Efficient Similarity Search over Encrypted Data

IRJET Journal
IRJET JournalFast Track Publications

https://www.irjet.net/archives/V4/i6/IRJET-V4I6356.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1864
Efficient Similarity Search over Encrypted Data
Mohit Kulkarni1, Nikhil Kumar2, Santosh Vaidande3, B.S.Satpute4
1,2,3 Student, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India.
4Professor, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – In this present time, due to engaging components
of appropriated processing, the colossal measure of data has
been secured in the cloud. In spite of the way that cloud-based
organizations offer many favorable circumstances yet
assurance and security of the delicate data is a noteworthy
issue. These issues are settled by securing sensitive datafitasa
fiddle. Encoded limit secures the data against unapproved get
to, yet it cripples some basic and basic handiness like interest
operation on the data, i.e. looking the required data by the
customer on the mixed data obliges data to be unscrambled
first and a short time later look for, so this at last, backs offthe
route toward looking for. To achieve this various encryption
arranges have been proposed, regardless, most of the
arrangements handle amend Query organizing however not
Similarity planning. While customer exchanges the record,
components are expelled from each report. Right when the
customer fires a request, trapdoor of that question is created
and interest is performed by finding the relationship among
files set away on cloud and request watchword, using Locality
Sensitive Hashing.
Key Words - Locality sensitive hashing, Encrypted data,
Similarity search, Cloud computing, AES Encryption,
Trapdoor Construction
1. INTRODUCTION
In present information far reaching condition, cloud
computing is normal since it expels the weight of gigantic
information administration in a savvy way. The touchy
information send to non-trusted cloud servers will prompt
protection issues. To reduce the stresses, delicate
information must be sent in the encoded shape which
maintains a strategic distance from unlawful get to. There
are numerous calculations which bolster the operation
which is called Searchable Encryption Scheme.
Ordinarily, all plans are intended for correct question
coordinating. Inquiry coordinatingisthewaytowardfinding
the client's coveted information from the cloud as indicated
by the expressed element. In any case, it is more sensible to
perform recovery as per the closeness with the expressed
element rather than the presence of it. Comparabilityhuntis
an issue that upgrades and finds the point in a given set that
is nearest to a given point. It is predefined that efficient
techniques are required to do closeness seek over the
gigantic measure of encoded information. The fundamental
calculation of our venture is the rough close neighbor seeks
calculation called Locality Sensitive Hashing (LSH). LSH is
comprehensively utilized for quick likeness look on
information in data recovery. Our venture has two sections:
User 'Transferring the information' and 'Seeking the
question'.
Fig 1: Complete Process
Right off the bat, the client transfers the information. At that
point record components are extricated by preprocessingit.
Stop words expulsion and Stemming id is the following
procedure. The words are part at the specific character to
shape pails and proceed till the aggregate length of theword
after which they are put away in a document. After that
Encryption of both Plaintext and the Indexed document is
done and put away in the cloud.
2. LITERATURE SURVEY
Cong Wang et al. [1] presents secured rank watch word scan
for information put away in the cloud. Right off the bat, they
positioned the watch words utilizing compellingpositioning
compositions while keeping up security over the cloud and
effectiveness of information looked. The positioning is done
in view of file development and utilizations positioning
capacity to give a score to watchwords. The significant issue
in this is computational overhead to rank catchphrases.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1865
Cheng and Mitzenmacher [2] offer to seek on encoded
information put away remotely utilizing catchphrases that
protect the security of information. Here they portray
recovering scrambled information utilizing the watchword
record (i.e. lexicon) which is made by the client itself. The
word reference is available on the remote server including
the record, utilizing which the client can recover the
scrambled information while looking after security. It
requires additional capacity to store watchword record.
Jan Li et al. [3] created plans to recover the scrambled
information on the cloud utilizing fluffy catchphrase look
while protecting the security and productivity. They have
created two plans (trump card based method and gram-
based strategy) to develop fluffy catchphrase set which
produces coordinating records or shut coordinating
documents. The proprietor stores fluffy catchphrases set
alongside the record which is changed over into file frame.
The proficiency of proposed framework can even now be
additionally enhanced for achieving better conceivable
outcomes.
Qin Lv [4] expounds on multi test LHS composition for
ordering which helps effective closeness coordinating for
looked inquiry and delivers most ideal outcomes. It utilizes
KNN-calculation for coordinating records from numerous
pails for a given information question by the client. In this
way it requires few hash tables because of examining
different basins and spares storage room required to store
countless tables. They even lookedatentropybasedLSHand
multi-test LSH demonstrating the upsides of multi-test LSH
over entropy based LSH.
Dan Boneh and Brent Waters [5] offerspeopleingeneral key
framework that backings correlation questions on encoded
information and additionally more broad inquiries, for
example, subset inquiries. These frameworks bolster
conjunctive questions which are discretionary in nature
without spilling data on individual conjuncts. Also, a general
structure for developing and breaking down open key
frameworks supporting queries on scrambled information.
Openly key frameworks, a mystery key can create tokens for
testing any upheld inquiry predicate. The token gives
anybody a chance to test the predicate on a given figure
content without adapting some other data about the
plaintext. It speaks to the general structure to dissect the
security of looking on scrambled information frameworks.
Mehmet Kuzu [6] proposes an approach which utilizes
Locality Sensitive Hashing (LSH) which is the closest
neighbor calculation for the file creation. Comparative
elements are put into a similar basin with a high likelihood
because of the property of LSH while the elementswhichare
not comparative are kept in the distinctive pails. On the off
chance that the informational index is little, then the
correspondence cost and pursuit time required by this plan
is better. Yet, in the event that the database measure
expands, then the time required for correspondence and for
looking additionally increments quickly. They utilize sprout
channel for interpretationof strings.However,thedisservice
of this structure is that it is a probabilistic information
structure.
Wenjun Lu et al. [7] offer’s a method to retrieve encrypted
multimedia file without decrypting it from cloud while
maintaining the confidentiality and privacy of data. They
have used different encryption algorithms, securedinverted
index and secure min-hash algorithm to achieve the goals.
Firstly, the features of image are extracted and indexis build
and then the image is encrypted andstoredinremoteserver.
The user can retrieve the image by using different queries.
The efficiency and security of given system can be further
improved.
Bing Wang et al. [8] introduces about privacy preserving
multi-keyword fuzzy search over encrypted data which is
stored on the cloud. Here the author has used different
encryption and hashing techniques to maintain privacy of
data over cloud. The given method eliminates the need of
dictionary.
3. PROPOSED METHODOLOGY
Step 1: Uploading of Data
Initially data in text file format is been uploaded by data
owner. Subsequently three sub process occurs. Initially
original data is been encrypted using AES and pattern
buckets are stored in Encrypted format in cloud. Secondly
data is been preprocessed, matrix Translation is been done
creating buckets, data is been stored in as feature data in
private cloud. An original copy of data is been stored as
complete data in other cloud.
Step 2: Input Query preprocessing
Input Query is been submitted by Data user to System.
System Accepts query performing preprocessing on query.
Future query is been Trapdoor to create Query words
pattern in encrypted format. Every word is been sent matrix
translation creating buckets, this buckets are future
encrypted using AES Algorithm.HereinThisprocesspattern
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1866
are been generated using bucket generation. A bucket is set
of word list for every word starting from trigram to N gram
Approach.
Bucket generation Process is as below:
“Computing” generates bucket as shown below-
“Computing”{
com,comp,compu,comput,computi,computi,computin}
Step 3: Bloom Filter Application
Data in cloud Stored as feature data is been dynamically
copied in feature vector consisting of File name and File
Feature. This complete Data is termed as Bloom Filter Data.
Step 4: Search correlation
Search correlation Pattern matching is beendonewithInput
Query and Trapdoor query. Both vectors arebeencompared
and Correlation vector for input query is been generated.
This vector is been sent for future correlation evaluation.
Step 5: Ginix index
Search results are been displayed in all files that have been
matched for given query input
4. ALGORITHM
ALGORITHM 1: BUILD MATRIX
Require: D: data item collection,
Ψ : security parameter,
MAX: maximum possible number of features
Kid ← Keygen(Ψ), Kpayload ← Keygen(Ψ)
for all Di € D do
Fi ← extract features of Di
for all fij € Fi do
fij ← apply metric space translation on fij
for all gk € g do
if gk(fij ) € bucket identifier list then
add gk(fij ) to the bucket identifier list
Initialize Vgk(fij) as a zero vector of size |D|
Increment recordCount
end if
Vgk(fij)[id(Di)] ← 1
end for
end for
end for
for all Bk € bucket identifier list do
VBk ← retrieve payload of Bk
πBk ← EncKid (Bk), σVBk ← EncKpayload (VBk )
add (πBk , σVBk) to I
end for
return I
ALGORITHM 2: MATRIX SPACE TRANSLATION
//Input : Data collection Set D ={ Di }
//Output: Matrix space Set MS
Step 0:Start
Step 1: Get the Set D
Step 2: FOR i=0 to Size of D
Step 3: get Si of Di
Step 4: FOR j=0 to length of si
Step 5: sbi=substring(si,2→j)
Step 6: Add sbi to MS
Step 7: END FOR
Step 8: END FOR
Step 9: return MS
Step 10: Stop
5. RESULTS
Some trial assessments are performed to demonstrate the
adequacy of the framework. What's more,theseanalysesare
led on windows based java machine with generally utilized
IDE Net beans. Likewise the quantities of recovered records
are utilized to set benchmark for execution assessment.
Quantities of applicable recovered archives from the cloud
for the arrangement of catchphrases are utilized to
demonstrate the adequacy of the framework. The following
are the meaning of the utilized measuring methods i.e.
exactness and review.
Exactness: it is a proportion of quantities of appropriate
archives recovered to the total of aggregate quantities of
important and immaterial records recovered. Relative
viability of the framework is very much communicated by
utilizing accuracy parameters.
Review: it is a proportion of aggregate quantities of
applicable archives recovered to the aggregate quantities of
pertinent records not recovered. Supreme precision of the
framework is all around described by utilizing review
parameter.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1867
Quantities of situations presents where one measuring
parameter rules the other. By thinking about such
parameters we utilized two measuring parameters, for
example, accuracy and review.
For Detailed Examination
• A = No. of relevant docs retrieved
• B =No of relevant documents not retrieved
• C = No of irrelevant documents are retrieved.
So, Precision = (A/ (A+ C))*100
And Recall = (A/ (A+ B))*100
Fig.3.Average precision of the similarity search method
In Fig. 3, by observing figure 3 it is clear that average
precision obtained by using similarity search method is
approximately 65%.
Fig.4. Average Recall of the similarity search method
In Fig. 4, figure shows that the system gives 95% recall for
the similarity search method. By comparing these two
graphs we can conclude that the similarity search method
gives high recall value compare to the precision value.
6. CONCLUSION
Search over encrypted System assist in retrieving file that
contains required information without decryption process.
This would enhance search processincloudwherefiles areb
been encrypted and stored. In above project work search
time has been found to be low. Effective retrieval of
documents measuring precision and recall.
REFERENCES
[1] Cong Wang, Ning Cao, Jin Li, Kui Ren and Wenjing Lou,
“Secure Ranked Keyword Search over Encrypted Cloud
Data”, IEEE 30th International Conference on Distributed
Computing Systems, 2010, pp. 253-262,
doi:10.1109/ICDCS.2010.34.
[2] Yan-Cheng Chang and Michael Mitzenmacher, “Privacy
Preserving Keyword Searches on Remote Encrypted Data”,
in Proc. of ACNS’05, 2005, pp. 442-455, Springer Berlin
Heidelberg.
[3] Jan Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, “Enabling
Efficient Fuzzy Keyword Search over Encrypted Data in
Cloud Computing”, Proc. of IEEE INFOCOM’10 Mini-
Conference, March 2010, pp. 1-5, IEEE.
[4] Qin Lv, William Josephson, Zhe Wang, Moses Charikar,
Kai Li, “Multi-Probe LSH: Efficient Indexing for High
Dimensional Similarity Search”, in Proceedings of the 33rd
international conferenceon verylargedatabases,September
2007, pp. 950-961, VLDB Endowment.
[5] Dan Boneh and Brent Waters, “Conjunctive, Subset and
Range Queries on Encrypted Data”, in Theory of
Cryptography Conference, February 2007, pp. 535-554,
Springer Berlin Heidelberg.
[6] Kuzu Mehmet, Mohammad Saiful Islam, Murat
Kantarcioglu, “Efficient Similarity Search Over Encrypted
Data”, in Data Engineering (ICDE), 2012 IEEE28th
International Conference, IEEE, 2012.
[7] Wenjun Lu, Ashwin Swami Nathan, Avinash L. Varna,
and Min Wu, “Enabling search over encrypted multimedia
databases” InIS&T/SPIE Electronic Imaging, Feb 2009 ,
pp. 725418-725418, International Society for Optics and
Photonics.
[8] Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou,
“Privacy-preserving multi-keyword fuzzy search over
encrypted data in the cloud” InINFOCOM, 2014Proceedings
IEEE, April 2014, pp. 2112-2120, IEEE.

Recomendados

A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method por
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodIRJET Journal
33 visualizações3 slides
Efficient Similarity Search Over Encrypted Data por
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataIRJET Journal
29 visualizações3 slides
Efficient Privacy Preserving Clustering Based Multi Keyword Search por
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search IRJET Journal
38 visualizações7 slides
Enabling efficient multi keyword ranked por
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword rankedSakthi Sundaram
160 visualizações12 slides
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD por
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
3.8K visualizações10 slides
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud por
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
12 visualizações3 slides

Mais conteúdo relacionado

Mais procurados

IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha... por
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET Journal
13 visualizações5 slides
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab... por
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET Journal
26 visualizações4 slides
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ... por
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET Journal
11 visualizações4 slides
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus... por
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...IRJET Journal
41 visualizações4 slides
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto... por
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
69 visualizações4 slides
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... por
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
5.4K visualizações12 slides

Mais procurados(18)

IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha... por IRJET Journal
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal13 visualizações
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab... por IRJET Journal
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET Journal26 visualizações
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ... por IRJET Journal
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal11 visualizações
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus... por IRJET Journal
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET Journal41 visualizações
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto... por IRJET Journal
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal69 visualizações
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... por Nexgen Technology
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology 5.4K visualizações
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over por IEEEMEMTECHSTUDENTPROJECTS
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS450 visualizações
Final 1st por gokulprema
Final 1stFinal 1st
Final 1st
gokulprema1K visualizações
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ... por nexgentechnology
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology161 visualizações
Paper id 28201425 por IJRAT
Paper id 28201425Paper id 28201425
Paper id 28201425
IJRAT231 visualizações
An efficeient privacy preserving ranked keyword search por redpel dot com
An efficeient privacy preserving ranked keyword searchAn efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword search
redpel dot com429 visualizações
IJARCCE 20 por Nahan Rahman
IJARCCE 20IJARCCE 20
IJARCCE 20
Nahan Rahman211 visualizações
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing por IRJET Journal
IRJET- Proficient Recovery Over Records using Encryption in Cloud ComputingIRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET- Proficient Recovery Over Records using Encryption in Cloud Computing
IRJET Journal17 visualizações
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme por IRJET Journal
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET Journal52 visualizações
IRJET- Privacy Preserving Encrypted Keyword Search Schemes por IRJET Journal
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal35 visualizações
3 ijece 1 ed iqbal qc por IAESIJEECS
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
IAESIJEECS26 visualizações
Retrieving Secure Data from Cloud Using OTP por AM Publications
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
AM Publications245 visualizações
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M... por IRJET Journal
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal298 visualizações

Similar a Efficient Similarity Search over Encrypted Data

Data Search in Cloud using the Encrypted Keywords por
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
34 visualizações4 slides
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp... por
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...IRJET Journal
6 visualizações2 slides
Multi-Keyword Ranked Search in Encrypted Cloud Storage por
Multi-Keyword Ranked Search in Encrypted Cloud StorageMulti-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud StorageIRJET Journal
30 visualizações5 slides
J017547478 por
J017547478J017547478
J017547478IOSR Journals
173 visualizações5 slides
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud por
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET Journal
10 visualizações3 slides
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...redpel dot com
416 visualizações12 slides

Similar a Efficient Similarity Search over Encrypted Data(20)

Data Search in Cloud using the Encrypted Keywords por IRJET Journal
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
IRJET Journal34 visualizações
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp... por IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal6 visualizações
Multi-Keyword Ranked Search in Encrypted Cloud Storage por IRJET Journal
Multi-Keyword Ranked Search in Encrypted Cloud StorageMulti-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal30 visualizações
J017547478 por IOSR Journals
J017547478J017547478
J017547478
IOSR Journals173 visualizações
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud por IRJET Journal
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET Journal10 visualizações
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por redpel dot com
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com416 visualizações
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in... por IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal29 visualizações
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ... por 1crore projects
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects60 visualizações
Enabling efficient multi keyword ranked search over encrypted mobile cloud da... por Pvrtechnologies Nellore
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Pvrtechnologies Nellore244 visualizações
Cloud java titles adrit solutions por Adrit Techno Solutions
Cloud java titles adrit solutionsCloud java titles adrit solutions
Cloud java titles adrit solutions
Adrit Techno Solutions247 visualizações
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ... por IJCI JOURNAL
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
IJCI JOURNAL310 visualizações
A secure and dynamic multi keyword ranked por nexgentech15
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
nexgentech15279 visualizações
2016 BE Final year Projects in chennai - 1 Crore Projects por 1crore projects
2016 BE Final year Projects in chennai - 1 Crore Projects 2016 BE Final year Projects in chennai - 1 Crore Projects
2016 BE Final year Projects in chennai - 1 Crore Projects
1crore projects127 visualizações
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN por IRJET Journal
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAINCLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
CLOUD STORAGE AND RETRIEVAL USING BLOCKCHAIN
IRJET Journal7 visualizações
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme por IRJET Journal
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal32 visualizações
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ... por ASAITHAMBIRAJAA
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
ASAITHAMBIRAJAA242 visualizações
Ieeepro techno solutions 2014 ieee java project - query services in cost ef... por hemanthbbc
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
hemanthbbc96 visualizações
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ... por IJSRD
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD 246 visualizações
IRJET- Data Mining - Secure Keyword Manager por IRJET Journal
IRJET- Data Mining - Secure Keyword ManagerIRJET- Data Mining - Secure Keyword Manager
IRJET- Data Mining - Secure Keyword Manager
IRJET Journal8 visualizações
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing por IJERA Editor
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
IJERA Editor1.4K visualizações

Mais de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
22 visualizações7 slides
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 visualizações7 slides
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
8 visualizações5 slides
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 visualizações11 slides
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 visualizações6 slides
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 visualizações5 slides

Mais de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal22 visualizações
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 visualizações
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal8 visualizações
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 visualizações
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 visualizações
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 visualizações
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 visualizações
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 visualizações
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 visualizações
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 visualizações
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 visualizações
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal52 visualizações
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal11 visualizações
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 visualizações
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 visualizações
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 visualizações
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 visualizações
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 visualizações
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal5 visualizações
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 visualizações

Último

CHEMICAL KINETICS.pdf por
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdfAguedaGutirrez
13 visualizações337 slides
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptxlwang78
83 visualizações19 slides
Pull down shoulder press final report docx (1).pdf por
Pull down shoulder press final report docx (1).pdfPull down shoulder press final report docx (1).pdf
Pull down shoulder press final report docx (1).pdfComsat Universal Islamabad Wah Campus
17 visualizações25 slides
802.11 Computer Networks por
802.11 Computer Networks802.11 Computer Networks
802.11 Computer NetworksTusharChoudhary72015
10 visualizações33 slides
DevOps-ITverse-2023-IIT-DU.pptx por
DevOps-ITverse-2023-IIT-DU.pptxDevOps-ITverse-2023-IIT-DU.pptx
DevOps-ITverse-2023-IIT-DU.pptxAnowar Hossain
12 visualizações45 slides
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...AltinKaradagli
12 visualizações16 slides

Último(20)

CHEMICAL KINETICS.pdf por AguedaGutirrez
CHEMICAL KINETICS.pdfCHEMICAL KINETICS.pdf
CHEMICAL KINETICS.pdf
AguedaGutirrez13 visualizações
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang7883 visualizações
DevOps-ITverse-2023-IIT-DU.pptx por Anowar Hossain
DevOps-ITverse-2023-IIT-DU.pptxDevOps-ITverse-2023-IIT-DU.pptx
DevOps-ITverse-2023-IIT-DU.pptx
Anowar Hossain12 visualizações
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli12 visualizações
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra815 visualizações
MK__Cert.pdf por Hassan Khan
MK__Cert.pdfMK__Cert.pdf
MK__Cert.pdf
Hassan Khan11 visualizações
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome33 visualizações
What is Unit Testing por Sadaaki Emura
What is Unit TestingWhat is Unit Testing
What is Unit Testing
Sadaaki Emura24 visualizações
GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil53 visualizações
Introduction to CAD-CAM.pptx por suyogpatil49
Introduction to CAD-CAM.pptxIntroduction to CAD-CAM.pptx
Introduction to CAD-CAM.pptx
suyogpatil495 visualizações
K8S Roadmap.pdf por MaryamTavakkoli2
K8S Roadmap.pdfK8S Roadmap.pdf
K8S Roadmap.pdf
MaryamTavakkoli28 visualizações
SPICE PARK DEC2023 (6,625 SPICE Models) por Tsuyoshi Horigome
SPICE PARK DEC2023 (6,625 SPICE Models) SPICE PARK DEC2023 (6,625 SPICE Models)
SPICE PARK DEC2023 (6,625 SPICE Models)
Tsuyoshi Horigome28 visualizações
Searching in Data Structure por raghavbirla63
Searching in Data StructureSearching in Data Structure
Searching in Data Structure
raghavbirla637 visualizações
SUMIT SQL PROJECT SUPERSTORE 1.pptx por Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 15 visualizações
Effect of deep chemical mixing columns on properties of surrounding soft clay... por AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli9 visualizações
DESIGN OF SPRINGS-UNIT4.pptx por gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptxDESIGN OF SPRINGS-UNIT4.pptx
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy19 visualizações
MSA Website Slideshow (16).pdf por msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla76 visualizações

Efficient Similarity Search over Encrypted Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1864 Efficient Similarity Search over Encrypted Data Mohit Kulkarni1, Nikhil Kumar2, Santosh Vaidande3, B.S.Satpute4 1,2,3 Student, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India. 4Professor, Dept. of Computer Engineering, Dr. D. Y. Patil Institute of Technology, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – In this present time, due to engaging components of appropriated processing, the colossal measure of data has been secured in the cloud. In spite of the way that cloud-based organizations offer many favorable circumstances yet assurance and security of the delicate data is a noteworthy issue. These issues are settled by securing sensitive datafitasa fiddle. Encoded limit secures the data against unapproved get to, yet it cripples some basic and basic handiness like interest operation on the data, i.e. looking the required data by the customer on the mixed data obliges data to be unscrambled first and a short time later look for, so this at last, backs offthe route toward looking for. To achieve this various encryption arranges have been proposed, regardless, most of the arrangements handle amend Query organizing however not Similarity planning. While customer exchanges the record, components are expelled from each report. Right when the customer fires a request, trapdoor of that question is created and interest is performed by finding the relationship among files set away on cloud and request watchword, using Locality Sensitive Hashing. Key Words - Locality sensitive hashing, Encrypted data, Similarity search, Cloud computing, AES Encryption, Trapdoor Construction 1. INTRODUCTION In present information far reaching condition, cloud computing is normal since it expels the weight of gigantic information administration in a savvy way. The touchy information send to non-trusted cloud servers will prompt protection issues. To reduce the stresses, delicate information must be sent in the encoded shape which maintains a strategic distance from unlawful get to. There are numerous calculations which bolster the operation which is called Searchable Encryption Scheme. Ordinarily, all plans are intended for correct question coordinating. Inquiry coordinatingisthewaytowardfinding the client's coveted information from the cloud as indicated by the expressed element. In any case, it is more sensible to perform recovery as per the closeness with the expressed element rather than the presence of it. Comparabilityhuntis an issue that upgrades and finds the point in a given set that is nearest to a given point. It is predefined that efficient techniques are required to do closeness seek over the gigantic measure of encoded information. The fundamental calculation of our venture is the rough close neighbor seeks calculation called Locality Sensitive Hashing (LSH). LSH is comprehensively utilized for quick likeness look on information in data recovery. Our venture has two sections: User 'Transferring the information' and 'Seeking the question'. Fig 1: Complete Process Right off the bat, the client transfers the information. At that point record components are extricated by preprocessingit. Stop words expulsion and Stemming id is the following procedure. The words are part at the specific character to shape pails and proceed till the aggregate length of theword after which they are put away in a document. After that Encryption of both Plaintext and the Indexed document is done and put away in the cloud. 2. LITERATURE SURVEY Cong Wang et al. [1] presents secured rank watch word scan for information put away in the cloud. Right off the bat, they positioned the watch words utilizing compellingpositioning compositions while keeping up security over the cloud and effectiveness of information looked. The positioning is done in view of file development and utilizations positioning capacity to give a score to watchwords. The significant issue in this is computational overhead to rank catchphrases.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1865 Cheng and Mitzenmacher [2] offer to seek on encoded information put away remotely utilizing catchphrases that protect the security of information. Here they portray recovering scrambled information utilizing the watchword record (i.e. lexicon) which is made by the client itself. The word reference is available on the remote server including the record, utilizing which the client can recover the scrambled information while looking after security. It requires additional capacity to store watchword record. Jan Li et al. [3] created plans to recover the scrambled information on the cloud utilizing fluffy catchphrase look while protecting the security and productivity. They have created two plans (trump card based method and gram- based strategy) to develop fluffy catchphrase set which produces coordinating records or shut coordinating documents. The proprietor stores fluffy catchphrases set alongside the record which is changed over into file frame. The proficiency of proposed framework can even now be additionally enhanced for achieving better conceivable outcomes. Qin Lv [4] expounds on multi test LHS composition for ordering which helps effective closeness coordinating for looked inquiry and delivers most ideal outcomes. It utilizes KNN-calculation for coordinating records from numerous pails for a given information question by the client. In this way it requires few hash tables because of examining different basins and spares storage room required to store countless tables. They even lookedatentropybasedLSHand multi-test LSH demonstrating the upsides of multi-test LSH over entropy based LSH. Dan Boneh and Brent Waters [5] offerspeopleingeneral key framework that backings correlation questions on encoded information and additionally more broad inquiries, for example, subset inquiries. These frameworks bolster conjunctive questions which are discretionary in nature without spilling data on individual conjuncts. Also, a general structure for developing and breaking down open key frameworks supporting queries on scrambled information. Openly key frameworks, a mystery key can create tokens for testing any upheld inquiry predicate. The token gives anybody a chance to test the predicate on a given figure content without adapting some other data about the plaintext. It speaks to the general structure to dissect the security of looking on scrambled information frameworks. Mehmet Kuzu [6] proposes an approach which utilizes Locality Sensitive Hashing (LSH) which is the closest neighbor calculation for the file creation. Comparative elements are put into a similar basin with a high likelihood because of the property of LSH while the elementswhichare not comparative are kept in the distinctive pails. On the off chance that the informational index is little, then the correspondence cost and pursuit time required by this plan is better. Yet, in the event that the database measure expands, then the time required for correspondence and for looking additionally increments quickly. They utilize sprout channel for interpretationof strings.However,thedisservice of this structure is that it is a probabilistic information structure. Wenjun Lu et al. [7] offer’s a method to retrieve encrypted multimedia file without decrypting it from cloud while maintaining the confidentiality and privacy of data. They have used different encryption algorithms, securedinverted index and secure min-hash algorithm to achieve the goals. Firstly, the features of image are extracted and indexis build and then the image is encrypted andstoredinremoteserver. The user can retrieve the image by using different queries. The efficiency and security of given system can be further improved. Bing Wang et al. [8] introduces about privacy preserving multi-keyword fuzzy search over encrypted data which is stored on the cloud. Here the author has used different encryption and hashing techniques to maintain privacy of data over cloud. The given method eliminates the need of dictionary. 3. PROPOSED METHODOLOGY Step 1: Uploading of Data Initially data in text file format is been uploaded by data owner. Subsequently three sub process occurs. Initially original data is been encrypted using AES and pattern buckets are stored in Encrypted format in cloud. Secondly data is been preprocessed, matrix Translation is been done creating buckets, data is been stored in as feature data in private cloud. An original copy of data is been stored as complete data in other cloud. Step 2: Input Query preprocessing Input Query is been submitted by Data user to System. System Accepts query performing preprocessing on query. Future query is been Trapdoor to create Query words pattern in encrypted format. Every word is been sent matrix translation creating buckets, this buckets are future encrypted using AES Algorithm.HereinThisprocesspattern
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1866 are been generated using bucket generation. A bucket is set of word list for every word starting from trigram to N gram Approach. Bucket generation Process is as below: “Computing” generates bucket as shown below- “Computing”{ com,comp,compu,comput,computi,computi,computin} Step 3: Bloom Filter Application Data in cloud Stored as feature data is been dynamically copied in feature vector consisting of File name and File Feature. This complete Data is termed as Bloom Filter Data. Step 4: Search correlation Search correlation Pattern matching is beendonewithInput Query and Trapdoor query. Both vectors arebeencompared and Correlation vector for input query is been generated. This vector is been sent for future correlation evaluation. Step 5: Ginix index Search results are been displayed in all files that have been matched for given query input 4. ALGORITHM ALGORITHM 1: BUILD MATRIX Require: D: data item collection, Ψ : security parameter, MAX: maximum possible number of features Kid ← Keygen(Ψ), Kpayload ← Keygen(Ψ) for all Di € D do Fi ← extract features of Di for all fij € Fi do fij ← apply metric space translation on fij for all gk € g do if gk(fij ) € bucket identifier list then add gk(fij ) to the bucket identifier list Initialize Vgk(fij) as a zero vector of size |D| Increment recordCount end if Vgk(fij)[id(Di)] ← 1 end for end for end for for all Bk € bucket identifier list do VBk ← retrieve payload of Bk πBk ← EncKid (Bk), σVBk ← EncKpayload (VBk ) add (πBk , σVBk) to I end for return I ALGORITHM 2: MATRIX SPACE TRANSLATION //Input : Data collection Set D ={ Di } //Output: Matrix space Set MS Step 0:Start Step 1: Get the Set D Step 2: FOR i=0 to Size of D Step 3: get Si of Di Step 4: FOR j=0 to length of si Step 5: sbi=substring(si,2→j) Step 6: Add sbi to MS Step 7: END FOR Step 8: END FOR Step 9: return MS Step 10: Stop 5. RESULTS Some trial assessments are performed to demonstrate the adequacy of the framework. What's more,theseanalysesare led on windows based java machine with generally utilized IDE Net beans. Likewise the quantities of recovered records are utilized to set benchmark for execution assessment. Quantities of applicable recovered archives from the cloud for the arrangement of catchphrases are utilized to demonstrate the adequacy of the framework. The following are the meaning of the utilized measuring methods i.e. exactness and review. Exactness: it is a proportion of quantities of appropriate archives recovered to the total of aggregate quantities of important and immaterial records recovered. Relative viability of the framework is very much communicated by utilizing accuracy parameters. Review: it is a proportion of aggregate quantities of applicable archives recovered to the aggregate quantities of pertinent records not recovered. Supreme precision of the framework is all around described by utilizing review parameter.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1867 Quantities of situations presents where one measuring parameter rules the other. By thinking about such parameters we utilized two measuring parameters, for example, accuracy and review. For Detailed Examination • A = No. of relevant docs retrieved • B =No of relevant documents not retrieved • C = No of irrelevant documents are retrieved. So, Precision = (A/ (A+ C))*100 And Recall = (A/ (A+ B))*100 Fig.3.Average precision of the similarity search method In Fig. 3, by observing figure 3 it is clear that average precision obtained by using similarity search method is approximately 65%. Fig.4. Average Recall of the similarity search method In Fig. 4, figure shows that the system gives 95% recall for the similarity search method. By comparing these two graphs we can conclude that the similarity search method gives high recall value compare to the precision value. 6. CONCLUSION Search over encrypted System assist in retrieving file that contains required information without decryption process. This would enhance search processincloudwherefiles areb been encrypted and stored. In above project work search time has been found to be low. Effective retrieval of documents measuring precision and recall. REFERENCES [1] Cong Wang, Ning Cao, Jin Li, Kui Ren and Wenjing Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data”, IEEE 30th International Conference on Distributed Computing Systems, 2010, pp. 253-262, doi:10.1109/ICDCS.2010.34. [2] Yan-Cheng Chang and Michael Mitzenmacher, “Privacy Preserving Keyword Searches on Remote Encrypted Data”, in Proc. of ACNS’05, 2005, pp. 442-455, Springer Berlin Heidelberg. [3] Jan Li, Q. Wang, C. Wang, N. Cao, K. Ren, W. Lou, “Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing”, Proc. of IEEE INFOCOM’10 Mini- Conference, March 2010, pp. 1-5, IEEE. [4] Qin Lv, William Josephson, Zhe Wang, Moses Charikar, Kai Li, “Multi-Probe LSH: Efficient Indexing for High Dimensional Similarity Search”, in Proceedings of the 33rd international conferenceon verylargedatabases,September 2007, pp. 950-961, VLDB Endowment. [5] Dan Boneh and Brent Waters, “Conjunctive, Subset and Range Queries on Encrypted Data”, in Theory of Cryptography Conference, February 2007, pp. 535-554, Springer Berlin Heidelberg. [6] Kuzu Mehmet, Mohammad Saiful Islam, Murat Kantarcioglu, “Efficient Similarity Search Over Encrypted Data”, in Data Engineering (ICDE), 2012 IEEE28th International Conference, IEEE, 2012. [7] Wenjun Lu, Ashwin Swami Nathan, Avinash L. Varna, and Min Wu, “Enabling search over encrypted multimedia databases” InIS&T/SPIE Electronic Imaging, Feb 2009 , pp. 725418-725418, International Society for Optics and Photonics. [8] Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, “Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud” InINFOCOM, 2014Proceedings IEEE, April 2014, pp. 2112-2120, IEEE.