SlideShare a Scribd company logo
Enviar pesquisa
Carregar
Efficient Similarity Search over Encrypted Data
Denunciar
Compartilhar
IRJET Journal
Fast Track Publications
Seguir
•
0 gostou
•
37 visualizações
Engenharia
https://www.irjet.net/archives/V4/i6/IRJET-V4I6356.pdf
Leia mais
Efficient Similarity Search over Encrypted Data
•
0 gostou
•
37 visualizações
IRJET Journal
Fast Track Publications
Seguir
Denunciar
Compartilhar
Engenharia
https://www.irjet.net/archives/V4/i6/IRJET-V4I6356.pdf
Leia mais
Efficient Similarity Search over Encrypted Data
1 de 4
Baixar agora
Recomendados
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method por
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
33 visualizações
•
3 slides
Efficient Similarity Search Over Encrypted Data por
Efficient Similarity Search Over Encrypted Data
IRJET Journal
29 visualizações
•
3 slides
Efficient Privacy Preserving Clustering Based Multi Keyword Search por
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET Journal
38 visualizações
•
7 slides
Enabling efficient multi keyword ranked por
Enabling efficient multi keyword ranked
Sakthi Sundaram
160 visualizações
•
12 slides
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD por
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
3.8K visualizações
•
10 slides
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud por
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
12 visualizações
•
3 slides
Mais conteúdo relacionado
Mais procurados
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha... por
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
13 visualizações
•
5 slides
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab... por
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET Journal
26 visualizações
•
4 slides
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ... por
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
11 visualizações
•
4 slides
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus... por
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET Journal
41 visualizações
•
4 slides
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto... por
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
69 visualizações
•
4 slides
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... por
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
5.4K visualizações
•
12 slides
Mais procurados
(18)
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha... por IRJET Journal
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
•
13 visualizações
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab... por IRJET Journal
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET Journal
•
26 visualizações
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ... por IRJET Journal
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
•
11 visualizações
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus... por IRJET Journal
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET Journal
•
41 visualizações
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto... por IRJET Journal
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
•
69 visualizações
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... por Nexgen Technology
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
•
5.4K visualizações
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
•
450 visualizações
Final 1st por gokulprema
Final 1st
gokulprema
•
1K visualizações
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ... por nexgentechnology
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology
•
161 visualizações
Paper id 28201425 por IJRAT
Paper id 28201425
IJRAT
•
231 visualizações
An efficeient privacy preserving ranked keyword search por redpel dot com
An efficeient privacy preserving ranked keyword search
redpel dot com
•
429 visualizações
IJARCCE 20 por Nahan Rahman
IJARCCE 20
Nahan Rahman
•
211 visualizações
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing por IRJET Journal
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET Journal
•
17 visualizações
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme por IRJET Journal
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET Journal
•
52 visualizações
IRJET- Privacy Preserving Encrypted Keyword Search Schemes por IRJET Journal
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
•
35 visualizações
3 ijece 1 ed iqbal qc por IAESIJEECS
3 ijece 1 ed iqbal qc
IAESIJEECS
•
26 visualizações
Retrieving Secure Data from Cloud Using OTP por AM Publications
Retrieving Secure Data from Cloud Using OTP
AM Publications
•
245 visualizações
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M... por IRJET Journal
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
•
298 visualizações
Similar a Efficient Similarity Search over Encrypted Data
Data Search in Cloud using the Encrypted Keywords por
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
34 visualizações
•
4 slides
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp... por
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
6 visualizações
•
2 slides
Multi-Keyword Ranked Search in Encrypted Cloud Storage por
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
30 visualizações
•
5 slides
J017547478 por
J017547478
IOSR Journals
173 visualizações
•
5 slides
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud por
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET Journal
10 visualizações
•
3 slides
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com
416 visualizações
•
12 slides
Similar a Efficient Similarity Search over Encrypted Data
(20)
Data Search in Cloud using the Encrypted Keywords por IRJET Journal
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
•
34 visualizações
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp... por IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
•
6 visualizações
Multi-Keyword Ranked Search in Encrypted Cloud Storage por IRJET Journal
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
•
30 visualizações
J017547478 por IOSR Journals
J017547478
IOSR Journals
•
173 visualizações
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud por IRJET Journal
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET Journal
•
10 visualizações
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por redpel dot com
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com
•
416 visualizações
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in... por IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
•
29 visualizações
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... por 1crore projects
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
•
60 visualizações
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por Pvrtechnologies Nellore
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Pvrtechnologies Nellore
•
244 visualizações
Cloud java titles adrit solutions por Adrit Techno Solutions
Cloud java titles adrit solutions
Adrit Techno Solutions
•
247 visualizações
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ... por IJCI JOURNAL
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
IJCI JOURNAL
•
310 visualizações
A secure and dynamic multi keyword ranked por nexgentech15
A secure and dynamic multi keyword ranked
nexgentech15
•
279 visualizações
2016 BE Final year Projects in chennai - 1 Crore Projects por 1crore projects
2016 BE Final year Projects in chennai - 1 Crore Projects
1crore projects
•
127 visualizações
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN por IRJET Journal
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
IRJET Journal
•
7 visualizações
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme por IRJET Journal
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
•
32 visualizações
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ... por ASAITHAMBIRAJAA
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
ASAITHAMBIRAJAA
•
242 visualizações
Ieeepro techno solutions 2014 ieee java project - query services in cost ef... por hemanthbbc
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
hemanthbbc
•
96 visualizações
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ... por IJSRD
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD
•
246 visualizações
IRJET- Data Mining - Secure Keyword Manager por IRJET Journal
IRJET- Data Mining - Secure Keyword Manager
IRJET Journal
•
8 visualizações
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing por IJERA Editor
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
IJERA Editor
•
1.4K visualizações
Mais de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
22 visualizações
•
7 slides
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 visualizações
•
7 slides
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
8 visualizações
•
5 slides
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 visualizações
•
11 slides
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 visualizações
•
6 slides
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 visualizações
•
5 slides
Mais de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
22 visualizações
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 visualizações
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
8 visualizações
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 visualizações
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 visualizações
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 visualizações
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 visualizações
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 visualizações
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 visualizações
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 visualizações
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 visualizações
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
52 visualizações
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
11 visualizações
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 visualizações
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 visualizações
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 visualizações
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 visualizações
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 visualizações
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
5 visualizações
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 visualizações
Último
CHEMICAL KINETICS.pdf por
CHEMICAL KINETICS.pdf
AguedaGutirrez
13 visualizações
•
337 slides
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78
83 visualizações
•
19 slides
Pull down shoulder press final report docx (1).pdf por
Pull down shoulder press final report docx (1).pdf
Comsat Universal Islamabad Wah Campus
17 visualizações
•
25 slides
802.11 Computer Networks por
802.11 Computer Networks
TusharChoudhary72015
10 visualizações
•
33 slides
DevOps-ITverse-2023-IIT-DU.pptx por
DevOps-ITverse-2023-IIT-DU.pptx
Anowar Hossain
12 visualizações
•
45 slides
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli
12 visualizações
•
16 slides
Último
(20)
CHEMICAL KINETICS.pdf por AguedaGutirrez
CHEMICAL KINETICS.pdf
AguedaGutirrez
•
13 visualizações
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78
•
83 visualizações
Pull down shoulder press final report docx (1).pdf por Comsat Universal Islamabad Wah Campus
Pull down shoulder press final report docx (1).pdf
Comsat Universal Islamabad Wah Campus
•
17 visualizações
802.11 Computer Networks por TusharChoudhary72015
802.11 Computer Networks
TusharChoudhary72015
•
10 visualizações
DevOps-ITverse-2023-IIT-DU.pptx por Anowar Hossain
DevOps-ITverse-2023-IIT-DU.pptx
Anowar Hossain
•
12 visualizações
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli
•
12 visualizações
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptx
deepmitra8
•
15 visualizações
MK__Cert.pdf por Hassan Khan
MK__Cert.pdf
Hassan Khan
•
11 visualizações
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome
•
33 visualizações
What is Unit Testing por Sadaaki Emura
What is Unit Testing
Sadaaki Emura
•
24 visualizações
GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil
•
53 visualizações
Introduction to CAD-CAM.pptx por suyogpatil49
Introduction to CAD-CAM.pptx
suyogpatil49
•
5 visualizações
K8S Roadmap.pdf por MaryamTavakkoli2
K8S Roadmap.pdf
MaryamTavakkoli2
•
8 visualizações
SPICE PARK DEC2023 (6,625 SPICE Models) por Tsuyoshi Horigome
SPICE PARK DEC2023 (6,625 SPICE Models)
Tsuyoshi Horigome
•
28 visualizações
Searching in Data Structure por raghavbirla63
Searching in Data Structure
raghavbirla63
•
7 visualizações
Final Year Presentation por Comsat Universal Islamabad Wah Campus
Final Year Presentation
Comsat Universal Islamabad Wah Campus
•
9 visualizações
SUMIT SQL PROJECT SUPERSTORE 1.pptx por Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav
•
15 visualizações
Effect of deep chemical mixing columns on properties of surrounding soft clay... por AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli
•
9 visualizações
DESIGN OF SPRINGS-UNIT4.pptx por gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
•
19 visualizações
MSA Website Slideshow (16).pdf por msaucla
MSA Website Slideshow (16).pdf
msaucla
•
76 visualizações
Efficient Similarity Search over Encrypted Data
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1864 Efficient Similarity Search over Encrypted Data Mohit Kulkarni1, Nikhil Kumar2, Santosh Vaidande3, B.S.Satpute4 1,2,3 Student, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India. 4Professor, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – In this present time, due to engaging components of appropriated processing, the colossal measure of data has been secured in the cloud. In spite of the way that cloud-based organizations offer many favorable circumstances yet assurance and security of the delicate data is a noteworthy issue. These issues are settled by securing sensitive datafitasa fiddle. Encoded limit secures the data against unapproved get to, yet it cripples some basic and basic handiness like interest operation on the data, i.e. looking the required data by the customer on the mixed data obliges data to be unscrambled first and a short time later look for, so this at last, backs offthe route toward looking for. To achieve this various encryption arranges have been proposed, regardless, most of the arrangements handle amend Query organizing however not Similarity planning. While customer exchanges the record, components are expelled from each report. Right when the customer fires a request, trapdoor of that question is created and interest is performed by finding the relationship among files set away on cloud and request watchword, using Locality Sensitive Hashing. Key Words - Locality sensitive hashing, Encrypted data, Similarity search, Cloud computing, AES Encryption, Trapdoor Construction 1. INTRODUCTION In present information far reaching condition, cloud computing is normal since it expels the weight of gigantic information administration in a savvy way. The touchy information send to non-trusted cloud servers will prompt protection issues. To reduce the stresses, delicate information must be sent in the encoded shape which maintains a strategic distance from unlawful get to. There are numerous calculations which bolster the operation which is called Searchable Encryption Scheme. Ordinarily, all plans are intended for correct question coordinating. Inquiry coordinatingisthewaytowardfinding the client's coveted information from the cloud as indicated by the expressed element. In any case, it is more sensible to perform recovery as per the closeness with the expressed element rather than the presence of it. Comparabilityhuntis an issue that upgrades and finds the point in a given set that is nearest to a given point. It is predefined that efficient techniques are required to do closeness seek over the gigantic measure of encoded information. The fundamental calculation of our venture is the rough close neighbor seeks calculation called Locality Sensitive Hashing (LSH). LSH is comprehensively utilized for quick likeness look on information in data recovery. Our venture has two sections: User 'Transferring the information' and 'Seeking the question'. Fig 1: Complete Process Right off the bat, the client transfers the information. At that point record components are extricated by preprocessingit. Stop words expulsion and Stemming id is the following procedure. The words are part at the specific character to shape pails and proceed till the aggregate length of theword after which they are put away in a document. After that Encryption of both Plaintext and the Indexed document is done and put away in the cloud. 2. LITERATURE SURVEY Cong Wang et al. [1] presents secured rank watch word scan for information put away in the cloud. Right off the bat, they positioned the watch words utilizing compellingpositioning compositions while keeping up security over the cloud and effectiveness of information looked. The positioning is done in view of file development and utilizations positioning capacity to give a score to watchwords. The significant issue in this is computational overhead to rank catchphrases.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1865 Cheng and Mitzenmacher [2] offer to seek on encoded information put away remotely utilizing catchphrases that protect the security of information. Here they portray recovering scrambled information utilizing the watchword record (i.e. lexicon) which is made by the client itself. The word reference is available on the remote server including the record, utilizing which the client can recover the scrambled information while looking after security. It requires additional capacity to store watchword record. Jan Li et al. [3] created plans to recover the scrambled information on the cloud utilizing fluffy catchphrase look while protecting the security and productivity. They have created two plans (trump card based method and gram- based strategy) to develop fluffy catchphrase set which produces coordinating records or shut coordinating documents. The proprietor stores fluffy catchphrases set alongside the record which is changed over into file frame. The proficiency of proposed framework can even now be additionally enhanced for achieving better conceivable outcomes. Qin Lv [4] expounds on multi test LHS composition for ordering which helps effective closeness coordinating for looked inquiry and delivers most ideal outcomes. It utilizes KNN-calculation for coordinating records from numerous pails for a given information question by the client. In this way it requires few hash tables because of examining different basins and spares storage room required to store countless tables. They even lookedatentropybasedLSHand multi-test LSH demonstrating the upsides of multi-test LSH over entropy based LSH. Dan Boneh and Brent Waters [5] offerspeopleingeneral key framework that backings correlation questions on encoded information and additionally more broad inquiries, for example, subset inquiries. These frameworks bolster conjunctive questions which are discretionary in nature without spilling data on individual conjuncts. Also, a general structure for developing and breaking down open key frameworks supporting queries on scrambled information. Openly key frameworks, a mystery key can create tokens for testing any upheld inquiry predicate. The token gives anybody a chance to test the predicate on a given figure content without adapting some other data about the plaintext. It speaks to the general structure to dissect the security of looking on scrambled information frameworks. Mehmet Kuzu [6] proposes an approach which utilizes Locality Sensitive Hashing (LSH) which is the closest neighbor calculation for the file creation. Comparative elements are put into a similar basin with a high likelihood because of the property of LSH while the elementswhichare not comparative are kept in the distinctive pails. On the off chance that the informational index is little, then the correspondence cost and pursuit time required by this plan is better. Yet, in the event that the database measure expands, then the time required for correspondence and for looking additionally increments quickly. They utilize sprout channel for interpretationof strings.However,thedisservice of this structure is that it is a probabilistic information structure. Wenjun Lu et al. [7] offer’s a method to retrieve encrypted multimedia file without decrypting it from cloud while maintaining the confidentiality and privacy of data. They have used different encryption algorithms, securedinverted index and secure min-hash algorithm to achieve the goals. Firstly, the features of image are extracted and indexis build and then the image is encrypted andstoredinremoteserver. The user can retrieve the image by using different queries. The efficiency and security of given system can be further improved. Bing Wang et al. [8] introduces about privacy preserving multi-keyword fuzzy search over encrypted data which is stored on the cloud. Here the author has used different encryption and hashing techniques to maintain privacy of data over cloud. The given method eliminates the need of dictionary. 3. PROPOSED METHODOLOGY Step 1: Uploading of Data Initially data in text file format is been uploaded by data owner. Subsequently three sub process occurs. Initially original data is been encrypted using AES and pattern buckets are stored in Encrypted format in cloud. Secondly data is been preprocessed, matrix Translation is been done creating buckets, data is been stored in as feature data in private cloud. An original copy of data is been stored as complete data in other cloud. Step 2: Input Query preprocessing Input Query is been submitted by Data user to System. System Accepts query performing preprocessing on query. Future query is been Trapdoor to create Query words pattern in encrypted format. Every word is been sent matrix translation creating buckets, this buckets are future encrypted using AES Algorithm.HereinThisprocesspattern
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1866 are been generated using bucket generation. A bucket is set of word list for every word starting from trigram to N gram Approach. Bucket generation Process is as below: “Computing” generates bucket as shown below- “Computing”{ com,comp,compu,comput,computi,computi,computin} Step 3: Bloom Filter Application Data in cloud Stored as feature data is been dynamically copied in feature vector consisting of File name and File Feature. This complete Data is termed as Bloom Filter Data. Step 4: Search correlation Search correlation Pattern matching is beendonewithInput Query and Trapdoor query. Both vectors arebeencompared and Correlation vector for input query is been generated. This vector is been sent for future correlation evaluation. Step 5: Ginix index Search results are been displayed in all files that have been matched for given query input 4. ALGORITHM ALGORITHM 1: BUILD MATRIX Require: D: data item collection, Ψ : security parameter, MAX: maximum possible number of features Kid ← Keygen(Ψ), Kpayload ← Keygen(Ψ) for all Di € D do Fi ← extract features of Di for all fij € Fi do fij ← apply metric space translation on fij for all gk € g do if gk(fij ) € bucket identifier list then add gk(fij ) to the bucket identifier list Initialize Vgk(fij) as a zero vector of size |D| Increment recordCount end if Vgk(fij)[id(Di)] ← 1 end for end for end for for all Bk € bucket identifier list do VBk ← retrieve payload of Bk πBk ← EncKid (Bk), σVBk ← EncKpayload (VBk ) add (πBk , σVBk) to I end for return I ALGORITHM 2: MATRIX SPACE TRANSLATION //Input : Data collection Set D ={ Di } //Output: Matrix space Set MS Step 0:Start Step 1: Get the Set D Step 2: FOR i=0 to Size of D Step 3: get Si of Di Step 4: FOR j=0 to length of si Step 5: sbi=substring(si,2→j) Step 6: Add sbi to MS Step 7: END FOR Step 8: END FOR Step 9: return MS Step 10: Stop 5. RESULTS Some trial assessments are performed to demonstrate the adequacy of the framework. What's more,theseanalysesare led on windows based java machine with generally utilized IDE Net beans. Likewise the quantities of recovered records are utilized to set benchmark for execution assessment. Quantities of applicable recovered archives from the cloud for the arrangement of catchphrases are utilized to demonstrate the adequacy of the framework. The following are the meaning of the utilized measuring methods i.e. exactness and review. Exactness: it is a proportion of quantities of appropriate archives recovered to the total of aggregate quantities of important and immaterial records recovered. Relative viability of the framework is very much communicated by utilizing accuracy parameters. Review: it is a proportion of aggregate quantities of applicable archives recovered to the aggregate quantities of pertinent records not recovered. Supreme precision of the framework is all around described by utilizing review parameter.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1867 Quantities of situations presents where one measuring parameter rules the other. By thinking about such parameters we utilized two measuring parameters, for example, accuracy and review. For Detailed Examination • A = No. of relevant docs retrieved • B =No of relevant documents not retrieved • C = No of irrelevant documents are retrieved. So, Precision = (A/ (A+ C))*100 And Recall = (A/ (A+ B))*100 Fig.3.Average precision of the similarity search method In Fig. 3, by observing figure 3 it is clear that average precision obtained by using similarity search method is approximately 65%. Fig.4. Average Recall of the similarity search method In Fig. 4, figure shows that the system gives 95% recall for the similarity search method. By comparing these two graphs we can conclude that the similarity search method gives high recall value compare to the precision value. 6. CONCLUSION Search over encrypted System assist in retrieving file that contains required information without decryption process. This would enhance search processincloudwherefiles areb been encrypted and stored. In above project work search time has been found to be low. Effective retrieval of documents measuring precision and recall. REFERENCES [1] Cong Wang, Ning Cao, Jin Li, Kui Ren and Wenjing Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data”, IEEE 30th International Conference on Distributed Computing Systems, 2010, pp. 253-262, doi:10.1109/ICDCS.2010.34. [2] Yan-Cheng Chang and Michael Mitzenmacher, “Privacy Preserving Keyword Searches on Remote Encrypted Data”, in Proc. of ACNS’05, 2005, pp. 442-455, Springer Berlin Heidelberg. [3] Jan Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, “Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing”, Proc. of IEEE INFOCOM’10 Mini- Conference, March 2010, pp. 1-5, IEEE. [4] Qin Lv, William Josephson, Zhe Wang, Moses Charikar, Kai Li, “Multi-Probe LSH: Efficient Indexing for High Dimensional Similarity Search”, in Proceedings of the 33rd international conferenceon verylargedatabases,September 2007, pp. 950-961, VLDB Endowment. [5] Dan Boneh and Brent Waters, “Conjunctive, Subset and Range Queries on Encrypted Data”, in Theory of Cryptography Conference, February 2007, pp. 535-554, Springer Berlin Heidelberg. [6] Kuzu Mehmet, Mohammad Saiful Islam, Murat Kantarcioglu, “Efficient Similarity Search Over Encrypted Data”, in Data Engineering (ICDE), 2012 IEEE28th International Conference, IEEE, 2012. [7] Wenjun Lu, Ashwin Swami Nathan, Avinash L. Varna, and Min Wu, “Enabling search over encrypted multimedia databases” InIS&T/SPIE Electronic Imaging, Feb 2009 , pp. 725418-725418, International Society for Optics and Photonics. [8] Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, “Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud” InINFOCOM, 2014Proceedings IEEE, April 2014, pp. 2112-2120, IEEE.
Baixar agora