SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 |May-2014, Available @ http://www.ijret.org 845
SECURE RETRIEVAL OF FILES USING HOMOMORPHIC
ENCRYPTION FOR CLOUD COMPUTING
R. Sharmila1
1
PG Scholar, Computer Science and Engineering, R.M.K. Engineering College, Tamil Nadu, India
Abstract
Clouds allow users to store data and access can be made anywhere, any time by using any device. Highly sensitive information
such as business documents, medical records and personal information may be stored in a cloud. Security and privacy are thus
very important issues in cloud computing. To keep user data confidential from an untrusted Cloud Service Provider and third
parties, a natural way is encryption. The data decryption key should be disclosed only to users who have been authorized. Users
can search their files using keywords in the cloud. In existing literature many schemes have been proposed. In this paper, a new
technique is described: Multi-keyword searching using homomorphic encryption. It is an algorithm which performs operations on
encrypted data which will provide results without decrypting that data. It provides privacy for user querying patterns and user
data. It allows Cloud Service Providers to perform operations on the encrypted data. The Cloud Service Provider is unaware of
the files and keywords stored in the cloud. Ranking is used for efficient and fast retrieval of the desired files. Ranks will be
assigned to files based on the frequency of access of the files.
Keywords: Homomorphic encryption, Multi-keyword searching, Cloud Service Provider, Ranking.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is an important trend in the present
scenario. However, there is no standard definition for cloud
computing, nevertheless, the National Institute for Standards
and Technology (NIST) provides the following workable
definition: “Cloud computing is a model for enabling
ubiquitous, convenient, on-demand network access to a
shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that
can be rapidly provisioned and released with minimal
management effort or service provider interaction.
NIST mentions the essential characteristics of cloud
computing as on demand self-service, broad network access,
resource pooling, rapid elasticity, and measured service. The
service models commonly employed in cloud computing
are: Software as a service (SaaS), Platform as a service
(PaaS), and Infrastructure as a service (IaaS). The
deployment models normally used in cloud computing
include: Private cloud, Public cloud, Community cloud,
Hybrid cloud [1].
One of the most fundamental services provided by the cloud
is Storage as a Service. In this service, data security, data
privacy and data retrieval are considered as the main issues.
Even though the cloud has challenging issues such as
security, privacy, attacks, data loss and leakage, it has
attractive benefits: capability to share resources and
maximize their utilization, provision for pay as you use,
reduced infrastructure and maintenance costs, and
accessibility and flexibility.
Cloud computing is capable of providing flexible
infrastructure. Hence, users need not own the infrastructure.
Cloud computing supports high scalability and multi-
tenancy. The payment for using the services may be made
on a pay-per-use basis. Cloud users should be aware of
trusted and untrusted Cloud Service Providers before storing
their data in cloud. It is important for the data owner how
the Cloud Service Provider will regulate access to data and
keep it secure. Cloud Service Providers must make sure that
the customer’s personal information is well secured from
third parties.
Assume that a user wants to store his files in a cloud and
later he wants to retrieve specific files. The best approach is
keyword-based searching for retrieving files. If the user
stores his data without any protection mechanism, there is a
chance for attacks such as internal and external attacks. User
data and querying patterns should not be revealed to any
untrusted Cloud Service Providers or unauthorized attackers.
It must be kept secured. Therefore encrypted files are stored
in the cloud. Along with the files, keywords are also
encrypted and stored. If simple encryption is used then the
Cloud Service Provider will return all the files related to the
keyword because the encryption is not searchable. The
encryption used should be searchable and therefore users
can retrieve their desired files.
Different schemes were introduced for keyword searching
over encrypted data. It is efficient and supports searching on
the encrypted data. To search and retrieve securely
Searchable Encryption was developed. It allows the Cloud
Service Provider to verify whether the keyword specified by
a user is contained in a file. The Cloud Service Provider is
unaware of the keywords and files.
Many techniques support just single keyword search. Users
have to provide exact keywords. Due to single keyword
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 |May-2014, Available @ http://www.ijret.org 846
search, retrieval of particular files was limited. Multi-
keyword searching techniques were also introduced;
however, they do not provide the desired security levels for
user data stored in a cloud and user querying patterns when
retrieving files.
To overcome the above drawbacks, we use Multi-Keyword
searching using Homomorphic Encryption. It is a novel
technique which aims to provide data confidentiality in the
cloud. Homomorphic encryption is an algorithm which
performs operations on the encrypted data, User data and
query patterns can be maintained securely.
The rest of the paper is organized as follows: Related works
are reviewed in Section 2. The proposed system is described
in Section 3. Performance is explored in Section 4. Finally,
conclusions are given in Section 5.
2. RELATED WORKS
Q.Liu et al. [5] proposed the Secure and Privacy Preserving
Keyword Search (SPKS) scheme which enables the Cloud
Service Provider not only to determine which files contain
certain keywords specified by the user, but also to
participate in the partial decipherment to get the result of the
decipherment before returning the search results. Thus it
reduces both the communication and computational
overhead in decryption for the user, on the condition of
preserving user data privacy and user querying privacy.
They had implemented this scheme with single keyword
searching.
To retrieve a desired file many schemes have been
developed in recent years. C.Orencik and E.Sava [6]
described the Private Information Retrieval (PIR) protocol.
Privacy-preserving ranked keyword search scheme based on
Private Information Retrieval (PIR) is used which allows
multi-keyword queries with ranking capability and provides
security.
After searchable encryption, fuzzy-keyword search was also
introduced. Fuzzy-keyword search is a spell check
mechanism. J.Li et al. [3] discussed Wildcard-based fuzzy-
keyword set constructions with edit distance. Fuzzy-
keyword search greatly enhances system usability by
returning the matching files when users searching inputs
exactly match the pre-defined keywords or the closest
possible matching files based on keyword similarity
semantics, when exact match fails. Wildcard-based fuzzy
keyword set construction with edit distance is used by the
authors and it does not support sequences of keywords.
W.Zhou et al [8] defined K-grams based fuzzy-keyword
sets. In their article, two separate servers which cannot
communicate with each other are used to provide security.
There are search servers and storage servers. In this scheme,
building query requests includes three procedures:
generating fuzzy keyword set according to the building
coefficient, generating trap doors, and generating an index.
It should be noted that the size of the fuzzy keyword set
should be controlled.
3. PROPOSED WORK
3.1 System Model
Figure-1 illustrates the architecture of cloud storage. It
consists of the following entities:
Data Owner: Data owner will encrypt his files and
keywords and store it in the cloud. When he is interested in
retrieving a file using multi-keyword searching he can
retrieve it. He can store his files in public clouds as well as
in private clouds.
Other Users: They are the users to whom the data owner
has given rights to access the files stored in a public cloud.
The authentication details of these users are verified using
cloud servers.
Key Server: It is a reliable server which stores the keys for
the encrypted files in the cloud. Files and keywords are
stored along with signature of the files. It provides the
decryption key for a file after verifying the signature of the
file name.
Cloud Server: It is a server where the encrypted files and
the keywords are stored. It verifies the authentication of the
users. It allows the Cloud Service Provider to perform
operations on the encrypted data.
Cloud Service Provider: The data owner has to choose
reliable Cloud Service Providers who will keep the clients
information secure and must prevent it from any attacks.
When the data owner specifies the keywords, the Cloud
Service Provider will verify the keywords and provide it to
the data owner. Both the Cloud Service Provider and the
cloud server are unaware of the files and the keywords.
Fig-1. Architecture of Proposed Work
3.2 Working Methodology
Homomorphic Encryption
Definition: It allows specific types of computations to be
carried out on the cipher text and to obtain an encrypted
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 |May-2014, Available @ http://www.ijret.org 847
result which when decrypted matches the result of
operations performed on the plaintext.
Before it is sent, the data in the cloud is encrypted with
homomorphic encryption and operations are executed in the
encrypted data and the results are decrypted, it is same as
the operations performed on the original data.
Homomorphic encryption cryptosystem provides security
and data confidentiality.
In homomorphic encryption, there is just one operation on
the plaintext that has a corresponding operation on the
cipher text. For example, plain RSA has that property.
Suppose cipher text c1 is the encryption under a public key
pk of plaintext m1, and c2 is the encryption under the same
key of m2; that is
c1 = enc(pk, m1) and c2 = enc( pk, m2).
Then multiplying the cipher texts results in something
which, when decrypted, is identical to the result of
multiplying the two plaintexts. That is, if sk is the
decryption key corresponding to pk, then
m1 × m2 = dec (sk, c1 × c2) [9].
An algorithm is homomorphic if it is made up of addition,
subtraction, multiplication functions. In the proposed
system, we use multiplication while encrypting the data.
This algorithm consists of the following steps:
1. Key generation
2. Encryption
3. Decryption
The data owner encrypts his files and keywords using this
algorithm and stores it in cloud storage. The number of
times the files and keywords has to be encrypted may be
specified. When the data owner requires his file to be
retrieved, he can request the Cloud Service Provider. The
Cloud Service Provider will perform computations on the
encrypted data without knowing anything of the files and the
keywords. It will send back the results to the data owner.
The data owner can decrypt it.
Paillier cryptosystem supports the both additive and
multiplicative homomorphic encryption. In proposed system
we use multiplication property for encryption. The
algorithm steps are defined in [10].
The owner can store his files in the private cloud as well as
in the public cloud. If he wishes other users to access files
which are publicly stored he can give rights to them. The
owner will send the secret key for authorized users. Their
access rights are verified by the cloud sever. The owner
should be aware of the revoked users.
Multi-keyword searching is used to retrieve a desired file
from a database. When a user wants to retrieve a file, he can
enter multiple keywords. The Cloud Service Provider could
determine which all files that contain the specified keyword
without revealing anything about the contents of the
document or the keyword searched. The Cloud Service
Provider will verify the keywords specified by the user and
the keywords already stored in cloud.
The owner will be asked for the secret key and the number
of times the encryption used during the encryption. By
defining those,he will be able to retrieve his file. The time
consumption for retrieving the desired file should be less.
Therefore ranking scheme is used. While searching with
keywords, it is difficult to decide which documents are the
most relevant. We can build an index for frequently
occurring keywords. Ranks are assigned to the files based
upon a frequent access to the file. The file that contains the
highest ranks and the keywords specified by the data owner
can be retrieved quickly. The top-most files are retrieved
and the data owner can download it.
4. PERFORMANCE EVALUATION
In this section, the performance of our technique is
evaluated. The experiment is implemented using java
language and tomcat server deployment. The time
consumption for retrieving a file is less using ranking
scheme. Chart-1 defines the performance of retrieval of file
using Homomorphic encryption.
Chart-1 Retrieval of files
5. CONCLUSIONS
This paper describes the problem of retrieving files from
cloud storage and keeping the files secure from untrusted
Cloud Service Providers and third parties. The
homomorphic encryption algorithm aims to give privacy for
user data and querying patterns. Users can encrypt their files
along with keywords using this algorithm. It provides
confidentiality for user querying patterns and privacy for
user data. The Cloud Service Providers are unaware of the
files and the keywords. Ranking scheme improves the
retrieval of files. It reduces the time taken to retrieve the
files. Finally, security and confidentiality of data is
maintained in the cloud. Thus, homomorphic encryption has
many advantages.
0
20
40
60
80
100
120
T
i
m
e
t
a
k
e
n
with ranking
without ranking
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 |May-2014, Available @ http://www.ijret.org 848
Multi-keyword searching is used to retrieve a desired file
from a database. When a user wants to retrieve a file, he can
enter multiple keywords. The Cloud Server could determine
which all files contain the specified keyword without
revealing anything about the contents of document
REFERENCES
[1]. The NIST Definition of Cloud Computing, NIST
Special Publication 800-145, 2011.
[2]. B. Hayes, American Scientist- The Magazine of Sigma
Xi, The Scientific Research Society, 2012.
[3]. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou,
Fuzzy Keyword Search over Encrypted Data in Cloud
Computing, Proceedings of IEEE, INFOCOM, pages:1– 5,
2010.
[4]. M. Li, S. Yu, N. Cao and W. Lou, Authorized Private
Keyword Search over Encrypted Data in Cloud Computing,
Proceedings of Distributed computing systems (ICDCS),
pages:383 – 392, 2011.
[5]. Q. Liu, G. Wang, and J. Wub, Secure and Privacy
Preserving Keyword Searching for cloud storage services,
Journal of Network and Computer Applications Vol. 35,
pages: 927–933, Elsevier, 2012.
[6]. C. Orencik and E. Sava, Efficient and Secure Ranked
Multi-Keyword Search on Encrypted Cloud Data,
Proceedings in EDBT- ICDT, pages:186 -195, ACM: New
York, 2012.
[7]. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, Secure
Ranked Keyword Search Over Encrypted Cloud Data. In
ICDCS'10, pages 253- 262, 2010.
[8]. W. Zhou, L.Liu, H.Jing, C.Zhang, S.Yao, S.Wang, K-
Gram Based Fuzzy Keyword Search over Encrypted Cloud
Computing, Journal of Software Engineering &
Applications, Vol. 6, pages: 29-32, 2013.
[9]. Mark D. Ryan, Cloud computing security: The scientific
challenge, and a survey of solutions, Journal of Systems and
Software Vol. 86, pages: 2263– 2268, Elsevier,2013.
[10]. http://en.wikipedia.org/wiki/Paillier_cryptosystem.
[11]. N. Islam, W. Puech, K. Hayat, R. Brouzet,
Application of Homomorphism to Secure Image Sharing,
Optics Communication Vol. 284, pages:4412-4429,
Elsevier, 2011.
BIOGRAPHIE:
Received B.E degree in Computer Science
and Engineering from Anna University of
Technology, Tiruchirappalli, in 2012 She is
Pursuing M.E degree in Computer Science
and Engineering in R.M.K. Engineering
College, Chennai. Her Research areas are
focused on Cloud Computing and Network Security.

More Related Content

What's hot

IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qcIAESIJEECS
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueeSAT Journals
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...IRJET Journal
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...1crore projects
 
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...iosrjce
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446IJRAT
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...cscpconf
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataIRJET Journal
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET Journal
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...1crore projects
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 

What's hot (19)

IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
Secured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation techniqueSecured architecture for multi cloud using key aggregation technique
Secured architecture for multi cloud using key aggregation technique
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...IRJET -  	  Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
 
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
 
Paper id 27201446
Paper id 27201446Paper id 27201446
Paper id 27201446
 
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption System
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 

Viewers also liked

Secured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDPSecured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDPIJSRD
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...Patel Dasharathbhai
 
Self runtime environment using android
Self runtime environment using androidSelf runtime environment using android
Self runtime environment using androideSAT Publishing House
 
Study on soundness of reinforced concrete structures by ndt approach
Study on soundness of reinforced concrete structures by ndt approachStudy on soundness of reinforced concrete structures by ndt approach
Study on soundness of reinforced concrete structures by ndt approacheSAT Publishing House
 
Geographical information system (gis) for water
Geographical information system (gis) for waterGeographical information system (gis) for water
Geographical information system (gis) for watereSAT Publishing House
 
Design of intelligent transport related issue system
Design of intelligent transport related issue systemDesign of intelligent transport related issue system
Design of intelligent transport related issue systemeSAT Publishing House
 
Optimization of friction stir welding process
Optimization of friction stir welding processOptimization of friction stir welding process
Optimization of friction stir welding processeSAT Publishing House
 
Optimization and implementation of parallel squarer
Optimization and implementation of parallel squarerOptimization and implementation of parallel squarer
Optimization and implementation of parallel squarereSAT Publishing House
 
The longitudinal perturbated fluid velocity of the
The longitudinal perturbated fluid velocity of theThe longitudinal perturbated fluid velocity of the
The longitudinal perturbated fluid velocity of theeSAT Publishing House
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safeeSAT Publishing House
 
A design for improving the core shelf system in a core
A design for improving the core shelf system in a coreA design for improving the core shelf system in a core
A design for improving the core shelf system in a coreeSAT Publishing House
 
Optimum earthquake response of tall buildings
Optimum earthquake response of tall buildingsOptimum earthquake response of tall buildings
Optimum earthquake response of tall buildingseSAT Publishing House
 
A theoretical study on partially automated method
A theoretical study on partially automated methodA theoretical study on partially automated method
A theoretical study on partially automated methodeSAT Publishing House
 
Dispersion modeling of nitrous oxide emissions from a nitric acid plant in de...
Dispersion modeling of nitrous oxide emissions from a nitric acid plant in de...Dispersion modeling of nitrous oxide emissions from a nitric acid plant in de...
Dispersion modeling of nitrous oxide emissions from a nitric acid plant in de...eSAT Publishing House
 
Resource potential appraisal assessment and to
Resource potential appraisal  assessment and toResource potential appraisal  assessment and to
Resource potential appraisal assessment and toeSAT Publishing House
 
Analysis and implementation of modified k medoids
Analysis and implementation of modified k medoidsAnalysis and implementation of modified k medoids
Analysis and implementation of modified k medoidseSAT Publishing House
 
Power quality improvement using impedance network based inverter
Power quality improvement using impedance network based inverterPower quality improvement using impedance network based inverter
Power quality improvement using impedance network based invertereSAT Publishing House
 
Analysis of methane diffusion flames
Analysis of methane diffusion flamesAnalysis of methane diffusion flames
Analysis of methane diffusion flameseSAT Publishing House
 
Transfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interfaceTransfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interfaceeSAT Publishing House
 

Viewers also liked (20)

Secured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDPSecured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDP
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
 
Self runtime environment using android
Self runtime environment using androidSelf runtime environment using android
Self runtime environment using android
 
Study on soundness of reinforced concrete structures by ndt approach
Study on soundness of reinforced concrete structures by ndt approachStudy on soundness of reinforced concrete structures by ndt approach
Study on soundness of reinforced concrete structures by ndt approach
 
Geographical information system (gis) for water
Geographical information system (gis) for waterGeographical information system (gis) for water
Geographical information system (gis) for water
 
Design of intelligent transport related issue system
Design of intelligent transport related issue systemDesign of intelligent transport related issue system
Design of intelligent transport related issue system
 
Green vehicle
Green vehicleGreen vehicle
Green vehicle
 
Optimization of friction stir welding process
Optimization of friction stir welding processOptimization of friction stir welding process
Optimization of friction stir welding process
 
Optimization and implementation of parallel squarer
Optimization and implementation of parallel squarerOptimization and implementation of parallel squarer
Optimization and implementation of parallel squarer
 
The longitudinal perturbated fluid velocity of the
The longitudinal perturbated fluid velocity of theThe longitudinal perturbated fluid velocity of the
The longitudinal perturbated fluid velocity of the
 
A novel approach to information security using safe
A novel approach to information security using safeA novel approach to information security using safe
A novel approach to information security using safe
 
A design for improving the core shelf system in a core
A design for improving the core shelf system in a coreA design for improving the core shelf system in a core
A design for improving the core shelf system in a core
 
Optimum earthquake response of tall buildings
Optimum earthquake response of tall buildingsOptimum earthquake response of tall buildings
Optimum earthquake response of tall buildings
 
A theoretical study on partially automated method
A theoretical study on partially automated methodA theoretical study on partially automated method
A theoretical study on partially automated method
 
Dispersion modeling of nitrous oxide emissions from a nitric acid plant in de...
Dispersion modeling of nitrous oxide emissions from a nitric acid plant in de...Dispersion modeling of nitrous oxide emissions from a nitric acid plant in de...
Dispersion modeling of nitrous oxide emissions from a nitric acid plant in de...
 
Resource potential appraisal assessment and to
Resource potential appraisal  assessment and toResource potential appraisal  assessment and to
Resource potential appraisal assessment and to
 
Analysis and implementation of modified k medoids
Analysis and implementation of modified k medoidsAnalysis and implementation of modified k medoids
Analysis and implementation of modified k medoids
 
Power quality improvement using impedance network based inverter
Power quality improvement using impedance network based inverterPower quality improvement using impedance network based inverter
Power quality improvement using impedance network based inverter
 
Analysis of methane diffusion flames
Analysis of methane diffusion flamesAnalysis of methane diffusion flames
Analysis of methane diffusion flames
 
Transfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interfaceTransfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interface
 

Similar to Secure retrieval of files using homomorphic encryption for cloud computing

Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...IJCI JOURNAL
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...1crore projects
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmenteSAT Journals
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...ASAITHAMBIRAJAA
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...redpel dot com
 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET Journal
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...Editor IJCATR
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 

Similar to Secure retrieval of files using homomorphic encryption for cloud computing (20)

Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
An efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environmentAn efficient, secure deduplication data storing in cloud storage environment
An efficient, secure deduplication data storing in cloud storage environment
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
J017547478
J017547478J017547478
J017547478
 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 

Recently uploaded (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 

Secure retrieval of files using homomorphic encryption for cloud computing

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 |May-2014, Available @ http://www.ijret.org 845 SECURE RETRIEVAL OF FILES USING HOMOMORPHIC ENCRYPTION FOR CLOUD COMPUTING R. Sharmila1 1 PG Scholar, Computer Science and Engineering, R.M.K. Engineering College, Tamil Nadu, India Abstract Clouds allow users to store data and access can be made anywhere, any time by using any device. Highly sensitive information such as business documents, medical records and personal information may be stored in a cloud. Security and privacy are thus very important issues in cloud computing. To keep user data confidential from an untrusted Cloud Service Provider and third parties, a natural way is encryption. The data decryption key should be disclosed only to users who have been authorized. Users can search their files using keywords in the cloud. In existing literature many schemes have been proposed. In this paper, a new technique is described: Multi-keyword searching using homomorphic encryption. It is an algorithm which performs operations on encrypted data which will provide results without decrypting that data. It provides privacy for user querying patterns and user data. It allows Cloud Service Providers to perform operations on the encrypted data. The Cloud Service Provider is unaware of the files and keywords stored in the cloud. Ranking is used for efficient and fast retrieval of the desired files. Ranks will be assigned to files based on the frequency of access of the files. Keywords: Homomorphic encryption, Multi-keyword searching, Cloud Service Provider, Ranking. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Cloud computing is an important trend in the present scenario. However, there is no standard definition for cloud computing, nevertheless, the National Institute for Standards and Technology (NIST) provides the following workable definition: “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. NIST mentions the essential characteristics of cloud computing as on demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. The service models commonly employed in cloud computing are: Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). The deployment models normally used in cloud computing include: Private cloud, Public cloud, Community cloud, Hybrid cloud [1]. One of the most fundamental services provided by the cloud is Storage as a Service. In this service, data security, data privacy and data retrieval are considered as the main issues. Even though the cloud has challenging issues such as security, privacy, attacks, data loss and leakage, it has attractive benefits: capability to share resources and maximize their utilization, provision for pay as you use, reduced infrastructure and maintenance costs, and accessibility and flexibility. Cloud computing is capable of providing flexible infrastructure. Hence, users need not own the infrastructure. Cloud computing supports high scalability and multi- tenancy. The payment for using the services may be made on a pay-per-use basis. Cloud users should be aware of trusted and untrusted Cloud Service Providers before storing their data in cloud. It is important for the data owner how the Cloud Service Provider will regulate access to data and keep it secure. Cloud Service Providers must make sure that the customer’s personal information is well secured from third parties. Assume that a user wants to store his files in a cloud and later he wants to retrieve specific files. The best approach is keyword-based searching for retrieving files. If the user stores his data without any protection mechanism, there is a chance for attacks such as internal and external attacks. User data and querying patterns should not be revealed to any untrusted Cloud Service Providers or unauthorized attackers. It must be kept secured. Therefore encrypted files are stored in the cloud. Along with the files, keywords are also encrypted and stored. If simple encryption is used then the Cloud Service Provider will return all the files related to the keyword because the encryption is not searchable. The encryption used should be searchable and therefore users can retrieve their desired files. Different schemes were introduced for keyword searching over encrypted data. It is efficient and supports searching on the encrypted data. To search and retrieve securely Searchable Encryption was developed. It allows the Cloud Service Provider to verify whether the keyword specified by a user is contained in a file. The Cloud Service Provider is unaware of the keywords and files. Many techniques support just single keyword search. Users have to provide exact keywords. Due to single keyword
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 |May-2014, Available @ http://www.ijret.org 846 search, retrieval of particular files was limited. Multi- keyword searching techniques were also introduced; however, they do not provide the desired security levels for user data stored in a cloud and user querying patterns when retrieving files. To overcome the above drawbacks, we use Multi-Keyword searching using Homomorphic Encryption. It is a novel technique which aims to provide data confidentiality in the cloud. Homomorphic encryption is an algorithm which performs operations on the encrypted data, User data and query patterns can be maintained securely. The rest of the paper is organized as follows: Related works are reviewed in Section 2. The proposed system is described in Section 3. Performance is explored in Section 4. Finally, conclusions are given in Section 5. 2. RELATED WORKS Q.Liu et al. [5] proposed the Secure and Privacy Preserving Keyword Search (SPKS) scheme which enables the Cloud Service Provider not only to determine which files contain certain keywords specified by the user, but also to participate in the partial decipherment to get the result of the decipherment before returning the search results. Thus it reduces both the communication and computational overhead in decryption for the user, on the condition of preserving user data privacy and user querying privacy. They had implemented this scheme with single keyword searching. To retrieve a desired file many schemes have been developed in recent years. C.Orencik and E.Sava [6] described the Private Information Retrieval (PIR) protocol. Privacy-preserving ranked keyword search scheme based on Private Information Retrieval (PIR) is used which allows multi-keyword queries with ranking capability and provides security. After searchable encryption, fuzzy-keyword search was also introduced. Fuzzy-keyword search is a spell check mechanism. J.Li et al. [3] discussed Wildcard-based fuzzy- keyword set constructions with edit distance. Fuzzy- keyword search greatly enhances system usability by returning the matching files when users searching inputs exactly match the pre-defined keywords or the closest possible matching files based on keyword similarity semantics, when exact match fails. Wildcard-based fuzzy keyword set construction with edit distance is used by the authors and it does not support sequences of keywords. W.Zhou et al [8] defined K-grams based fuzzy-keyword sets. In their article, two separate servers which cannot communicate with each other are used to provide security. There are search servers and storage servers. In this scheme, building query requests includes three procedures: generating fuzzy keyword set according to the building coefficient, generating trap doors, and generating an index. It should be noted that the size of the fuzzy keyword set should be controlled. 3. PROPOSED WORK 3.1 System Model Figure-1 illustrates the architecture of cloud storage. It consists of the following entities: Data Owner: Data owner will encrypt his files and keywords and store it in the cloud. When he is interested in retrieving a file using multi-keyword searching he can retrieve it. He can store his files in public clouds as well as in private clouds. Other Users: They are the users to whom the data owner has given rights to access the files stored in a public cloud. The authentication details of these users are verified using cloud servers. Key Server: It is a reliable server which stores the keys for the encrypted files in the cloud. Files and keywords are stored along with signature of the files. It provides the decryption key for a file after verifying the signature of the file name. Cloud Server: It is a server where the encrypted files and the keywords are stored. It verifies the authentication of the users. It allows the Cloud Service Provider to perform operations on the encrypted data. Cloud Service Provider: The data owner has to choose reliable Cloud Service Providers who will keep the clients information secure and must prevent it from any attacks. When the data owner specifies the keywords, the Cloud Service Provider will verify the keywords and provide it to the data owner. Both the Cloud Service Provider and the cloud server are unaware of the files and the keywords. Fig-1. Architecture of Proposed Work 3.2 Working Methodology Homomorphic Encryption Definition: It allows specific types of computations to be carried out on the cipher text and to obtain an encrypted
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 |May-2014, Available @ http://www.ijret.org 847 result which when decrypted matches the result of operations performed on the plaintext. Before it is sent, the data in the cloud is encrypted with homomorphic encryption and operations are executed in the encrypted data and the results are decrypted, it is same as the operations performed on the original data. Homomorphic encryption cryptosystem provides security and data confidentiality. In homomorphic encryption, there is just one operation on the plaintext that has a corresponding operation on the cipher text. For example, plain RSA has that property. Suppose cipher text c1 is the encryption under a public key pk of plaintext m1, and c2 is the encryption under the same key of m2; that is c1 = enc(pk, m1) and c2 = enc( pk, m2). Then multiplying the cipher texts results in something which, when decrypted, is identical to the result of multiplying the two plaintexts. That is, if sk is the decryption key corresponding to pk, then m1 × m2 = dec (sk, c1 × c2) [9]. An algorithm is homomorphic if it is made up of addition, subtraction, multiplication functions. In the proposed system, we use multiplication while encrypting the data. This algorithm consists of the following steps: 1. Key generation 2. Encryption 3. Decryption The data owner encrypts his files and keywords using this algorithm and stores it in cloud storage. The number of times the files and keywords has to be encrypted may be specified. When the data owner requires his file to be retrieved, he can request the Cloud Service Provider. The Cloud Service Provider will perform computations on the encrypted data without knowing anything of the files and the keywords. It will send back the results to the data owner. The data owner can decrypt it. Paillier cryptosystem supports the both additive and multiplicative homomorphic encryption. In proposed system we use multiplication property for encryption. The algorithm steps are defined in [10]. The owner can store his files in the private cloud as well as in the public cloud. If he wishes other users to access files which are publicly stored he can give rights to them. The owner will send the secret key for authorized users. Their access rights are verified by the cloud sever. The owner should be aware of the revoked users. Multi-keyword searching is used to retrieve a desired file from a database. When a user wants to retrieve a file, he can enter multiple keywords. The Cloud Service Provider could determine which all files that contain the specified keyword without revealing anything about the contents of the document or the keyword searched. The Cloud Service Provider will verify the keywords specified by the user and the keywords already stored in cloud. The owner will be asked for the secret key and the number of times the encryption used during the encryption. By defining those,he will be able to retrieve his file. The time consumption for retrieving the desired file should be less. Therefore ranking scheme is used. While searching with keywords, it is difficult to decide which documents are the most relevant. We can build an index for frequently occurring keywords. Ranks are assigned to the files based upon a frequent access to the file. The file that contains the highest ranks and the keywords specified by the data owner can be retrieved quickly. The top-most files are retrieved and the data owner can download it. 4. PERFORMANCE EVALUATION In this section, the performance of our technique is evaluated. The experiment is implemented using java language and tomcat server deployment. The time consumption for retrieving a file is less using ranking scheme. Chart-1 defines the performance of retrieval of file using Homomorphic encryption. Chart-1 Retrieval of files 5. CONCLUSIONS This paper describes the problem of retrieving files from cloud storage and keeping the files secure from untrusted Cloud Service Providers and third parties. The homomorphic encryption algorithm aims to give privacy for user data and querying patterns. Users can encrypt their files along with keywords using this algorithm. It provides confidentiality for user querying patterns and privacy for user data. The Cloud Service Providers are unaware of the files and the keywords. Ranking scheme improves the retrieval of files. It reduces the time taken to retrieve the files. Finally, security and confidentiality of data is maintained in the cloud. Thus, homomorphic encryption has many advantages. 0 20 40 60 80 100 120 T i m e t a k e n with ranking without ranking
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 |May-2014, Available @ http://www.ijret.org 848 Multi-keyword searching is used to retrieve a desired file from a database. When a user wants to retrieve a file, he can enter multiple keywords. The Cloud Server could determine which all files contain the specified keyword without revealing anything about the contents of document REFERENCES [1]. The NIST Definition of Cloud Computing, NIST Special Publication 800-145, 2011. [2]. B. Hayes, American Scientist- The Magazine of Sigma Xi, The Scientific Research Society, 2012. [3]. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, Fuzzy Keyword Search over Encrypted Data in Cloud Computing, Proceedings of IEEE, INFOCOM, pages:1– 5, 2010. [4]. M. Li, S. Yu, N. Cao and W. Lou, Authorized Private Keyword Search over Encrypted Data in Cloud Computing, Proceedings of Distributed computing systems (ICDCS), pages:383 – 392, 2011. [5]. Q. Liu, G. Wang, and J. Wub, Secure and Privacy Preserving Keyword Searching for cloud storage services, Journal of Network and Computer Applications Vol. 35, pages: 927–933, Elsevier, 2012. [6]. C. Orencik and E. Sava, Efficient and Secure Ranked Multi-Keyword Search on Encrypted Cloud Data, Proceedings in EDBT- ICDT, pages:186 -195, ACM: New York, 2012. [7]. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, Secure Ranked Keyword Search Over Encrypted Cloud Data. In ICDCS'10, pages 253- 262, 2010. [8]. W. Zhou, L.Liu, H.Jing, C.Zhang, S.Yao, S.Wang, K- Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing, Journal of Software Engineering & Applications, Vol. 6, pages: 29-32, 2013. [9]. Mark D. Ryan, Cloud computing security: The scientific challenge, and a survey of solutions, Journal of Systems and Software Vol. 86, pages: 2263– 2268, Elsevier,2013. [10]. http://en.wikipedia.org/wiki/Paillier_cryptosystem. [11]. N. Islam, W. Puech, K. Hayat, R. Brouzet, Application of Homomorphism to Secure Image Sharing, Optics Communication Vol. 284, pages:4412-4429, Elsevier, 2011. BIOGRAPHIE: Received B.E degree in Computer Science and Engineering from Anna University of Technology, Tiruchirappalli, in 2012 She is Pursuing M.E degree in Computer Science and Engineering in R.M.K. Engineering College, Chennai. Her Research areas are focused on Cloud Computing and Network Security.