SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 724
Data Search In Cloud Using The Encrypted Keywords
Pranit R.Thite1, Ganesh M.Suryawanshi2, Rajesh Mengale3,Prof. A.M.Ingole4
1,2,3 Student, Dept. Of Computer Engineering, BVCOEL Pune, Maharashtra, India
4Professor, Dept. Of Computer Engineering, BVCOEL Pune, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract –InformationrecoveryonencryptedDataincloud
Facilitates data privacy with sensing concept of data storedin
cloud. Existing encrypted search method support only
monogram or bigram keyword search . Expressive keyword
search process is computationally ineffective due to bilinear
pairing process. Projected research executeskilledsearchover
encrypted data with Boolean expressionsupport . Algorithmic
process implements pattern matching. Information retrieval
from this process help the user to search in cloud without
decrypting data.
Key Words: Searchable Encryption, Cloud Computing,
Expressiveness, Attribute-based Encryption
1. INTRODUCTION
Firstly cloud is defined as the combination of grid
computing and cluster computing. And it is a important
aspect today as more data is stored on cloud which also is
needed to be secured.
And so by using different Encryption Algorithms data is
secured and so there are many problems incloudcomputing
regarding security issues and many more which should be
solved accordingly.
Searching any data in the cloud and providing security to
the cloud is difficult as the data in cloud is in encrypted form
and there is a huge data in cloud which is needed to be
decrypted to get it in the readable pattern. But this problem
can be solved if there is such an algorithm by which the
keyword that will be entered for searching any data will be
in the encrypted form and we get the results for entered
keywords, which will be the actual documents that are
needed.
So such a system can be implemented which takes less time
to search any keyword related to the data that is needed
which is in the encrypted form stored on cloud.
2.SYSTEMATIC LITERATURE SURVEY
2.1 “Efficient Similarity Search over Encrypted
Data” , Mehmet Kuzu, Mohammad Saiful Islam,
Murat Kantarcioglu ,ACM publications, 2012
“ Ginix: Generalized Inverted Index for Keyword
Search “,Hao Wu , Guoliang Li, and LizhuZhou,IEEE
Transcation, Volume 18, Number 1, February2013
Cloud computing, a new terminology used to access data
remotely from the centralized pool that can be rapidly
deployed with great scalability and less computation
overhead. Cloud computing comes with lots of advantages
such as self-service on need, easy network access, accessing
data independent of location, , rapid resource elasticity, low
pricing, transference of risk, etc. . Thus wecansaythatcloud
computing is advantageous to its user for avoiding large
capital outlays required for deployment and management of
software as well as hardware. Thus undoubtly cloud
computing comes like a revolution in thefieldofinformation
technology.
In this era of cloud computing, data owners get attracted to
the cloud as it saves there lot of time, space and money. As
the cloud computing starts gaining edge over another
techniques of storing data, user starts storing large amount
of information on cloud such as email ids, passwords,
multimedia documents,companies secretdata etc.bystoring
such information on cloud data owners get relief from the
storing of their confidential data as cloud gives on demand
access to the required things.
But the fact is that the data owners and cloud providers are
may not aware of each other regarding trust. SO possibility
of hacking or leaking this confidential information is raises.
This problem can be easily overcome by the data cloud
providers, they allow the users to keep their information in
encrypted format so that it is highly secure and chances of
getting leaked is get minimized.
Cloud computing offers great data utilization of encrypted
data but searching over encrypted data is very challenging
task as there are huge numbers of outsource files are
presents. However data owners might want selected files
related with entered query. So keyword searching over
encrypted data emerged as good technique to find the
required data from the cloud.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 725
2.2 “K-Gram Based Fuzzy Keyword Search over
Encrypted Cloud Computing ” Cong Wang1, Qian
Wang1, Kui Ren1, and Wenjing Lou2
Presents a real approach having fuzzy logic as basetosearch
data over ciphered cloud data. Here author said that it is the
very first approach for the same. Heresystem returnsthe file
in which exact match of predefined word is get found.
System also returns the file if it have close words from the
entered query. To accomplish thetask authoreditdistanceis
used, it helps in finding the similar words based on their
semantics. At last authors comes on conclusion that it is the
best system which uses fuzzy logic , edit distancetosolvethe
given problem. wildcard-based technique which is a
advanced methods is used by the authors to use fuzzy logic
more efficiently.
2.3 “ Above the clouds : A Berkley view of cloud
computing”
Proposed a new technique known as Secured Multikeyword
search (SMS) for searching the input query over ciphered
data in cloud. To search files containing documents qn
efficient rule of coordinate matching is used. Coordinate
matching refers to a technique of findingthehughnumberof
matches as many as possible so that it will become easy to
find similarity between the input query and the list of
records. To improve further accuracy they developed an
alert system, this system will gives an alert whenever an
unauthorized users are trying to access the system. This
alert isgiven by the emails and messagestotherelatedusers.
2.4 “Fuzzy Keyword Search over Encrypted Data in
Cloud Computing” Jin Li , Qian Wang , CongWang†,
Ning Cao, Kui Ren , and Wenjing Lou
Elaborates theconceptofsemantic relationship(SRL)library
to find the search the files. Publishers state that they tested
the project with both public and private cloud. To getting
things done a two setp process is used. In the first lap, SRL is
developed using the entered data in private cloud. The
output of first step is given as input to the second step. SRL
is used to retrieve the index on public cloud. In final step all
the records containing matching words are raised.
2.5 “Secured Multiple-keyword Search over
Encrypted Cloud Data.” Prof. C. R. Barde1 , Pooja
Katkade2 , Deepali Shewale3 , Rohit Khatale4 .
www.ijetae.com (ISSN 2250-2459, ISO 9001:2008
Certified Journal, Volume 4, Issue2,February 2014
Takes personal health records system (PHR) as a base for
the case studies as it is the area which affected greatlydue to
the less security in cloud system. Here authors develop a
framework known as Authorized Private Keyword Search
(APKS) which is highly scalable for searching over cloud
data. Further they make use of Hierarchical Predicate
Encryption (HPE) to solve the problem of searching. Author
declares that it is privacy search because it hides the
keywords from the server which results in more and more
security.
2.6 “Privacy- Preserving Keyword-based Semantic
Search over Encrypted Cloud Data” Xingming Sun,
Yanling Zhu, Zhihua Xia and Lihong Chen
International Journal of Security and Its
Applications Vol.8, No.3 (2014),
Makes use of vector space model to retrieve the documents
from the cloud. An author states that it is one of the best
models for accomplishing the problem definition. For the
given keyword a relevant score is find out by the system for
each document and from that relevance score files are
tanked. And at last those files are raised that have higher
rank over another files.
2.7 “Authorized Private Keyword Search over
Encrypted Data in Cloud Computing” Ming Li∗ ,
Shucheng Yu†, Ning Cao∗ and Wenjing Lou*
Proposed a new technique of searching which makes use of
K gram technique for producing fuzzy logic results. Authors
said that previous technique is good for searching when
exact match of keyword is found. But if there are some
spelling errors or some nearby words are entered then
system will fails to give answers. Proposed system
developed to overcome the said problem. It makes use of K
gram based fuzzy logic to accomplish the task. For more
security developers makes use of separateserverswhich are
not related with each other’s at all.
3. SYSTEM OVERVIEW
The System Overview is shown in Fig -1, which is composed
of four entities: a trusted trapdoor generation centre who
publishes the system parameter and holds a master private
key and is responsible for trapdoor generation for the
system, data owners who outsource encrypted data to a
public cloud, data users who are privileged to search and
access encrypted data, and a designated cloud server who
executes the keyword search operations for data users. To
enable the cloud server to search over ciphertexts, the data
owners append every encrypted document with encrypted
keywords.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 726
Fig -1: System Overview
A data user issues a trapdoor request by sending a keyword
access structure to the trapdoor generation centre which
generates and returnsatrapdoorcorrespondingtotheaccess
structure. Weassumethatthetrapdoorgenerationcentrehas
a separateauthentication mechanismtoverifyeachdatauser
and then issue them the corresponding trapdoors. After
obtaining a trapdoor, the data user sends the trapdoor and
the corresponding partial hidden access structure (i.e., the
access structure without keyword values) to the designated
cloud server. The latter performs the testing operations
between each ciphertext and the trapdoor using its private
key, and forwards the matching ciphertexts to the data user.
As mentioned earlier, a ciphertext created by a data owner
consists of two parts: the encrypted document generated
using an encryption scheme and the encrypted keywords
generated using our SE scheme. From now on, we only
consider the latter part of the encrypted document, and
ignore the first part since it is out of the scopeofthispaper.In
summary, the design goals of our expressive SE scheme are
fourfold.
3.1 Expressiveness
The proposed scheme should support keyword access
structures expressed in any Boolean formula with AND and
OR gates.
3.2 Efficiency
The proposed schemeshouldbeadequatelyefficientinterms
of computation, communication and storage for practical
applications.
3.3 Keyword privacy
First, a ciphertext without its corresponding trapdoors
should not disclose any information about the keyword
values it contains to the cloud server and outsiders.Second,a
trapdoor should not leak information on keyword values to
any outside attackers without the private key of the
designated cloud server. We capture this notion of security
forthe SE schemein terms ofsemanticsecuritytoensurethat
encrypted data does not reveal any information about the
keyword values, which wecall “selective indistinguishability
against chosen keyword-set attack (selective IND-CKA
security)”
3.4 Provable security
The security of the proposed scheme should be formally
proved under the standard model rather than the informal
analysis.
4. ADVANTAGES
4.1 Use of Trapdoor
4.2 No Redundant Decryption
4.3 Secured
4.4 Time Saving
4.5 Expressive Boolean predicate support for search.
4.6 Hidden Data Identification with pattern matching
5. CONCLUSIONS
Proposed system should be implemented to overcome the
drawbacks which were introduced in the previous system
while searching data in cloud .The system can assist user to
perform expressive Boolean search finding hidden
underived search pattern from cloud Algorithmic approach
is scalable pattern using the encrypted pattern search.
ACKNOWLEDGEMENT
This paper is been completed under the guidance of
Mrs.Aniket Kadam Sir who have explained us the need for
implementation of this system, like how it will be processed
and what mechanism should be actually used. We have also
referred many papers and Wikipedia for the completion of
this paper.
The work wouldn’t get completed if we would not get
precious help of Prof. A.M.Ingole sir BVCOE Lavale, Pune
who supported us at every stage during the completion.
REFERENCES
[1] O. Goldreich and R. Ostrovsky, “Software protectionand
simulation on oblivious rams,” J. ACM, vol. 43, no. 3, pp.
431–473, 1996.
[2] D. X. Song, D. Wagner, and A. Perrig, “Practical
techniques for searches on encrypted data,” in 2000
IEEE Symposium on Security and Privacy, Berkeley,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 727
California, USA, May 14-17, 2000. IEEE Computer
Society, 2000, pp. 44–55.
[3] E. Goh, “Secure indexes,” IACR Cryptology ePrint
Archive, vol. 2003, p. 216, 2003. [4] C. Cachin, S. Micali,
and M. Stadler, “Computationally private information
retrieval with polylogarithmic communication,” in
Advances in Cryptology - EUROCRYPT’99,International
Conference on the Theory and Application of
Cryptographic Techniques, Prague,CzechRepublic,May
2-6, 1999, Proceeding, ser. Lecture Notes in Computer
Science, vol. 1592. Springer, 1999, pp. 402–414.
[4] G. D. Crescenzo, T. Malkin, and R. Ostrovsky, “Single
database private information retrieval impliesoblivious
transfer,” inAdvancesinCryptology -EUROCRYPT2000,
International Conference on the= Theory and
Application of Cryptographic Techniques, Bruges,
Belgium, May 14-18, 2000, Proceeding, ser. Lecture
Notes in Computer Science, vol. 1807. Springer, 2000,
pp. 122–138.
[5] W. Ogata and K. Kurosawa, “Oblivious keyword search,”
J. Complexity, vol. 20, no. 2-3, pp. 356–371, 2004.
[6] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano,
“Public key encryption with keyword search,” in
Advances in Cryptology - EUROCRYPT 2004,
International Conference on the Theory and
Applications of Cryptographic Techniques, Interlaken,
Switzerland, May 2-6, 2004, Proceedings, ser. Lecture
Notes in Computer Science, vol. 3027. Springer, 2004,
pp. 506–522.
[7] B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy-
preserving multikeyword fuzzy search over encrypted
data in the cloud,” in IEEE Y.. Springer-Verlag, 2007, pp.
2–2
[8] P. Golle, J. Staddon, and B. Waters, “Secure conjunctive
keyword search over encrypted data,” in Applied
Cryptography and Network Security.Springer,2004,pp.
31–45.
[9] L. Ballard, S. Kamara, and F. Monrose, “Achieving
efficient conjunctive keyword searches over encrypted
data,” in Proceedings of the 7thinternational conference
on Information and CommunicationsSecurity.Springer-
Verlag, 2005, pp. 414–426.
[10] D. Boneh and B. Waters, “Conjunctive, subset, and range
queries on encrypted data,” in Proceedings of the 4th
conference on Theory of cryptography.Springer-Verlag,
2007, pp. 535–554

More Related Content

What's hot

Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeIRJET Journal
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Pvrtechnologies Nellore
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...ijtsrd
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPAM Publications
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...1crore projects
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...redpel dot com
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...Editor IJCATR
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
 
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keywordEnabling secure and efficient ranked keyword
Enabling secure and efficient ranked keywordIMPULSE_TECHNOLOGY
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET Journal
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
 

What's hot (20)

Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
Final 1st
Final 1stFinal 1st
Final 1st
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
 
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keywordEnabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption System
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 

Similar to Data Search in Cloud using the Encrypted Keywords

Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataIRJET Journal
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
 
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET-  	  Privacy Preserving Keyword Search over Cloud DataIRJET-  	  Privacy Preserving Keyword Search over Cloud Data
IRJET- Privacy Preserving Keyword Search over Cloud DataIRJET Journal
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...ASAITHAMBIRAJAA
 
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET Journal
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...IJCI JOURNAL
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425IJRAT
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodIRJET Journal
 
IRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET Journal
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingIJERA Editor
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
Secure Syntactic key Ranked Search over Encrypted Cloud in DataSecure Syntactic key Ranked Search over Encrypted Cloud in Data
Secure Syntactic key Ranked Search over Encrypted Cloud in DataIJERA Editor
 

Similar to Data Search in Cloud using the Encrypted Keywords (20)

Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
 
J017547478
J017547478J017547478
J017547478
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET-  	  Privacy Preserving Keyword Search over Cloud DataIRJET-  	  Privacy Preserving Keyword Search over Cloud Data
IRJET- Privacy Preserving Keyword Search over Cloud Data
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
 
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic SchemeIRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search MethodA Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
 
IRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud Data
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
Secure Syntactic key Ranked Search over Encrypted Cloud in DataSecure Syntactic key Ranked Search over Encrypted Cloud in Data
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Data Search in Cloud using the Encrypted Keywords

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 724 Data Search In Cloud Using The Encrypted Keywords Pranit R.Thite1, Ganesh M.Suryawanshi2, Rajesh Mengale3,Prof. A.M.Ingole4 1,2,3 Student, Dept. Of Computer Engineering, BVCOEL Pune, Maharashtra, India 4Professor, Dept. Of Computer Engineering, BVCOEL Pune, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract –InformationrecoveryonencryptedDataincloud Facilitates data privacy with sensing concept of data storedin cloud. Existing encrypted search method support only monogram or bigram keyword search . Expressive keyword search process is computationally ineffective due to bilinear pairing process. Projected research executeskilledsearchover encrypted data with Boolean expressionsupport . Algorithmic process implements pattern matching. Information retrieval from this process help the user to search in cloud without decrypting data. Key Words: Searchable Encryption, Cloud Computing, Expressiveness, Attribute-based Encryption 1. INTRODUCTION Firstly cloud is defined as the combination of grid computing and cluster computing. And it is a important aspect today as more data is stored on cloud which also is needed to be secured. And so by using different Encryption Algorithms data is secured and so there are many problems incloudcomputing regarding security issues and many more which should be solved accordingly. Searching any data in the cloud and providing security to the cloud is difficult as the data in cloud is in encrypted form and there is a huge data in cloud which is needed to be decrypted to get it in the readable pattern. But this problem can be solved if there is such an algorithm by which the keyword that will be entered for searching any data will be in the encrypted form and we get the results for entered keywords, which will be the actual documents that are needed. So such a system can be implemented which takes less time to search any keyword related to the data that is needed which is in the encrypted form stored on cloud. 2.SYSTEMATIC LITERATURE SURVEY 2.1 “Efficient Similarity Search over Encrypted Data” , Mehmet Kuzu, Mohammad Saiful Islam, Murat Kantarcioglu ,ACM publications, 2012 “ Ginix: Generalized Inverted Index for Keyword Search “,Hao Wu , Guoliang Li, and LizhuZhou,IEEE Transcation, Volume 18, Number 1, February2013 Cloud computing, a new terminology used to access data remotely from the centralized pool that can be rapidly deployed with great scalability and less computation overhead. Cloud computing comes with lots of advantages such as self-service on need, easy network access, accessing data independent of location, , rapid resource elasticity, low pricing, transference of risk, etc. . Thus wecansaythatcloud computing is advantageous to its user for avoiding large capital outlays required for deployment and management of software as well as hardware. Thus undoubtly cloud computing comes like a revolution in thefieldofinformation technology. In this era of cloud computing, data owners get attracted to the cloud as it saves there lot of time, space and money. As the cloud computing starts gaining edge over another techniques of storing data, user starts storing large amount of information on cloud such as email ids, passwords, multimedia documents,companies secretdata etc.bystoring such information on cloud data owners get relief from the storing of their confidential data as cloud gives on demand access to the required things. But the fact is that the data owners and cloud providers are may not aware of each other regarding trust. SO possibility of hacking or leaking this confidential information is raises. This problem can be easily overcome by the data cloud providers, they allow the users to keep their information in encrypted format so that it is highly secure and chances of getting leaked is get minimized. Cloud computing offers great data utilization of encrypted data but searching over encrypted data is very challenging task as there are huge numbers of outsource files are presents. However data owners might want selected files related with entered query. So keyword searching over encrypted data emerged as good technique to find the required data from the cloud.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 725 2.2 “K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing ” Cong Wang1, Qian Wang1, Kui Ren1, and Wenjing Lou2 Presents a real approach having fuzzy logic as basetosearch data over ciphered cloud data. Here author said that it is the very first approach for the same. Heresystem returnsthe file in which exact match of predefined word is get found. System also returns the file if it have close words from the entered query. To accomplish thetask authoreditdistanceis used, it helps in finding the similar words based on their semantics. At last authors comes on conclusion that it is the best system which uses fuzzy logic , edit distancetosolvethe given problem. wildcard-based technique which is a advanced methods is used by the authors to use fuzzy logic more efficiently. 2.3 “ Above the clouds : A Berkley view of cloud computing” Proposed a new technique known as Secured Multikeyword search (SMS) for searching the input query over ciphered data in cloud. To search files containing documents qn efficient rule of coordinate matching is used. Coordinate matching refers to a technique of findingthehughnumberof matches as many as possible so that it will become easy to find similarity between the input query and the list of records. To improve further accuracy they developed an alert system, this system will gives an alert whenever an unauthorized users are trying to access the system. This alert isgiven by the emails and messagestotherelatedusers. 2.4 “Fuzzy Keyword Search over Encrypted Data in Cloud Computing” Jin Li , Qian Wang , CongWang†, Ning Cao, Kui Ren , and Wenjing Lou Elaborates theconceptofsemantic relationship(SRL)library to find the search the files. Publishers state that they tested the project with both public and private cloud. To getting things done a two setp process is used. In the first lap, SRL is developed using the entered data in private cloud. The output of first step is given as input to the second step. SRL is used to retrieve the index on public cloud. In final step all the records containing matching words are raised. 2.5 “Secured Multiple-keyword Search over Encrypted Cloud Data.” Prof. C. R. Barde1 , Pooja Katkade2 , Deepali Shewale3 , Rohit Khatale4 . www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue2,February 2014 Takes personal health records system (PHR) as a base for the case studies as it is the area which affected greatlydue to the less security in cloud system. Here authors develop a framework known as Authorized Private Keyword Search (APKS) which is highly scalable for searching over cloud data. Further they make use of Hierarchical Predicate Encryption (HPE) to solve the problem of searching. Author declares that it is privacy search because it hides the keywords from the server which results in more and more security. 2.6 “Privacy- Preserving Keyword-based Semantic Search over Encrypted Cloud Data” Xingming Sun, Yanling Zhu, Zhihua Xia and Lihong Chen International Journal of Security and Its Applications Vol.8, No.3 (2014), Makes use of vector space model to retrieve the documents from the cloud. An author states that it is one of the best models for accomplishing the problem definition. For the given keyword a relevant score is find out by the system for each document and from that relevance score files are tanked. And at last those files are raised that have higher rank over another files. 2.7 “Authorized Private Keyword Search over Encrypted Data in Cloud Computing” Ming Li∗ , Shucheng Yu†, Ning Cao∗ and Wenjing Lou* Proposed a new technique of searching which makes use of K gram technique for producing fuzzy logic results. Authors said that previous technique is good for searching when exact match of keyword is found. But if there are some spelling errors or some nearby words are entered then system will fails to give answers. Proposed system developed to overcome the said problem. It makes use of K gram based fuzzy logic to accomplish the task. For more security developers makes use of separateserverswhich are not related with each other’s at all. 3. SYSTEM OVERVIEW The System Overview is shown in Fig -1, which is composed of four entities: a trusted trapdoor generation centre who publishes the system parameter and holds a master private key and is responsible for trapdoor generation for the system, data owners who outsource encrypted data to a public cloud, data users who are privileged to search and access encrypted data, and a designated cloud server who executes the keyword search operations for data users. To enable the cloud server to search over ciphertexts, the data owners append every encrypted document with encrypted keywords.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 726 Fig -1: System Overview A data user issues a trapdoor request by sending a keyword access structure to the trapdoor generation centre which generates and returnsatrapdoorcorrespondingtotheaccess structure. Weassumethatthetrapdoorgenerationcentrehas a separateauthentication mechanismtoverifyeachdatauser and then issue them the corresponding trapdoors. After obtaining a trapdoor, the data user sends the trapdoor and the corresponding partial hidden access structure (i.e., the access structure without keyword values) to the designated cloud server. The latter performs the testing operations between each ciphertext and the trapdoor using its private key, and forwards the matching ciphertexts to the data user. As mentioned earlier, a ciphertext created by a data owner consists of two parts: the encrypted document generated using an encryption scheme and the encrypted keywords generated using our SE scheme. From now on, we only consider the latter part of the encrypted document, and ignore the first part since it is out of the scopeofthispaper.In summary, the design goals of our expressive SE scheme are fourfold. 3.1 Expressiveness The proposed scheme should support keyword access structures expressed in any Boolean formula with AND and OR gates. 3.2 Efficiency The proposed schemeshouldbeadequatelyefficientinterms of computation, communication and storage for practical applications. 3.3 Keyword privacy First, a ciphertext without its corresponding trapdoors should not disclose any information about the keyword values it contains to the cloud server and outsiders.Second,a trapdoor should not leak information on keyword values to any outside attackers without the private key of the designated cloud server. We capture this notion of security forthe SE schemein terms ofsemanticsecuritytoensurethat encrypted data does not reveal any information about the keyword values, which wecall “selective indistinguishability against chosen keyword-set attack (selective IND-CKA security)” 3.4 Provable security The security of the proposed scheme should be formally proved under the standard model rather than the informal analysis. 4. ADVANTAGES 4.1 Use of Trapdoor 4.2 No Redundant Decryption 4.3 Secured 4.4 Time Saving 4.5 Expressive Boolean predicate support for search. 4.6 Hidden Data Identification with pattern matching 5. CONCLUSIONS Proposed system should be implemented to overcome the drawbacks which were introduced in the previous system while searching data in cloud .The system can assist user to perform expressive Boolean search finding hidden underived search pattern from cloud Algorithmic approach is scalable pattern using the encrypted pattern search. ACKNOWLEDGEMENT This paper is been completed under the guidance of Mrs.Aniket Kadam Sir who have explained us the need for implementation of this system, like how it will be processed and what mechanism should be actually used. We have also referred many papers and Wikipedia for the completion of this paper. The work wouldn’t get completed if we would not get precious help of Prof. A.M.Ingole sir BVCOE Lavale, Pune who supported us at every stage during the completion. REFERENCES [1] O. Goldreich and R. Ostrovsky, “Software protectionand simulation on oblivious rams,” J. ACM, vol. 43, no. 3, pp. 431–473, 1996. [2] D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in 2000 IEEE Symposium on Security and Privacy, Berkeley,
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 727 California, USA, May 14-17, 2000. IEEE Computer Society, 2000, pp. 44–55. [3] E. Goh, “Secure indexes,” IACR Cryptology ePrint Archive, vol. 2003, p. 216, 2003. [4] C. Cachin, S. Micali, and M. Stadler, “Computationally private information retrieval with polylogarithmic communication,” in Advances in Cryptology - EUROCRYPT’99,International Conference on the Theory and Application of Cryptographic Techniques, Prague,CzechRepublic,May 2-6, 1999, Proceeding, ser. Lecture Notes in Computer Science, vol. 1592. Springer, 1999, pp. 402–414. [4] G. D. Crescenzo, T. Malkin, and R. Ostrovsky, “Single database private information retrieval impliesoblivious transfer,” inAdvancesinCryptology -EUROCRYPT2000, International Conference on the= Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, ser. Lecture Notes in Computer Science, vol. 1807. Springer, 2000, pp. 122–138. [5] W. Ogata and K. Kurosawa, “Oblivious keyword search,” J. Complexity, vol. 20, no. 2-3, pp. 356–371, 2004. [6] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, ser. Lecture Notes in Computer Science, vol. 3027. Springer, 2004, pp. 506–522. [7] B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy- preserving multikeyword fuzzy search over encrypted data in the cloud,” in IEEE Y.. Springer-Verlag, 2007, pp. 2–2 [8] P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over encrypted data,” in Applied Cryptography and Network Security.Springer,2004,pp. 31–45. [9] L. Ballard, S. Kamara, and F. Monrose, “Achieving efficient conjunctive keyword searches over encrypted data,” in Proceedings of the 7thinternational conference on Information and CommunicationsSecurity.Springer- Verlag, 2005, pp. 414–426. [10] D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,” in Proceedings of the 4th conference on Theory of cryptography.Springer-Verlag, 2007, pp. 535–554