Efficient and Empiric Keyword Search Using Cloud

IRJET Journal
IRJET JournalFast Track Publications

https://www.irjet.net/archives/V9/i6/IRJET-V9I617.pdf

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 112
Efficient and Empiric Keyword Search Using Cloud
S.S. Swethapriyadarshni1, S.Swathi Priya2, P.Yuvarani3, K.Hemapriya4
1’2’3Panimalar Institute of Technology
4Assistant Professor, Dept. of Computer Science Engineering, Panimalar Institute of Technology, Chennai,
TamilNadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud is a Centralized Architecture Server, which serves as a platformforeveryuserofthecloudwanted tostoredata
and sensitive information’s in safe secured storage space. The next logical stage in the growth of on-demand information
technology services and products is cloud computing. Cloud computing will rely on virtualized resources to a considerable extent.
Cloud computing allows IT skills to be reused, and it always includes current computing services such as distributed and grid
computing. Users can perform a keyword-based search over encrypted material with searchable encryption. The majority of
currently available searchable encryption systems arebasedonasinglecloudserverapproach, whichhassome drawbacks, such as
a single point of failure and hostile insiders. The multi cloud server strategy, ontheother hand, providesmoredataavailabilityand
security. However, transferring existing keyword search strategies to the multi cloud will result in higher storage and search
expenses, with no discernible improvement in data security. In addition, unlike single cloud, a challenge in a multi cloud
environment is how to adequately check query integrity when certain cloudserversreturninaccurateorincompletedata. Weoffer
an iterative encryption approach to assure file privacy even if numerous cloud services collude with one another to ensure data
security.
Key Words: Cloud computing, Cloud Server, Encryption, Decryption, Multicloud, AES
1. INTRODUCTION
Cloud computing has several attributes, blockchain,forwardapproach,andcryptosystem-basedapproachesareaccustomedto
preserving security. The cloud infrastructurehasseveral characteristicsthey'reremotelyhosted,ubiquitous,andcommodified.
Currently, several firms are delivering cloud services example Google, Microsoft, etc… Virtualization is an associate degree
abstraction of execution of the cloud, so virtual machines are used. To preserve the info, the info is encrypted before
outsourcing it to the cloud. Cloud sourcing is turning into a giant deal as a result of its high scale usage and has inexpensive
suppliers. There are also problems concerning the policy and access that are overcome by the cloud organization. One of the
main challenges of the cloud is the constant net throughout the storage of information. Cloud Computing is the sought-after
network access split pool organized computing riches.
1.1 SCOPE OF THE PROJECT
With searchable encryption, users can do a keyword-based search across encrypted material. The bulk of searchable
encryption solutions currently available are based on a single cloud server architecture, whichhasseveral disadvantagessuch
as a single point of failure and hostile insiders. The use of several cloud servers, on the other hand, increases data availability
and security. Transferring existing keyword search strategies to the multicloud, on the other hand, will increase storage and
search costs while providing no noticeable improvement in data security. One of these services is Amazon Elastic Compute
Cloud (EC2), which allows users to have a virtual cluster of computers available at all times through the Internet. On AWS,
virtual computers have hardware central processing units (CPUs) and graphics processingunits(GPUs)forprocessing,aswell
as local/RAM memory, hard disk/SSD storage, a choice of operating systems, networking,andpre-loadedapplicationsoftware
such as web servers, databases, and customer relationship management (CRM). The project's goal is to integrate keyword
search across various clouds so that users can quickly locate a specific file or data, and to prevent the involvement of third
parties so that data is secure and protected.
1.2 EXISTING SYSTEM
Without needing to learn the plaintexts, searchable encryption allows a cloud server toconductkeywordsearches onbehalfof
data users over encrypted data. The majority of currently available searchable encryption systems, on the other hand, only
support single or conjunctive keyword searches, and the few schemes that can perform expressive keyword searches are
computationally inefficient because they are built from bilinear pairings over composite-order groups. In existingsystems,an
expressive public-key searchable encryption technique in the prime-order groups outperforms existingschemessignificantly
by allowing keyword search rules to be defined in conjunctive, disjunctive, or any monotonic Boolean formulas. When a user
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 113
obtains data from a concerned person via the internet, unknown or invalidusersmaygainaccesstothedata stored ona central
server or database. It could result in data being lost or altered by a third party. Most existing PEKS methods, regardless of
search authorisation, focus on data consumers'richsearchfunctionalities.Theframework allowsclientstosendencrypteddata
to the cloud, allows users to search for documents using different keywords, and allows them to check the server's response.
2. PROPOSED SYSTEM
Encrypting a file, then making n copies of it, and distributing the n copies to n cloud servers is astraightforward filedistribution
solution in numerous clouds. Userscan still retrieve the fileeven if (n-1)cloudserversareofflineinthissituation,indicatingthat
this distribution mechanism is highly reliable. The cloud server is merely aware that if it engages in unethical behavior, it will
almost certainly be discovered. The suggested design reduces storage overhead on both the client and user sides. The retrieval
timelowers as the number of documents increases, cuttingstorage costs forboth parties. However,thismethodnecessitatesan
excessive amount of storageoverhead. Furthermore,becauseeachcloudserverhasaccesstotheentireencryptedfile,webuilda
secureand reliable file distribution strategy in various clouds to strike a better balance between storageoverhead,privacy,and
reliability. We present an iterative encryption strategy inspired by the two-layer encryption scheme to preserve the privacy of
data files even if numerous cloud serversstart a collusionattackatthesametime.Inthissystem,userscanalsoproducea unique
code to gain access to a record from an authorized individual. It will provide users with a safe access method as well as protect
unknown individuals from dangerous activities.
Output-1: User login page
Output-2: Registration page
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 114
Output-3: Keyword Searching page
Output-4: Response page
Output-5: AWS Cloud shell
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 115
Output-6: Fetched data from AWS Cloud shell
3. CONCLUSIONS
In this, we propose a solid and certain keyword search conspire in different mists, which permits the information client to
perform catchphrase search in a safe, dependable, and unquestionable way. To begin with, we proposea solidanddependable
document appropriation conspire, which guarantees security throughiterativeencryptionanddependability bypresentingRS
deletion code innovation. Second, we plan a Bloom channel tree file structure and extend it to a multi cloud climate. Third, we
execute a viable trustworthiness confirmation calculation that can rapidly check the respectability of inquiry results and
recognize pernicious cloud servers. At long last, we do security investigation and exploratoryassessmenttocheck thesecurity
and viability of our plan. For the future work, first, we will investigate a quicker and more effective record dissemination
conspire that permits clients to bear lower reproduction costs. Second, we will stretch out the protected hunt plan to
accomplish fluffy question, positioning inquiry, and multi watchword question.
REFERENCES
[1]. Yunhong Zhou, Shihui Zheng, and Licheng Wang, "Privacy-Preserving and Efficient Public Key Encryption with Keyword
Search-Based CP-ABE in Cloud", 13 October 2020.
[2]. Qingji Zheng Shouhuai Xu Giuseppe Ateniese, "VABKS: Verifiable Attribute-based Keyword Search over Outsourced
Encrypted Data", the University of Texas at San Antonio, USA Sapienza University of Rome, ItalyandJohnsHopkins University,
USA.
[3]. Mrs. Zabiha Khan, Assistant Professor, Dept. of CSE, Ghousia College of Engineering, Karnataka, India, Ms. Kamala Kumari,
B. K, Rumana Iffath, Saima Ahmed, Zaiba Tabassum UG Students Ghousia College of Engineering, Ramanagaram, "Review of
Attribute-based Keyword Search AuthorizationinCloud",www.ijert.orgNConPCS -2017ConferenceProceedingsSpecial Issue
- 2017.
[4]. XINRUI GE, JIA YU, CHENGYU HU, HANLIN ZHANG, AND RONG HAO, 1. College of Computer Science and Technology,
Qingdao University, Qingdao 266071, China,"EnablingEfficientVerifiableFuzzyKeywordSearchOverEncryptedData inCloud
Computing", date of current version September 7, 2018.
[5]. Lincei, Chungen Xu, Lei Xiaoling Yu, and Cong Zuo, "VerifiableIdentity-BasedEncryption withKeyword SearchforIoTfrom
Lattice", Accepted: 24 February 2021.
[6]. Shangping Wang, Jian Ye, Yaling Zhang, China, "A keyword searchable attribute-based encryption scheme with attribute
update for cloud storage" May 24, 2018.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 116
[7]. Rui Zhang, Rui Xue, Ting Yuyz, and Ling Liux, "PVSAE: A Public Verifiable Searchable Encryption Service Framework for
Outsourced Encrypted Data", Qatar, Email: tyu@qf.org.qa College of Computing, Georgia Institute of Technology, Atlanta, GA,
USA, Email: lingliu@cc.gatech.edu.
[8]. A Shiny, Jayanth Das, M Venkat Aravind, C A Anirudh Srivatsaa, M Rahul, "Cloud Server Misbehavior Detection Using
Ranked Keyword Search Results Verification", International Journal of Engineering and Advanced Technology (IJEAT) ISSN:
2249 – 8958, Volume-8 Issue-4, April 2019.
[9]. R. SaiVenkata Siva Kumar, T.P.Anithaashri, "Enhancement Of Cloud Data Search Using Symmetric-KeyBasedVerification",
Chennai, anithaashritp.sse@saveetha.com, European Journal of Molecular & Clinical Medicine ISSN 2515-8260 Volume 07,
Issue 08, 2020.
[10]. Devi Thiyagarajan, R. Ganesan, "USER VERIFIABLE MULTIPLE KEYWORD SEARCH SCHEME USING THE MERKLE TREE
FOR OUTSOURCED DATA IN THE CLOUD", International Journal of Technology(2017) 4:591-600ISSN 2086-9614, (Received:
November 2015 / Revised: February 2017 / Accepted: July 2017).

Recomendados

IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i... por
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
103 vistas4 diapositivas
C017421624 por
C017421624C017421624
C017421624IOSR Journals
137 vistas9 diapositivas
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud por
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
12 vistas3 diapositivas
IRJET- Secure Cloud Data Using Attribute Based Encryption por
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
20 vistas5 diapositivas
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr... por
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
11 vistas5 diapositivas
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou... por
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
526 vistas9 diapositivas

Más contenido relacionado

Similar a Efficient and Empiric Keyword Search Using Cloud

Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey por
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
49 vistas3 diapositivas
Secure Data Sharing In an Untrusted Cloud por
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
294 vistas6 diapositivas
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud por
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
64 vistas4 diapositivas
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage por
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
22 vistas2 diapositivas
Enhanced security framework to ensure data security in cloud using security b... por
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
137 vistas5 diapositivas
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. por
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
423 vistas6 diapositivas

Similar a Efficient and Empiric Keyword Search Using Cloud(20)

Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey por IRJET Journal
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal49 vistas
Secure Data Sharing In an Untrusted Cloud por IJERA Editor
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor294 vistas
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud por IRJET Journal
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal64 vistas
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage por IJERA Editor
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor22 vistas
Enhanced security framework to ensure data security in cloud using security b... por eSAT Journals
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals137 vistas
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. por IJCERT JOURNAL
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL423 vistas
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur... por ijsrd.com
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com162 vistas
Towards Achieving Efficient and Secure Way to Share the Data por IRJET Journal
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal26 vistas
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security por Editor IJMTER
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER299 vistas
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In... por IRJET Journal
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal14 vistas
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou... por IRJET Journal
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal62 vistas
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT por IJNSA Journal
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
IJNSA Journal3 vistas
Accessing secured data in cloud computing environment por IJNSA Journal
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal348 vistas
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp... por IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal6 vistas
Guaranteed Availability of Cloud Data with Efficient Cost por IRJET Journal
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
IRJET Journal84 vistas
C04932125 por IOSR-JEN
C04932125C04932125
C04932125
IOSR-JEN362 vistas
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm por IRJET Journal
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal32 vistas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal35 vistas

Más de IRJET Journal

SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIALIRJET Journal
20 vistas7 diapositivas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...IRJET Journal
8 vistas7 diapositivas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...IRJET Journal
8 vistas5 diapositivas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...IRJET Journal
13 vistas11 diapositivas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...IRJET Journal
14 vistas6 diapositivas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine BladeIRJET Journal
7 vistas5 diapositivas

Más de IRJET Journal(20)

SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIALSOIL STABILIZATION USING WASTE FIBER MATERIAL
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal20 vistas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal8 vistas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...Identification, Discrimination and Classification of Cotton Crop by Using Mul...
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal8 vistas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal13 vistas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal14 vistas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine BladePerformance Analysis of Aerodynamic Design for Wind Turbine Blade
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal7 vistas
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning TechniquesHeart Failure Prediction using Different Machine Learning Techniques
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal7 vistas
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic PanelExperimental Investigation of Solar Hot Case Based on Photovoltaic Panel
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal3 vistas
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian ConcernsMetro Development and Pedestrian Concerns
Metro Development and Pedestrian Concerns
IRJET Journal2 vistas
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal3 vistas
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare IndustryData Analytics and Artificial Intelligence in Healthcare Industry
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal3 vistas
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal52 vistas
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal10 vistas
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest PreservationDevelopment of Effective Tomato Package for Post-Harvest Preservation
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal4 vistas
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal5 vistas
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AIUnderstanding the Nature of Consciousness with AI
Understanding the Nature of Consciousness with AI
IRJET Journal12 vistas
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK KakinadaAugmented Reality App for Location based Exploration at JNTUK Kakinada
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal6 vistas
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal18 vistas
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With WebsocketEnhancing Real Time Communication and Efficiency With Websocket
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal5 vistas
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal4 vistas

Último

DevOps-ITverse-2023-IIT-DU.pptx por
DevOps-ITverse-2023-IIT-DU.pptxDevOps-ITverse-2023-IIT-DU.pptx
DevOps-ITverse-2023-IIT-DU.pptxAnowar Hossain
9 vistas45 diapositivas
DESIGN OF SPRINGS-UNIT4.pptx por
DESIGN OF SPRINGS-UNIT4.pptxDESIGN OF SPRINGS-UNIT4.pptx
DESIGN OF SPRINGS-UNIT4.pptxgopinathcreddy
19 vistas47 diapositivas
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...AltinKaradagli
9 vistas16 diapositivas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptxlwang78
53 vistas19 diapositivas
Saikat Chakraborty Java Oracle Certificate.pdf por
Saikat Chakraborty Java Oracle Certificate.pdfSaikat Chakraborty Java Oracle Certificate.pdf
Saikat Chakraborty Java Oracle Certificate.pdfSaikatChakraborty787148
15 vistas1 diapositiva
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... por
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...Anowar Hossain
13 vistas34 diapositivas

Último(20)

Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli9 vistas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang7853 vistas
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... por Anowar Hossain
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain13 vistas
Proposal Presentation.pptx por keytonallamon
Proposal Presentation.pptxProposal Presentation.pptx
Proposal Presentation.pptx
keytonallamon29 vistas
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy32 vistas
zincalume water storage tank design.pdf por 3D LABS
zincalume water storage tank design.pdfzincalume water storage tank design.pdf
zincalume water storage tank design.pdf
3D LABS5 vistas
What is Whirling Hygrometer.pdf por IIT KHARAGPUR
What is Whirling Hygrometer.pdfWhat is Whirling Hygrometer.pdf
What is Whirling Hygrometer.pdf
IIT KHARAGPUR 12 vistas
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome28 vistas
Effect of deep chemical mixing columns on properties of surrounding soft clay... por AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...Effect of deep chemical mixing columns on properties of surrounding soft clay...
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli6 vistas
Machine Element II Course outline.pdf por odatadese1
Machine Element II Course outline.pdfMachine Element II Course outline.pdf
Machine Element II Course outline.pdf
odatadese19 vistas

Efficient and Empiric Keyword Search Using Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 112 Efficient and Empiric Keyword Search Using Cloud S.S. Swethapriyadarshni1, S.Swathi Priya2, P.Yuvarani3, K.Hemapriya4 1’2’3Panimalar Institute of Technology 4Assistant Professor, Dept. of Computer Science Engineering, Panimalar Institute of Technology, Chennai, TamilNadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud is a Centralized Architecture Server, which serves as a platformforeveryuserofthecloudwanted tostoredata and sensitive information’s in safe secured storage space. The next logical stage in the growth of on-demand information technology services and products is cloud computing. Cloud computing will rely on virtualized resources to a considerable extent. Cloud computing allows IT skills to be reused, and it always includes current computing services such as distributed and grid computing. Users can perform a keyword-based search over encrypted material with searchable encryption. The majority of currently available searchable encryption systems arebasedonasinglecloudserverapproach, whichhassome drawbacks, such as a single point of failure and hostile insiders. The multi cloud server strategy, ontheother hand, providesmoredataavailabilityand security. However, transferring existing keyword search strategies to the multi cloud will result in higher storage and search expenses, with no discernible improvement in data security. In addition, unlike single cloud, a challenge in a multi cloud environment is how to adequately check query integrity when certain cloudserversreturninaccurateorincompletedata. Weoffer an iterative encryption approach to assure file privacy even if numerous cloud services collude with one another to ensure data security. Key Words: Cloud computing, Cloud Server, Encryption, Decryption, Multicloud, AES 1. INTRODUCTION Cloud computing has several attributes, blockchain,forwardapproach,andcryptosystem-basedapproachesareaccustomedto preserving security. The cloud infrastructurehasseveral characteristicsthey'reremotelyhosted,ubiquitous,andcommodified. Currently, several firms are delivering cloud services example Google, Microsoft, etc… Virtualization is an associate degree abstraction of execution of the cloud, so virtual machines are used. To preserve the info, the info is encrypted before outsourcing it to the cloud. Cloud sourcing is turning into a giant deal as a result of its high scale usage and has inexpensive suppliers. There are also problems concerning the policy and access that are overcome by the cloud organization. One of the main challenges of the cloud is the constant net throughout the storage of information. Cloud Computing is the sought-after network access split pool organized computing riches. 1.1 SCOPE OF THE PROJECT With searchable encryption, users can do a keyword-based search across encrypted material. The bulk of searchable encryption solutions currently available are based on a single cloud server architecture, whichhasseveral disadvantagessuch as a single point of failure and hostile insiders. The use of several cloud servers, on the other hand, increases data availability and security. Transferring existing keyword search strategies to the multicloud, on the other hand, will increase storage and search costs while providing no noticeable improvement in data security. One of these services is Amazon Elastic Compute Cloud (EC2), which allows users to have a virtual cluster of computers available at all times through the Internet. On AWS, virtual computers have hardware central processing units (CPUs) and graphics processingunits(GPUs)forprocessing,aswell as local/RAM memory, hard disk/SSD storage, a choice of operating systems, networking,andpre-loadedapplicationsoftware such as web servers, databases, and customer relationship management (CRM). The project's goal is to integrate keyword search across various clouds so that users can quickly locate a specific file or data, and to prevent the involvement of third parties so that data is secure and protected. 1.2 EXISTING SYSTEM Without needing to learn the plaintexts, searchable encryption allows a cloud server toconductkeywordsearches onbehalfof data users over encrypted data. The majority of currently available searchable encryption systems, on the other hand, only support single or conjunctive keyword searches, and the few schemes that can perform expressive keyword searches are computationally inefficient because they are built from bilinear pairings over composite-order groups. In existingsystems,an expressive public-key searchable encryption technique in the prime-order groups outperforms existingschemessignificantly by allowing keyword search rules to be defined in conjunctive, disjunctive, or any monotonic Boolean formulas. When a user
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 113 obtains data from a concerned person via the internet, unknown or invalidusersmaygainaccesstothedata stored ona central server or database. It could result in data being lost or altered by a third party. Most existing PEKS methods, regardless of search authorisation, focus on data consumers'richsearchfunctionalities.Theframework allowsclientstosendencrypteddata to the cloud, allows users to search for documents using different keywords, and allows them to check the server's response. 2. PROPOSED SYSTEM Encrypting a file, then making n copies of it, and distributing the n copies to n cloud servers is astraightforward filedistribution solution in numerous clouds. Userscan still retrieve the fileeven if (n-1)cloudserversareofflineinthissituation,indicatingthat this distribution mechanism is highly reliable. The cloud server is merely aware that if it engages in unethical behavior, it will almost certainly be discovered. The suggested design reduces storage overhead on both the client and user sides. The retrieval timelowers as the number of documents increases, cuttingstorage costs forboth parties. However,thismethodnecessitatesan excessive amount of storageoverhead. Furthermore,becauseeachcloudserverhasaccesstotheentireencryptedfile,webuilda secureand reliable file distribution strategy in various clouds to strike a better balance between storageoverhead,privacy,and reliability. We present an iterative encryption strategy inspired by the two-layer encryption scheme to preserve the privacy of data files even if numerous cloud serversstart a collusionattackatthesametime.Inthissystem,userscanalsoproducea unique code to gain access to a record from an authorized individual. It will provide users with a safe access method as well as protect unknown individuals from dangerous activities. Output-1: User login page Output-2: Registration page
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 114 Output-3: Keyword Searching page Output-4: Response page Output-5: AWS Cloud shell
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 115 Output-6: Fetched data from AWS Cloud shell 3. CONCLUSIONS In this, we propose a solid and certain keyword search conspire in different mists, which permits the information client to perform catchphrase search in a safe, dependable, and unquestionable way. To begin with, we proposea solidanddependable document appropriation conspire, which guarantees security throughiterativeencryptionanddependability bypresentingRS deletion code innovation. Second, we plan a Bloom channel tree file structure and extend it to a multi cloud climate. Third, we execute a viable trustworthiness confirmation calculation that can rapidly check the respectability of inquiry results and recognize pernicious cloud servers. At long last, we do security investigation and exploratoryassessmenttocheck thesecurity and viability of our plan. For the future work, first, we will investigate a quicker and more effective record dissemination conspire that permits clients to bear lower reproduction costs. Second, we will stretch out the protected hunt plan to accomplish fluffy question, positioning inquiry, and multi watchword question. REFERENCES [1]. Yunhong Zhou, Shihui Zheng, and Licheng Wang, "Privacy-Preserving and Efficient Public Key Encryption with Keyword Search-Based CP-ABE in Cloud", 13 October 2020. [2]. Qingji Zheng Shouhuai Xu Giuseppe Ateniese, "VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data", the University of Texas at San Antonio, USA Sapienza University of Rome, ItalyandJohnsHopkins University, USA. [3]. Mrs. Zabiha Khan, Assistant Professor, Dept. of CSE, Ghousia College of Engineering, Karnataka, India, Ms. Kamala Kumari, B. K, Rumana Iffath, Saima Ahmed, Zaiba Tabassum UG Students Ghousia College of Engineering, Ramanagaram, "Review of Attribute-based Keyword Search AuthorizationinCloud",www.ijert.orgNConPCS -2017ConferenceProceedingsSpecial Issue - 2017. [4]. XINRUI GE, JIA YU, CHENGYU HU, HANLIN ZHANG, AND RONG HAO, 1. College of Computer Science and Technology, Qingdao University, Qingdao 266071, China,"EnablingEfficientVerifiableFuzzyKeywordSearchOverEncryptedData inCloud Computing", date of current version September 7, 2018. [5]. Lincei, Chungen Xu, Lei Xiaoling Yu, and Cong Zuo, "VerifiableIdentity-BasedEncryption withKeyword SearchforIoTfrom Lattice", Accepted: 24 February 2021. [6]. Shangping Wang, Jian Ye, Yaling Zhang, China, "A keyword searchable attribute-based encryption scheme with attribute update for cloud storage" May 24, 2018.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 116 [7]. Rui Zhang, Rui Xue, Ting Yuyz, and Ling Liux, "PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data", Qatar, Email: tyu@qf.org.qa College of Computing, Georgia Institute of Technology, Atlanta, GA, USA, Email: lingliu@cc.gatech.edu. [8]. A Shiny, Jayanth Das, M Venkat Aravind, C A Anirudh Srivatsaa, M Rahul, "Cloud Server Misbehavior Detection Using Ranked Keyword Search Results Verification", International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-8 Issue-4, April 2019. [9]. R. SaiVenkata Siva Kumar, T.P.Anithaashri, "Enhancement Of Cloud Data Search Using Symmetric-KeyBasedVerification", Chennai, anithaashritp.sse@saveetha.com, European Journal of Molecular & Clinical Medicine ISSN 2515-8260 Volume 07, Issue 08, 2020. [10]. Devi Thiyagarajan, R. Ganesan, "USER VERIFIABLE MULTIPLE KEYWORD SEARCH SCHEME USING THE MERKLE TREE FOR OUTSOURCED DATA IN THE CLOUD", International Journal of Technology(2017) 4:591-600ISSN 2086-9614, (Received: November 2015 / Revised: February 2017 / Accepted: July 2017).