procurados
(20)
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por redpel dot com
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com
•
416 visualizações
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme por IRJET Journal
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
•
32 visualizações
Final 1st por gokulprema
Final 1st
gokulprema
•
1K visualizações
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD por Nexgen Technology
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
•
3.8K visualizações
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud por IRJET Journal
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
•
12 visualizações
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In... por IRJET Journal
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
•
14 visualizações
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ... por LeMeniz Infotech
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
LeMeniz Infotech
•
424 visualizações
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method por IRJET Journal
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
•
33 visualizações
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in... por IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
•
29 visualizações
J017547478 por IOSR Journals
J017547478
IOSR Journals
•
173 visualizações
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ... por CloudTechnologies
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
CloudTechnologies
•
1.9K visualizações
A secure and dynamic multi keyword ranked por jpstudcorner
A secure and dynamic multi keyword ranked
jpstudcorner
•
1.2K visualizações
Privacy preserving multi-keyword ranked search over encrypted cloud data por Nexgen Technology
Privacy preserving multi-keyword ranked search over encrypted cloud data
Nexgen Technology
•
7.2K visualizações
Privacy preserving multi-keyword ranked search over encrypted cloud data por Papitha Velumani
Privacy preserving multi-keyword ranked search over encrypted cloud data
Papitha Velumani
•
2.8K visualizações
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme por IRJET Journal
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET Journal
•
52 visualizações
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ... por Shakas Technologies
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Shakas Technologies
•
275 visualizações
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ... por Pvrtechnologies Nellore
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Pvrtechnologies Nellore
•
227 visualizações
IRJET- Privacy Preserving Keyword Search over Cloud Data por IRJET Journal
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET Journal
•
28 visualizações
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp... por IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
•
6 visualizações
Privacy preserving multi-keyword ranked search over encrypted cloud data por IGEEKS TECHNOLOGIES
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
•
3.6K visualizações
Similar a Efficient Privacy Preserving Clustering Based Multi Keyword Search
Cloud java titles adrit solutions por
Cloud java titles adrit solutions
Adrit Techno Solutions
247 visualizações
•
23 slides
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique por
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
2 visualizações
•
4 slides
Multi-Keyword Ranked Search in Encrypted Cloud Storage por
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
30 visualizações
•
5 slides
Privacy preserving multi-keyword ranked search over encrypted cloud data 2 por
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur
527 visualizações
•
9 slides
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw... por
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
273 visualizações
•
9 slides
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw... por
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
326 visualizações
•
9 slides
Similar a Efficient Privacy Preserving Clustering Based Multi Keyword Search
(20)
Cloud java titles adrit solutions por Adrit Techno Solutions
Cloud java titles adrit solutions
Adrit Techno Solutions
•
247 visualizações
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique por IRJET Journal
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
•
2 visualizações
Multi-Keyword Ranked Search in Encrypted Cloud Storage por IRJET Journal
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
•
30 visualizações
Privacy preserving multi-keyword ranked search over encrypted cloud data 2 por Swathi Rampur
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur
•
527 visualizações
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw... por ASAITHAMBIRAJAA
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
•
273 visualizações
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw... por ASAITHAMBIRAJAA
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
•
326 visualizações
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor... por hemanthbbc
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
hemanthbbc
•
261 visualizações
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... por dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
•
57 visualizações
IRJET- Privacy Preserving Encrypted Keyword Search Schemes por IRJET Journal
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
•
35 visualizações
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... por 1crore projects
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
•
70 visualizações
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... por 1crore projects
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
•
60 visualizações
Retrieving Secure Data from Cloud Using OTP por AM Publications
Retrieving Secure Data from Cloud Using OTP
AM Publications
•
245 visualizações
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
•
450 visualizações
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage por IRJET Journal
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
•
30 visualizações
Efficient and Empiric Keyword Search Using Cloud por IRJET Journal
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
•
0 visão
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM por IRJET Journal
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET Journal
•
11 visualizações
International Journal of Computational Engineering Research(IJCER) por ijceronline
International Journal of Computational Engineering Research(IJCER)
ijceronline
•
275 visualizações
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over por IEEEFINALSEMSTUDENTPROJECTS
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
IEEEFINALSEMSTUDENTPROJECTS
•
520 visualizações
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove... por Editor IJCATR
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Editor IJCATR
•
110 visualizações
IRJET-Auditing and Resisting Key Exposure on Cloud Storage por IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
•
31 visualizações
Mais de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
20 visualizações
•
7 slides
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 visualizações
•
7 slides
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
7 visualizações
•
5 slides
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 visualizações
•
11 slides
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 visualizações
•
6 slides
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 visualizações
•
5 slides
Mais de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
20 visualizações
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 visualizações
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
7 visualizações
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 visualizações
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 visualizações
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 visualizações
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 visualizações
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 visualizações
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 visualizações
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 visualizações
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 visualizações
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
44 visualizações
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
10 visualizações
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 visualizações
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 visualizações
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 visualizações
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 visualizações
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 visualizações
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
4 visualizações
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 visualizações
Último
SWM L1-L14_drhasan (Part 1).pdf por
SWM L1-L14_drhasan (Part 1).pdf
MahmudHasan747870
48 visualizações
•
150 slides
SUMIT SQL PROJECT SUPERSTORE 1.pptx por
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav
11 visualizações
•
26 slides
IWISS Catalog 2022 por
IWISS Catalog 2022
Iwiss Tools Co.,Ltd
26 visualizações
•
66 slides
DESIGN OF SPRINGS-UNIT4.pptx por
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
18 visualizações
•
47 slides
CHEMICAL KINETICS.pdf por
CHEMICAL KINETICS.pdf
AguedaGutirrez
8 visualizações
•
337 slides
Object Oriented Programming with JAVA por
Object Oriented Programming with JAVA
Demian Antony D'Mello
107 visualizações
•
28 slides
Último
(20)
SWM L1-L14_drhasan (Part 1).pdf por MahmudHasan747870
SWM L1-L14_drhasan (Part 1).pdf
MahmudHasan747870
•
48 visualizações
SUMIT SQL PROJECT SUPERSTORE 1.pptx por Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav
•
11 visualizações
IWISS Catalog 2022 por Iwiss Tools Co.,Ltd
IWISS Catalog 2022
Iwiss Tools Co.,Ltd
•
26 visualizações
DESIGN OF SPRINGS-UNIT4.pptx por gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
•
18 visualizações
CHEMICAL KINETICS.pdf por AguedaGutirrez
CHEMICAL KINETICS.pdf
AguedaGutirrez
•
8 visualizações
Object Oriented Programming with JAVA por Demian Antony D'Mello
Object Oriented Programming with JAVA
Demian Antony D'Mello
•
107 visualizações
A multi-microcontroller-based hardware for deploying Tiny machine learning mo... por IJECEIAES
A multi-microcontroller-based hardware for deploying Tiny machine learning mo...
IJECEIAES
•
13 visualizações
Design and analysis of a new undergraduate Computer Engineering degree – a me... por WaelBadawy6
Design and analysis of a new undergraduate Computer Engineering degree – a me...
WaelBadawy6
•
56 visualizações
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptx
gopinathcreddy
•
29 visualizações
Stone Masonry and Brick Masonry.pdf por Mohammed Abdullah Laskar
Stone Masonry and Brick Masonry.pdf
Mohammed Abdullah Laskar
•
20 visualizações
How I learned to stop worrying and love the dark silicon apocalypse.pdf por Tomasz Kowalczewski
How I learned to stop worrying and love the dark silicon apocalypse.pdf
Tomasz Kowalczewski
•
26 visualizações
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome
•
23 visualizações
Wire Rope por Iwiss Tools Co.,Ltd
Wire Rope
Iwiss Tools Co.,Ltd
•
9 visualizações
Thermal aware task assignment for multicore processors using genetic algorithm por IJECEIAES
Thermal aware task assignment for multicore processors using genetic algorithm
IJECEIAES
•
31 visualizações
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,... por AakashShakya12
Literature review and Case study on Commercial Complex in Nepal, Durbar mall,...
AakashShakya12
•
63 visualizações
802.11 Computer Networks por TusharChoudhary72015
802.11 Computer Networks
TusharChoudhary72015
•
9 visualizações
SEMI CONDUCTORS por pavaniaalla2005
SEMI CONDUCTORS
pavaniaalla2005
•
20 visualizações
Saikat Chakraborty Java Oracle Certificate.pdf por SaikatChakraborty787148
Saikat Chakraborty Java Oracle Certificate.pdf
SaikatChakraborty787148
•
15 visualizações
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptx
deepmitra8
•
12 visualizações
Solar PV por Iwiss Tools Co.,Ltd
Solar PV
Iwiss Tools Co.,Ltd
•
14 visualizações
Efficient Privacy Preserving Clustering Based Multi Keyword Search
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2000 Efficient Privacy Preserving Clustering Based Multi Keyword Search Shital Agrawal 1, Prof. Bharati Dixit2 1,2Department of Information Engineering, MIT College of Engineering. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Recently, cloudcomputingbecomemorepopular, data owners shows their interest or prefer the cloud for storing their personal data, by storing data intothecloudsave the economical funds and gives the great flexibility. As providing security to the data is the challenging task for the researchers, for protecting the data sensitive data have to be encoded before outsourcing the data. To accomplish the privacy preserving effective search over encoded cloud information this paper presents the hierarchical clustering approach. Alongside this precise and proficient search over outsourced information, security is additionally considered with user revocation approach. Another more imperative component of this framework is data duplication checking with SHA1 hashing strategy. This strategy will not permit the data owner to store the duplicate data at cloud server. By using the data duplication technique memory overload is reduce on cloud. In this framework for clustering process EM clustering is used, and finally compare the EM clustering algorithm with K-means clustering algorithm. Experimental results demonstrate that the framework has numerous advantages like efficient and effective memory and time utilization, efficient and secure search over encrypted data, secure data storage and data duplication checking. Key Words: Cloud computing, cipher text search, ranked search, multi-keyword search, hierarchical clustering, big data, security. 1. INTRODUCTION Now a days cloud computing becomes more interesting methodology in differentapplicationslikeacademicsandthe industries. Cloud computing has a number of features, for example resource management, economical cost andsimple and quick deployment. Due to the tremendous economic advantages cloud computing, most of the organization deployed their cloud centers. Such cloud centers are Elastic Compute Cloud of Amazon, the App Engine of Google, the Azure of Microsoft, and Blue Cloud of IBM. Despite the fact that data is sometime sensitive information, for example, personal records, financial records pass record and so on., because once the data is outsourced, owner can not directly control the data. It is accessible online at some point. The Cloud Service provider (CSP) can keep up the security of such sensitive data by utilizing a few methods like fire ware, virtualization, and Intrusion Detection System(IDS).Forthis situation, CSP increases full control over such information. But there is no guarantee or full trust on the representative of CSP [1][10]. They can leak or alter the information.That is they can uncover the sensitive data of data owners. So to defeat the issue of security of outsource information, information encryption is one of the best solutions. The encryption system may have reinforced the data security of cloud data; in any case it has additionally corrupted the proficiency of the data on the groundsthatthe encryption will decreases the search capacity of the data. Especially in the cloud computing environment, it is illogical for the customer to download and decrypt the entire encoded data from the remote cloud server before a search happens. Along these lines, an proficient plan that backings search over encrypted informationincloudcomputingturns out to be extremely noteworthy before much organization can exploit the cloud storage [8][9]. Consistently, accessible encryption strategies have been made to give the capacity to explicitly recovering the encrypted reports through a keyword search. Typically, these systems manufacture a protected index structure and outsource it nearby the encoded records to the remote server. Approved customers show their requests as secret trapdoors that are coordinated legitimately with the stored index data. The server uses the got trapdoor to discover the put away file, and gets the coordinating encoded files [10]. Numerous analysts have created many cipher content search framework by utilizing the cryptography strategies. These procedures have demonstrated provable security, however as they requests enormous operations and huge complexity in time. Henceforth already composed systems are not valuable for huge data where size of the data is huge likewise it needs online data processing. Because of the visually impaired encryption, important property has been covered in the customary techniques. Along these lines, proposing a technique which can keep up and use this relationship to speed the search phase is desirable Proposed system includes following points: Propose a clustering method to solveproblemof maintaining the close relationship between different plain documents over an encrypted domain. Proposed theMRSE-HCIarchitecturetospeedup server side searching phase. Design a search strategy to improve the rank privacy.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2001 Provide a verification mechanism to assure the correctness and completeness of search results. Generate ranked top-k documents. Provide user revocation method for security. To achieve above features and for better performance of system, we have used following algorithms and techniques in system. AES encryption algorithm and User revocation method for Security EM clustering algorithm to enhance the clusters generation accuracy. Hierarchical algorithm to generate clusters hierarchically. SHA-1 algorithm for hashing Perform the data duplication operation for checking the duplicate data. In this paper study about the related work done, in section II, the proposed approach modules description, mathematical modeling, algorithm and expectedresultin section III. And at final provide a conclusion in sectionIV. 2. LITERATURE REVIEW Chen, Chi, et al.[1], a hierarchical clustering strategy is proposed to support more search semanticsfurthermore to meet the demand for fast cipher text search within a big data environment. The proposed hierarchical approach clusters the documents based on the minimum relevance threshold and then partitions the resulting clusters into sub-clusters until the constraint on the maximum size of cluster is reached. In the search stage, this methodology can achieve a linear computational complexity against an exponential size increment of document collection. All together to confirm the authenticity of searchresults,a structurecalledminimum hash sub-tree is designed. Various well-known [2] authentication protocols are considered with contextof nextgenerationmobileandCE network services. The potential weaknesses of current protocol scan be overcome utilizing Zero Knowledge Proof (ZKP) strategies to ensure client passwords so an alternative ZKP protocol, Se Di Ci 2.0, is depicted. This offers mutual and also two-factor authentication that is viewed as more secure against different phishing endeavors than existing trusted outsider protocols. The suitability of such a ZKP protocol for different CE-based cloud computing applications is illustrated. Wang et al. [3], characterize and solve the issue of secure ranked keyword search over encrypted cloud data. Ranked searchenormouslyupgradesframework usability by enabling search result relevance ranking instead of sending un differentiated results and further guarantees the file retrieval accuracy. In particular, they investigate the statistical measure approach, i.e., relevance score, fromdata recovery to manufacture secure searchable index, and build up a one-to-many order-preserving mapping strategy to appropriately secure those sensitive score data. The resulting design is able to facilitate efficient server-side ranking without losing keyword privacy. Pang et al. [4], presenta privacy-preserving,similarity-based text retrieval scheme that preventstheserverfromprecisely reproducing the term composition of queries and documents, and anonymize the search results from unauthorized observers. In the meantime, their plan preserves the relevance-ranking of the search server, and empowers accounting of the number of documents that every client opens. The effectiveness of the scheme is verified empirically with two real text corpora. Cao et al. [5], interestingly, authors characterize and tackle the challenging issue of privacy-preserving multi-keyword ranked search over encrypted information in cloud computing (MRSE). They build up a set of strict privacy requirements for for such a secure cloud information usage framework. Among different multi-keywordsemantics,they choose the proficient similarity measure of “coordinate matching,” i.e., whatever number matches as possible, to capture the relevance of datadocumentstothesearchquery. They further utilize “inner product similarity” to quantitatively assess such similarity measure. They first propose a fundamental thought for the MRSE based on secure inner product computation, and after that give two essentially enhanced MRSE plans to accomplish different stringent privacy requirements in two distinctive threat models. Sun et al. [6], authors present a privacy-preserving multi- keyword text search (MTS) theme with similarity-based ranking to address this issue. To support multi-keyword search and search result ranking, they propose to create the search index based on term frequency and also the vector area model with cosine similarity live to attainhighersearch result accuracy. To enhance the search efficiency, they propose a tree-based index structure and numerous adaption ways for multi-dimensional (MD) algorithmic rule so the sensible search efficiency is way higher than that of linear search. To further enhance the search privacy, they propose two secure index schemes to fulfill the stringent privacy needs under strong threat models,i.e.,knowncipher text model and known background model. Chen et al. [7], a hierarchical clustering technique for cipher text search within a big data environment is proposed. The proposed approach clusters the documents based on the
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2002 minimum similarity threshold, and after that segments the resultant clusters into sub-clusters until the constraint on the maximum size of cluster is reached. In the search phase, this methodology can achieve a linear computational complexity against exponential size of document collection. In addition, retrieved documents have a better relationship with each other than traditional methods. 3. PROPOSED APPROACH 3.1 Problem statement To design a system that provides relevant rank results by using hierarchical clustering index and data duplication check is performed to reduce memory overhead and searching time. It provides more security byuser-revocation approach. 3.2 Proposed System overview Figure 1.Proposed System Architecture The propose system consist of three entities data owner, the data user and the cloud server. The data owner is responsible for collecting documents, building document index and outsourcing them in an encrypted format to the cloud server. Aside from that, the data user needs to get the authorization from the data owner before getting to the information. The cloud servergivesa hugestoragespaceand the computation resources required by cipher text search. Upon receiving a legal request from the data user, thecloud server searches the encrypted index, and sends back top-k documents that are most likely to match users query. The number k is appropriately chosen by the data user. This framework goes for protecting data from leaking information to the cloud server while improving the efficiency of cipher text search. In this model, both the data owner and the data user are trusted, while the cloud server is semi-trusted. The proposed system consists of different modules the main modules are listed below: Cloud Server: Cloud server is the storage medium on which the data is stored. Data stored on the cloud is in encrypted form by which only authenticated users are able to access the data in this way security is provided for data stored on cloud Data Owner: Data owner are the user which uses the cloud storage to store the data on cloud for the sharing purpose with the different user present in the group. He is the one responsible for encryption of data while storing it on cloud. User Group: This is the group of users who are willing to use the data stored on the cloud. They have made a request in order to access the data. Access control module: At the time when user enters in the group or leaves the group this module is responsible for providing the access keys when one user enters in the group also responsible for the key revocation at the time when the userleavesthe group. Search Control: This module is brought in to action whenusersearchesfor specific keywords on the cloud. This module is able to retrieve the files with the top k ranked documents acceding to the user search. User Revocation and Data Deduplication: To provide the security this system used user revocation approach. To enhance the searching speed data deduplication check is performed at client side. In this approach the repeated or duplicate data is removed and minimize memory overhead and searching time. Steps of the proposed system are as follows: Document Vector Generation Initially User browse the dataset file, perform the operation of stemming, stop word which remove the redundant data, and improve the performance of the system,
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2003 Figure -2: Document Vector Generation K-Means Clustering After document vector generation, clustering process is performed. User enter the number of clusters and perform the k-means clustering operation Figure-3: K-means Clustering Check Deduplication System generates the indexing file, encrypt index file, encrypt files and generate the hash value by using SHA1 algorithm. And final system checks for the deduplication file. Figure -4: Duplication Check EM Clustering As EM clustering is our contribution work, we test the performance of the system, by implementing the system by using EM clustering algorithm Figure-5 EM Clustering 3.3 ALGORITHM In MRSE-HCI architecture the data owner builds the encrypted index depending on the dictionary, random numbers and secret key, the data user submitsa queryto the cloud server for getting desired documents, and the cloud server returns the target documents to the data user. This architecture mainly consists of following algorithms. It isusedtogeneratethesecret key to encrypt index and documents. Encrypted index is generated in this phase by using the above mentioned secret key. At the
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2004 same time, clustering process is also included current phase. Thedocumentcollectionisencrypted bya symmetric encryption algorithm which achievessemantic security. It generates encrypted query vector with users input keywords and secret key. In this phase, cloud server compares trapdoor with index to get the top-k retrieval results. he returned encrypted documents are decrypted by the key generated in the first step. Algorithm 2: Deduplication Checking 1. input the initial set of k cluster Centers C 2. set the threshold TH min 3. while k is not stable 4. generate a new set of cluster centersCϴ byk-means 5. for every cluster centers Cϴλ 6. get the minimum relevance score: min (Si) 7. if the min (Si) <THmin 8. add a new cluster center: k = k + 1 9. go to while 10. until k is steady Algorithm 3: K-means Algorithm 1. db Hash=getting files hash from the client side database which are successfully uploaded to the server 2. File Hash=users chunked file’s hash H(New file) = h H(Old n chunks) = hn Compare h and hn If H(New chunk) == H(Old n files) Chunk is duplicate and refuses it to store on public server Else Chunk is not duplicate and allowed to store on public server Algorithm 4: SHA-1 Algorithm Steps of SHA-1 Step 1: Append Padding Bits Message is“padded” with a 1 and as many 0’s as necessaryto bring the message length to 64 bitsfewer than an even multiple of 512. Step 2: Append Length 64 bits are appendedto the endofthe padded message. These bitshold thebinaryformatof 64 bits indicating thelength of the original message. Algorithm 5: User Revocation Input: User Name Output: User terminated from system Retrieve user List Select user from the retrieve user list Closed all operation from system (Selected User). Then put that selected user in revoked list. 4. RESULTS AND DISCUSSION In this section discussed the experimental result of the proposed system. 4.1 Time Comparison Graph for Clustering Following chart 1 shows the time comparison graph of the different clustering algorithm. Existingsystemusedk means algorithm for the clustering process, proposed system used the EM clustering algorithm for the clustering process. As from the following graph it is concludethattime required for completing the process of clustering by using the K-means algorithm is more than the EM clustering algorithm. Hence by using the EM clustering algorithm performance of the system is improved. Chart -1: Time Comparison graph for clustering 4.2 Time Comparison Graph for Deduplication As if the duplicate file exist in the system,theperformance of the system may be low, therefore in the proposedsystem we implement the concept of deduplication. In the following chart 2 shows the comparison of existing system without using the concept of deduplication and proposed system with using the concept of deduplication. From the figure it is conclude that time required for the system with deduplication is less than the time required for the system without deduplication.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2005 Chart 2. Time Comparison graph for deduplication 4.3 Time Comparison Graph for Searching keyword The search accuracy can measure the clients fulfillment.The Retrieval accuracy is identified with two components: the relevance amongst reportsandthe queriesandtherelevance of documents between each other. Chart-3.Time Comparison graph for searching Keyword 4.4 Relevance of Document From the chart4, we can observe that the relevance of retrieved documents in the MRSE-with clustering is almost twice as many as that in the MRSE-HCI, which means retrieved documents generatedbyMRSE-withclustering are much closer to each other. Chart-4 : Relevance of Document 4.6 Search Time Graph Chart5 describes search efficiency using the different size of document set with unchanged dictionary size, number of retrieved documents and number of query keywords, Chart. 5: Search Time Graph 5. CONCLUSIONS This system examined cipher text search in the circumstances of cloud storage. Also discuss the issues of maintaining the semantic relationship between different plain documents over the related encrypted documents and give the design method to enhance the performance of the semantic search. The existing MRSE-HCIarchitectureadapts the requirements of data explosion, online information retrieval and semantic search. The experimentresultproves that the proposed architecture not only properly solves the multi-keyword ranked search problem, but also brings and improvement in search efficiency, rank security, and the relevance between retrieved documents The proposed system enhance the system performance by implementing user revocation method where user group revocate Also system reduces the memory overhead and enhances
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2006 searching speed by implementing data deduplication approach where duplicate data is removed. REFERENCES [1]. Chen, Chi, et al.“An efficient privacy-preserving ranked keyword search method.”IEEE Transactions on Parallel and Distributed Systems 27.4 (2016): 951-963. [2] S. Grzonkowski, P. M. Corcoran, and T. Coughlin, “Security analysis of authenticationprotocols for next- generation mobile and CE cloud services,” in Proc. IEEEInt. Conf. Consumer Electron., 2011, Berlin, Germany, 2011, pp. 83-87. [3] C. Wang, N. Cao, K. Ren, and W. J. Lou, ``Enabling secure and efficient rankedkeyword search over outsourced cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012. [4] H. Pang, J. Shen, and R. Krishnan, “Privacy-preserving similarity based text retrieval,”ACM Trans. Internet Technol., vol. 10, no. 1, pp. 39, Feb. 2010. [5] N. Cao, C.Wang, M. Li, K. Ren, andW. J. Lou, “Privacy- preserving multi-keywordrankedsearchover encrypted cloud data,” in Proc. IEEE INFOCOM,Shanghai,China, 2011, pp. 829-837. [6] W. Sun, B.Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, “Privacy-preservingmulti-keyword text search in the cloud supporting similarity-based ranking,”inProc. 8th ACM SIGSAC Symp.Inform.,Comput. Commun.Security, Hangzhou,China, 2013, pp. 71-82. [7] C. Chen, X. J. Zhu, P. S. Shen, and J. K. Hu, “A hierarchical clustering methodFor big data oriented cipher text search,” in Proc. IEEE INFOCOM, Workshop onSecurity and Privacy in Big Data, Toronto, Canada, 2014, pp. 559ˆa564. [8] Cash, David, et al. “Dynamic Searchable Encryption in Very-Large [9] Yanzhu Liu, Zhi Li, Wang Guo and Wu Chaoxia, “Privacy- preserving multikeyword rankedsearchover encrypted big data,” Third InternationalConferenceonCyberspace Technology (CCT 2015), Beijing, 2015, pp.1-3. [10] Ching-Yang Tseng, ChangChun Lu and Cheng-Fu Chou, “Efficient privacypreserving multi-keyword ranked search utilizing document replication and partition,” 2015 12th Annual IEEE Consumer Communicationsand Networking Conference(CCNC),LasVegas,NV,2015,pp. [11] C. Wang, N. Cao, K. Ren, and W. J. Lou, “Secure ranked keyword search over encrypted cloud data"The 30th International Conference on Distributed Computing Systems (ICDCS'10), Genoa, Italy, June 21-25, 2010. [12] S. C. Yu, C. Wang, K. Ren, and W. J. Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” in Proc. IEEEINFOCOM,SanDiego, CA, 2010, pp. 1-9.
Baixar agora