Enviar pesquisa
Carregar
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clustering
•
1 gostou
•
41 visualizações
IRJET Journal
Seguir
https://irjet.net/archives/V4/i1/IRJET-V4I1162.pdf
Leia menos
Leia mais
Engenharia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 4
Baixar agora
Baixar para ler offline
Recomendados
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
IRJET Journal
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
paperpublications3
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
IRJET Journal
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET Journal
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET Journal
Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883
Editor IJARCET
IRJET- Data Mining - Secure Keyword Manager
IRJET- Data Mining - Secure Keyword Manager
IRJET Journal
A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
IRJET Journal
Recomendados
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
IRJET Journal
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...
paperpublications3
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
IRJET Journal
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET Journal
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET Journal
Ijarcet vol-2-issue-3-881-883
Ijarcet vol-2-issue-3-881-883
Editor IJARCET
IRJET- Data Mining - Secure Keyword Manager
IRJET- Data Mining - Secure Keyword Manager
IRJET Journal
A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
IRJET Journal
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology
Qo s aware scientific application scheduling algorithm in cloud environment
Qo s aware scientific application scheduling algorithm in cloud environment
Alexander Decker
An effective classification approach for big data with parallel generalized H...
An effective classification approach for big data with parallel generalized H...
riyaniaes
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go clouds
eSAT Publishing House
Berlin Hadoop Get Together Apache Drill
Berlin Hadoop Get Together Apache Drill
MapR Technologies
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
IJARCCE 20
IJARCCE 20
Nahan Rahman
Graphlab Ted Dunning Clustering
Graphlab Ted Dunning Clustering
MapR Technologies
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
kevig
Data Science Keys to Open Up OpenNASA Datasets - PyData New York 2017
Data Science Keys to Open Up OpenNASA Datasets - PyData New York 2017
Noemi Derzsy
An Efficient Cloud based Approach for Service Crawling
An Efficient Cloud based Approach for Service Crawling
IDES Editor
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
JAYAPRAKASH JPINFOTECH
Computing Outside The Box September 2009
Computing Outside The Box September 2009
Ian Foster
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
Paper id 28201425
Paper id 28201425
IJRAT
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
Mais conteúdo relacionado
Mais procurados
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology
Qo s aware scientific application scheduling algorithm in cloud environment
Qo s aware scientific application scheduling algorithm in cloud environment
Alexander Decker
An effective classification approach for big data with parallel generalized H...
An effective classification approach for big data with parallel generalized H...
riyaniaes
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go clouds
eSAT Publishing House
Berlin Hadoop Get Together Apache Drill
Berlin Hadoop Get Together Apache Drill
MapR Technologies
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
IJARCCE 20
IJARCCE 20
Nahan Rahman
Graphlab Ted Dunning Clustering
Graphlab Ted Dunning Clustering
MapR Technologies
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
kevig
Data Science Keys to Open Up OpenNASA Datasets - PyData New York 2017
Data Science Keys to Open Up OpenNASA Datasets - PyData New York 2017
Noemi Derzsy
An Efficient Cloud based Approach for Service Crawling
An Efficient Cloud based Approach for Service Crawling
IDES Editor
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
JAYAPRAKASH JPINFOTECH
Computing Outside The Box September 2009
Computing Outside The Box September 2009
Ian Foster
Mais procurados
(17)
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
Qo s aware scientific application scheduling algorithm in cloud environment
Qo s aware scientific application scheduling algorithm in cloud environment
An effective classification approach for big data with parallel generalized H...
An effective classification approach for big data with parallel generalized H...
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go clouds
Berlin Hadoop Get Together Apache Drill
Berlin Hadoop Get Together Apache Drill
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IJARCCE 20
IJARCCE 20
Graphlab Ted Dunning Clustering
Graphlab Ted Dunning Clustering
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
FINDING OUT NOISY PATTERNS FOR RELATION EXTRACTION OF BANGLA SENTENCES
Data Science Keys to Open Up OpenNASA Datasets - PyData New York 2017
Data Science Keys to Open Up OpenNASA Datasets - PyData New York 2017
An Efficient Cloud based Approach for Service Crawling
An Efficient Cloud based Approach for Service Crawling
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
Enabling Efficient and Geometric Range Query with Access Control over Encrypt...
Computing Outside The Box September 2009
Computing Outside The Box September 2009
Semelhante a Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clustering
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
Paper id 28201425
Paper id 28201425
IJRAT
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET Journal
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
AM Publications
Multi-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
hemanthbbc
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
ASAITHAMBIRAJAA
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
nexgentech15
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
hemanthbbc
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
Semelhante a Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clustering
(20)
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Paper id 28201425
Paper id 28201425
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET- Privacy Preserving Keyword Search over Cloud Data
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
Multi-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Mais de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Mais de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
sdickerson1
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
121011101441
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
SAURABHKUMAR892774
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
ssuser2ae721
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
ROCENODodongVILLACER
Último
(20)
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clustering
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 926 Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clustering Sushant Y. Kamble , R. P. Mirajkar 1Computer Science and Engineering Dept., Bharati Vidyapeeth’s College of Engineering, Kolhapur (District), Maharashtra-416012, INDIA sushantykamble@gmail.com 2Asst.Prof. at Computer Science and Engineering Dept., Bharati Vidyapeeth’s College of Engineering, Kolhapur (District), Maharashtra-416012, INDIA rahulmirajkar982@gmail.com ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing provides the facility to store and manage data remotely. The volume of information is increasingper day. The owners choose to store the sensitive data on the cloud storage. To protect the data from unauthorized accesses, the data must be uploaded in encrypted form. Due to large amount of information is stored on the cloud storage; the association between the documents is hiding when the documents are encrypted. It is necessary to design a search technique which gives the results on the basis of the similarity values of the encrypted documents. Inthis paper a cosine similarity clustering method is proposedtomakethe clusters of similar documents based on the cosine values of the document vectors. We also proposed a MRSE-CSI model used to search the documents which are in encrypted form. The proposed search technique only finds the cluster of documents with the highest similarity value instead of searching on the whole dataset. Processing the dataset on two algorithms shows that the time needed to form the clusters in the proposed methodisless. Whenthe documents in the dataset increases, thetimeneededtoform clusters also increases. The result of the search shows that increasing the documents also increases the search time of the proposed method. 1. INTRODUCTION Cloud computing becomes popular as it provides huge storage space and high quality services. The large amount of data is created per day. It is a difficult task for the owner of the data to store and manage this large amount of data. To overcome this difficulty, the data owners can store their data on the cloudserver to use the on demand applications and services from shared resources [1]. The cloud server providers agreed that their cloud service is armed with strong security constraints though security and privacy are major hindrances which avoid the use of cloud computing services [2]. To protect the sensitive data on the cloud server from unauthorized users, the data ownersmayencryptthe documents and uploads to cloud server [3]. In the earlier various strong cryptography methods were used to design the search techniques on the cipher text [4], [5], [6]. These techniques needs many operations and require large amount of time. So these techniques are not suitableforbigdata whereinformationvolume is huge. The property of a document depends on its association with other documents. Therefore maintaining the relationship between documents is important to fully express a document. The results of search returned to the users may contain damaged information due to hardware failure or storage corruption. Thus a mechanism should be given to users to check the accuracy of the search results. The proposed architectureof searchtechniqueisbasedon the cosine similarity clustering which maintain the association between plain text and encrypted text to improve the efficiencyof search. 2. LITERATURE REVIEW Chi Chen and Xiaojie Zhu [7] used a hierarchical clustering method to maintain the close relationship between plain documents and encrypted documents to increase search efficiency within a big data environment. They also used a coordinate matching technique[8]tomeasuretherelevancescore between query and document. They did a model for the efficient multi-keyword ranked search and maintain the privacy of documents, rank security and relevance between retrieved documents. Jiadi Yu and Peng Lu [9] focused on the problems of the cipher text search using Searchable Symmetric Encryption (SSE) [10], [11]. This SSE technique helps data users to retrieve the documents over the encrypted documents. In Two Round Searchable Encryption (TRSE), they used the similarity relevance concept to solve the privacy issues in searchable encryption.They also showed server side ranking according to order preserving encryption (OPE). N. Cao, C. Wang and M. Li [12] used “inner product similarity” concept which can find the similarity measure of the information and the keywords of search. Ruksana Akter, Yoojin Chung [13] defined an evolutionary approach based oncosinesimilarityclustering.Adocumentvector is used to create the index of every document. The cosine values between the document vectorsarecalculated.Clustersofthemost relevant documents are formed on the basis of the cosine values. Another good feature of their work is that they do not require Keywords: Cloud computing, multi-Keyword search, cosine similarity clustering, encrypted data
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 927 specifying the all clusters to be made in advance as most of the available methods. 3. DESIGN ASPECTS 3.1 Proposed System We used the cosine similarity clustering algorithm to check the time required for the search results.Wehavedeveloped a search technique which is based on cosine similarity clustering algorithm to improve the efficiency of search. Decryption Key Secret Key Document Query Input Top-K Documents Owner User Cloud Server Fig - 1: Architecture of Proposed System 3.2 Methodology Step 1: Key Generation: - The owner of the data generates a key using the size of dictionary and a random generator. This secret key is used for encryption of the document index. Step 2: Encrypted Index Generation: - The document vector is prepared and applies the cosine similarityclustering algorithm to form the clusters of relevant documents. Every cluster has its cluster index. These cluster indices are encrypted using matrix multiplicationwith the secret key. These encrypted cluster indices are uploaded to the cloud server. Step 3: Document Upload: - The documents are encrypted using AES algorithm. These encrypted documents are uploaded to the cloud server. Step 4: Trapdoor Generation: - The data user send query to the data owner. After analyzing the keywordsofquery, data owner builds query vector. This query vector is encrypted using matrix multiplication with secret key and send to the user. Step 5: Document Searching: - The user uploads this encrypted query vector (trapdoor TW) to the cloud server. The similarity value between trapdoor and encrypted cluster indices (IC) is calculatedbythecloud server. The most relevant cluster with the highest similarity value is selected. This cluster is extracted and again the similarity value is calculated between trapdoor and each document vector. The top-k documents will be returned to the user on the basis of similarity value. Step 6: Decrypt Documents: - The search result contains the documents in encrypted form.Thedata usermustsend request for the key to the owner of data. Data owner sends the key to decrypt the documents. 4. SNAPSHOTS Fig -2: Snapshot of Query Request Page Fig. 2 shows the query request page. The data user may enter the name of the data owner and keywords of the query and send to data owner. Cosine Similarity Clustering IC Search Index Trapdoor (TW) Data Owner Data User Id Select Cluster with Relevance Score
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 928 Fig -3: Trapdoor Generation Page Fig. 3 shows the requests from the data user. Data owner generates the trapdoor and send back to data user. Fig - 4: Search Results Page Fig. 4 shows the results of search returned from cloud server. These are the most relevant top-k documents to the search keywords. 5. RESULT AND DISSCUTION ON MODULES Table-1: Search time using two algorithms Dataset CS Time (ms) QHC Time( Ms) 5 51 52 10 57 59 15 61 70 20 66 81 25 73 102 Chart -1: Search Document Time In the first experiment, document search time is calculated. Five different numberofdataset sizesarechoseninthe experiment to show the effect on the efficiency of the search results. From chart 1, we can see that the time needed to search the documents increases when the size of dataset increases. Compared with the previous related work [7] time needed to search the documents is less. Table -2: Time cost to form clusters Dataset QHC Time (ms) CS Time (ms) 5 1934 1731 10 2132 1891 15 2250 1931 20 2472 2112 25 2790 2312 Chart - 2: Time required for Hierarchical clustering
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 929 Chart - 3: Time required for Cosine Similarity Clustering We have developed a system which is basedontwodifferent clustering algorithms (i.e. Hierarchical Clustering and Cosine Similarity Clustering) In the second experiment, we have calculated the time required to form the clusters of relevant documents using hierarchical clustering and Cosine Similarity Clustering algorithms. Five different numbers of dataset sizes are chosen in the experiment to show the effect on the efficiency of the clustering algorithms. From the charts 2 and 3, we can say that time needed to form clusters of relevant documents in Cosine Similarity Clustering is less as compared with Hierarchical Clustering. 6. CONCLUSIONS We have developed a MRSE-CSI model based on cosine similarity based clustering and word relevance technique. We analyze the search efficiency of the system using two clustering algorithms. The experimental result proves that the time needed to form the clustersofrelevantdocumentsis reduced by using cosine similarity clustering. The experimental resultalso proves that the speed of the search increases by using the cosine similarity clustering algorithm. The proposed architecture improves the search efficiency and rank security. REFERENCES [1] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Comput. Commun. Rev., vol. 39. No. 1, pp. 50-55, 2009. [2] S. Grzonkowski, P. M. Corcoran, and T. Coughlin, “Security analysis of authentication protocols for next-generation mobile and CE cloud services,” in Proc. ICCE,Berlin,Germany, 2011, pp. 83-87. [3] S. Kamara and K. Lauter, “ Cryptographic cloud storage,” in RLCPS, January 2010, LNCS. Springer, Heidelberg. [4] G. Craig. “Fully homomorphic encryption usingideal lattices.” STOC. Vol. 9. 2009 [5] D. Boneh, G. Di Crescenzo, R. Ostrovsky, et al. Public key encryption with keyword search[C].Advances in Cryptology- Eurocrypt 2004. Springer Berlin Heidelberg, 2004: 506-522. [6] D. Cash, S. Jarecki, C. Jutla, et al. Highly-scalable searchable symmetric encryption with support for boolean queries [M].Advances in CryptologyCRYPTO 2013. Springer Berlin Heidelberg, 2013: 353-373. [7] Chi Chen, Xiaojie Zhu, Peisong Shen, J.Hu S.Gue, Z.Tari and Albert Y. Zomaya, “An Efficient Privacy Preserving Ranked Keyword Search Method,” IEEE Transactions on Parallel and Distributed Systems, 2015. [8] I. H. Witten, A. Moffat, and T. C. Bell, Managing gigabytes: Compressing and indexing documents and images, 2nd ed., San Francisco: Morgan Kaufmann, 1999. [9] Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue and Minglu Li, “Toward Secure Multi-Keyword Top-K Retrieval over Encrypted Cloud data, ”IEEETransactionsonDependableand secure computing, Vol. 10, No. 4 July/August 2013. [10] D. Song, D. Wagner, and A. Perrig, “Practical Techniques for Searches on Encrypted Data,” Proc. IEEE Symp. Security and Privacy, 2000. [11] D. Boneh, G. Crescenzo, R. Ostrovsky, G. Persiano,"Public-Key Encryption with Keyword Search", Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques (Eurocrypt), 2004. [12] N. Cao, C. Wang, M. Li, K. Ren, and W. J. Lou, “Privacy- Preserving Multi-keyword Ranked Search over Encrypted Cloud Data,” in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 829-837. [13] Ruksana Akter, Yoojin Chung, “An Evolutionary Approachfor Document Clustering,” 2013 International Conference on Electronic Engineering and Computer Science.
Baixar agora