SlideShare a Scribd company logo
Enviar búsqueda
Cargar
Iniciar sesión
Registrarse
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
Denunciar
IRJET Journal
Seguir
Fast Track Publications
7 de Dec de 2017
•
0 recomendaciones
•
31 vistas
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
7 de Dec de 2017
•
0 recomendaciones
•
31 vistas
IRJET Journal
Seguir
Fast Track Publications
Denunciar
Ingeniería
https://www.irjet.net/archives/V4/i11/IRJET-V4I1113.pdf
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
1 de 3
Descargar ahora
1
de
3
Recomendados
Efficient Similarity Search over Encrypted Data
IRJET Journal
37 vistas
•
4 diapositivas
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
450 vistas
•
9 diapositivas
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
3.8K vistas
•
10 diapositivas
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
11 vistas
•
4 diapositivas
Enabling efficient multi keyword ranked
Sakthi Sundaram
160 vistas
•
12 diapositivas
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
69 vistas
•
4 diapositivas
Más contenido relacionado
La actualidad más candente
Paper id 28201425
IJRAT
229 vistas
•
5 diapositivas
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology
161 vistas
•
13 diapositivas
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
504 vistas
•
6 diapositivas
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
6 vistas
•
2 diapositivas
IJARCCE 20
Nahan Rahman
211 vistas
•
4 diapositivas
Improving security for data migration in cloud computing using randomized enc...
IOSR Journals
434 vistas
•
4 diapositivas
La actualidad más candente
(19)
Paper id 28201425
IJRAT
•
229 vistas
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
nexgentechnology
•
161 vistas
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
•
504 vistas
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
•
6 vistas
IJARCCE 20
Nahan Rahman
•
211 vistas
Improving security for data migration in cloud computing using randomized enc...
IOSR Journals
•
434 vistas
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
IJMER
•
411 vistas
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
•
29 vistas
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
•
35 vistas
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
•
297 vistas
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
•
36 vistas
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
•
151 vistas
Ijariie1196
IJARIIE JOURNAL
•
253 vistas
Ijcnc050208
IJCNCJournal
•
283 vistas
International Journal of Computational Engineering Research(IJCER)
ijceronline
•
274 vistas
IJSRED-V2I2P55
IJSRED
•
24 vistas
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
Yekini Nureni
•
542 vistas
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
•
316 vistas
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
hemanthbbc
•
96 vistas
Similar a A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET Journal
38 vistas
•
7 diapositivas
A secure and dynamic multi keyword ranked
nexgentech15
279 vistas
•
13 diapositivas
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
5.4K vistas
•
12 diapositivas
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
34 vistas
•
4 diapositivas
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET Journal
41 vistas
•
4 diapositivas
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
30 vistas
•
5 diapositivas
Similar a A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
(20)
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET Journal
•
38 vistas
A secure and dynamic multi keyword ranked
nexgentech15
•
279 vistas
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
•
5.4K vistas
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
•
34 vistas
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET Journal
•
41 vistas
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
•
30 vistas
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
•
32 vistas
Efficient Similarity Search Over Encrypted Data
IRJET Journal
•
29 vistas
IRJET- Empower Syntactic Exploration Based on Conceptual Graph using Searchab...
IRJET Journal
•
25 vistas
Ijarcet vol-2-issue-3-881-883
Editor IJARCET
•
132 vistas
Retrieving Secure Data from Cloud Using OTP
AM Publications
•
245 vistas
Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic...
ijtsrd
•
3 vistas
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
•
60 vistas
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
•
69 vistas
IRJET- Data Mining - Secure Keyword Manager
IRJET Journal
•
8 vistas
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com
•
416 vistas
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
IEEEFINALSEMSTUDENTPROJECTS
•
520 vistas
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
•
14 vistas
A secure and dynamic multi keyword ranked
jpstudcorner
•
1.2K vistas
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Pvrtechnologies Nellore
•
244 vistas
Más de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
6 vistas
•
7 diapositivas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
3 vistas
•
7 diapositivas
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
3 vistas
•
5 diapositivas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
2 vistas
•
11 diapositivas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
3 vistas
•
6 diapositivas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
3 vistas
•
5 diapositivas
Más de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
6 vistas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
3 vistas
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
3 vistas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
2 vistas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
3 vistas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
3 vistas
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
2 vistas
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
2 vistas
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 vistas
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
2 vistas
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
2 vistas
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
5 vistas
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
6 vistas
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
2 vistas
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
2 vistas
Understanding the Nature of Consciousness with AI
IRJET Journal
•
2 vistas
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
4 vistas
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
2 vistas
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
2 vistas
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
2 vistas
Último
Finding Your Way in Container Security
Ksenia Peguero
22 vistas
•
28 diapositivas
Operations and Supply Chain management.pdf
ParmitSihag1
34 vistas
•
785 diapositivas
Chapter 9. Classification Advanced Methods.ppt
Subrata Kumer Paul
13 vistas
•
78 diapositivas
A review of IoT-based smart waste level monitoring system for smart cities
nooriasukmaningtyas
31 vistas
•
7 diapositivas
lift and escalator.pdf
Deepika Verma
27 vistas
•
24 diapositivas
VFD DRIVES TROUBLESHOOTING.pptx
CONTROLS SYSTEMS
17 vistas
•
14 diapositivas
Último
(20)
Finding Your Way in Container Security
Ksenia Peguero
•
22 vistas
Operations and Supply Chain management.pdf
ParmitSihag1
•
34 vistas
Chapter 9. Classification Advanced Methods.ppt
Subrata Kumer Paul
•
13 vistas
A review of IoT-based smart waste level monitoring system for smart cities
nooriasukmaningtyas
•
31 vistas
lift and escalator.pdf
Deepika Verma
•
27 vistas
VFD DRIVES TROUBLESHOOTING.pptx
CONTROLS SYSTEMS
•
17 vistas
1st Ansys Technology Day in Athens, Agenda
SIMTEC Software and Services
•
229 vistas
UNIT IV REFRIGERATION PRINCIPLES ...
karthi keyan
•
39 vistas
CCS334 BIG DATA ANALYTICS Session 3 Distributed models.pptx
Asst.Prof. M.Gokilavani
•
25 vistas
[RecSys2023] Challenging the Myth of Graph Collaborative Filtering: a Reasone...
Daniele Malitesta
•
17 vistas
Master's Transcript Mohammad Mahdi Farshadian.pdf
Educational Group Mohammad Farshadian
•
34 vistas
INDIAN KNOWLEDGE SYSTEM PPT chp-1.pptx
RuchiSharma494176
•
48 vistas
DBMS
KaranSingh274675
•
21 vistas
Unit 4 Food packaging materials and testing.pptx
Dr P DINESHKUMAR
•
17 vistas
North American YAT-28 Turbo Trojan.pdf
TahirSadikovi
•
16 vistas
impulse-and-load-test-rig.pptx
Neometrix_Engineering_Pvt_Ltd
•
15 vistas
gaurav singh 19ME25 (1).pptx
GauravSingh31583
•
15 vistas
JSA-Piling or Concreting for Foundations & Building
Alvin160771
•
20 vistas
gdsc info session .pptx
Thestarsahil
•
221 vistas
Google Cloud Study Jam | GDSC NCU
Shivam254129
•
18 vistas
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 65 A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method Athira Sankar1, Soumya Murali2 PG Scholar1, Assistant Professor2 1,2 Sree Buddha College of Engineering, Kerala Technological University, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - As terabytes of data has been increasing, cloud become an important storage to outsource sensitive information for privacy preserving. Cloud computing is an emerging model in the IT infrastructurewhich organizeshuge resource of computing, storage and applications, manipulating, configuring and accessing application online with great efficiency and minimum economic overhead. An efficient method to reduce information leakage is by data encryption. So the data Owners outsource the document in an encrypted format for privacy preserving. In, this paper presents a hierarchical clustering method for fast search semantics. The hierarchical clustering, cluster the document into sub cluster until the constraint on the maximum size of cluster is reached. In search phase, this method can reach a linear computational complexity against an exponential size increase of document collection. In order to verify the search result; a hash sub-tree is designed for authentication. 1. Introduction Cloud has become one of the significant fields in the IT enterprise due to the increasing in huge amount of data. Cloud computing is a paradigm, where large pool of system are connected in private/public network for providing infrastructure for application, data and cloud storage. Cloud server provider (CSP) provides network services; infrastructure application in the cloud. CSP’s has different forms of services: Software as a service(SAAS),Platformasa service (PAAS), and Infrastructure as a service (IAAS). To reduce information leakage, data encryption is a traditional way. Data encryption protects data confidentiality as it is stored on a computer system and transmitted using the internet. Many cryptographic techniques are used for data encryption. In this paper [1], a vector space model isused.Avectorspace model is an algebraic model for representing text document as vectors of identifiers. Vector space model is used for ranking, indexing, information filtering, and information retrieval. Here, the documents and queries are represented by vector that is in invertible matrix form. One of the known scheme for representing vector space model is by tf-idf weighting. Tf is the term frequencythatthe numberofwords occurs in a document. Idf is the inverse document frequency that measure how much information the word provides, whether the term is common across all documents. The objective of the work is to investigate the problem of maintaining the close relationship between different plain documents over an encrypted domain. The second objective is to propose the MRSE-HCI architecture to speed up server- side searching phase. The third objective is to design a search strategy to improve the rank privacy. Finally, a Merkle hash tree and cryptographic signature to authenticated tree structure The rest of the paper is organized as follows, Section II discusses the Related Works on privacypreservingkeyword search and. Section III describes the conclusion. 2. Literature Review Nowadays, more and more people are motivated to outsource their local data to public cloud servers for great convenience and reduced costs in data management. This section describes the privacy preserving schemes on multi keyword search and ranking method. Slawomir Grzonkowski et al [2] propose a security analysis for authentication protocol in the CE cloud services. The current weakness of the protocol, overcome by Zero Knowledge Proof (ZKP).ZKP techniqueisusedfor protecting the user password. Here there is an alternative protocol for ZKP that is SeDici 2.0 is also described. SeDici 2.0 is a third party trusted (TTP) protocol based ZKP. The mainaimofthe ZKP is to deliver a better anti- phishing solution. ZKP technique addresses the problem of phishing and mutual authentication. In the case of SeDici 2.0, the client is able to communicate with the consumer services and the authentication services. SeDici 2.0 does not need any physical token. The proposed protocol can provide a suitable solution for CE-based cloud authentication services. Searchable Symmetric Encryption (SSE)[3]allowsa partyto outsource the storage of its data to anotherpartyina private manner. SSE is a collection of polynomial time algorithm, such as:
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 66 - K Gen( Iˠ): It is is a probabilistic algorithm runby the client to generate a key. - (I, c) ← Enc(K, D): is a probabilistic algorithm that takes a document collection D and a key K as input - t ← Trpdr(K, w): is a deterministic algorithmrunby the client to generate a trapdoor t for a keyword w, where w ∈ ∆. - R ← Search(I, t): is a deterministic algorithmrunby the server to search for documents in Dthatcontain a keyword w. - di ← Dec(K, ci): is a deterministic algorithm run by the client to decrypt a single encrypteddocumentci. SSE scheme is of three types: SSE-1,SSE-2.MULTI-SSE.SSE-1 is used for building the index. The technical issues of SSE-1 are large address space and small number entries.SSE-2 is similar as SSE-1 .SSE-2 is used for pre-processing and padding the index. MULTI-SSE is used for indexes and trapdoors require same security notions as single-user SSE. In this paper [4], a hierarchical clustering for cipher text search in a big data environment is proposed. The hierarchical clustering clusters the document based on minimum similarity threshold. Then partitioning the resultant cluster into sub-cluster until a constraint of maximum size of cluster is reached. During the search phase, this approach can reach a linear computational complexity against exponential size of document collection. The hierarchical clustering is used for better clustering result. Thus large collection of document can be easily clustered thereby, improving efficiency of the search. The proposed system brings improvement in search efficiency, rank security, and the similarity between retrieved documents. Secure conjunctive keyword ranked search over encrypted cloud data [5] choose the principle of coordinate matching that is used to identify the similaritybetween queryand data document. The algorithm used in the conjunctive keyword search is pailler cryptosystem, Rijndael algorithm, cosine similarity search. Pailler cryptosystem is an homomorphism algorithm. It is used to encrypt n decrypt file content.Rijndael algorithmisa symmetric AES. It is used to convert secret key into bytes. Cosine similarity search is a nearest neighbor search that is used to identify the top k relevant document of the query. N Cao et al [6] propose a basic idea for the MRSE based on secure inner product computation. In this paper, MRSE scheme is applied to provide similarity ranking effective. The proposed system algorithms are: 1) Algorithm to provide multi keyword rankedsearch. 2) The secure kNN algorithm is used to encrypt the index and query vectors. 3) A Greedy Depth-first Search algorithm based on index tree. 4) The LSH algorithm is suitable for similarsearchbut cannot provide exact ranking. 5) {I′s ; ci} ← GenUpdateInfo (SK; Ts; i; up type)), this algorithm generates the updateinformation{I′s;ci} which will be sent to the cloud server. Secure ranked keyword search over cloud data [7] tackles the problems of enabling searchable encryption system. Ranking is calculated using TF*IDF rule. Efficient ranked searchable symmetric encryption scheme are using order preserving symmetric encryption (OPSE). The OPSE is a deterministic encryption scheme where the numerical ordering of the plaintexts gets preserved by the encryption function. Here proposed a searching method to improvetheefficiency of ranked keyword search algorithms. The efficient one-to many order preserving mapping function, which allows the effective ranking to be designed. This kind of techniques has the ability to categorize, and search large collections of unstructured text on a conceptual basis. In this paper [8] propose a novel approach, called multi keyword query encrypted data (MKQE). In MKQE, adopt inner product similarity to quantitatively evaluate the coordinate matching. MKQE defines an index vectorforeach file based on the keywords it contains. Two invertible matrices and a bit vector are also used for the index vector encryption and the trapdoor generation. In MKQE, when a multi keyword query comes, a query vector based on the set of requesting keywords is constructed. 3. Conclusion There are many privacy preserving keyword search method to provide data confidentiality and security. Among that, MRSE with hierarchical clusteringmethodis efficient privacy preserving keyword search method. Hierarchical clustering method gives better and efficient result. MRSE-HCI architecture is used to adapt data explosion, online information retrieval and semantic search. At the same time Merkle hash tree is used for authenticating the index tree structure. Merkle hash is data structure used to store large data’s. References [1] Chi Chen, Xiaojie Zhu, Peisong Shen, Jiankun Hu,” An efficient privacy preserving ranked Keyword search method”, IEEE transactions on parallel and distributed systems, vol. 27, no. 4, april 2016
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 67 [2] S. Grzonkowski, P. M. Corcoran, and T. Coughlin, “Security analysis of authentication protocols for next- generation mobile and CE cloud services,” in Proc. IEEE Int. Conf. Consumer Electron., 2011, Berlin, Germany, 2011, pp. 83–87. [3] R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, “Searchablesymmetric encryption:improveddefinitions and efficient constructions,” in Proc. 13th ACM Conf. Comput. Commun. Security, Alexandria, Virginia, 2006, pp. 79–88. [4] C. Chen, X. J. Zhu, P. S. Shen, and J. K. Hu, “A hierarchical clustering method For big data oriented ciphertext search,” in Proc. IEEE INFOCOM, Workshop on Security and Privacy in Big Data, Toronto, Canada, 2014, pp. 559–564. [5] P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over encrypted data,” in Proc. Proc. 2nd Int. Conf. Appl. Cryptography Netw. Security, Yellow Mt, China, 2004, pp. 31–45. [6] N. Cao, C. Wang, M. Li, K. Ren, and W. J. Lou, “Privacy- preserving multi-keyword ranked search over encrypted cloud data,” in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 829–837. [7] C. Wang, N. Cao, J. Li, K. Ren, and W. J. Lou, “Secure ranked keyword search over encrypted cloud data,” in Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst., Genova, ITALY, 2010, pp. 253–262. [8] R. X. Li, Z. Y. Xu, W. S. Kang, K. C. Yow, and C. Z. Xu, “Efficient Multi-keyword ranked query over encrypted data in cloud computing, Futur. Gener. Comp. Syst., vol. 30, pp. 179–190, Jan. 2014.