SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
ยฉ 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 321
Compound Keyword Search of Encrypted Cloud Data by using
Semantic Scheme
Harsh Gupta1, Kartik Ahirrao2, Noopur Sonaje3, S.N. More4
1,2,3Dept. of Computer Engineering, LOGMIEER College, Maharashtra, INDIA
4Professor S.N. More, Dept. of Computer Engineering, LOGMIEER College, Maharashtra, INDIA
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Keyword search over encrypted data is crucial for
accessing the outsourced sensitive data in cloudcomputing. In
some situations, the keywords which the user searches on are
only semantically related to the data rather than via an exact
or fuzzy match. Therefore, semantic-based keyword search
over encrypted cloud data becomes of foremost importance.
However, existing schemes usually depend upon a global
dictionary, which not only affects the accuracy of search
results but also causes in abilityindataupdating. Additionally,
although compound keyword search is frequent in practice,
the existing approaches only process them as single words,
which split the original semantics and achieve low accuracy.
To address these limitations, we initially posit a compound
concept semantic similarity (CCSS) calculation method to
compute and measure the semantic similarity between
compound concepts. Next, by combining CCSS with Locality-
Sensitive Hashing function and the secure k-NearestNeighbor
scheme, a semantic-based compound keyword search (SCKS)
scheme is proposed. SCKS achieves not only semantic-based
search but also multi-keyword search and ranked keyword
search all together. Additionally, SCKS also eliminates the
predefined global library. It can also efficiently support data
update. The experimental results on real-world dataset
indicate that SCKS introduces low overhead on computation
and the search accuracy outperforms the existing schemes.
Key Words: Searchable encryption, Semantic-based
keyword search.
1. INTRODUCTION:
In cloud computing, an exceeding number of personal or
enterprise users outsource their data to cloud storage to
enjoy the benefits of โ€pay-on-demandโ€ services and high
computation execution. To preserveprivacy,userschooseto
encrypt the data before outsourcing. Thus, the traditional
keyword search cannot be directly executed on the
encrypted data, which restrains the utilization of data.
Semantic-based keyword search not only is convenient for
users but also exactly expresses usersโ€™ intentions.
Specifically, in some circumstances, users might not be
familiar with the encrypted documents stored in cloud
storage or might only want the semantically related results;
therefore, the search keywords are usually semantically
interconnected to the document rather than through an
exact or even a fuzzy match. For example, the predefined
keyword of a document is โ€œcloud-based storageโ€, and the
keyword that a user searches is โ€œdistributed storageโ€.
Obviously, these two considered words are neither an exact
nor a fuzzy match, but they are semantically related. Hence,
the semantic-based keyword search is of practical
importance and has attracted much attention. However, the
existing approaches must rely on a predefined global
dictionary whose quality greatly influences the accuracy of
the search result. Moreover, when the dataset is being
outsourced to the cloud, update operations that include
inserting new documents and modifying and deleting
existing documents are frequent. Because the predefined
dictionary is constructed based on all documents in the
dataset, the update of a single document can cause the
reconstruction of the dictionary and even all document
indexes, which is inefficient. The semantic similarity
between keywords in a query and keywordsofdocumentsis
important because it also determinesthe exactnessofsearch
results. However, in the aforementioned approaches, the
semantic information used for measuring the semantic
sameness was mined from some knowledge bases (KBs)
(such as corpus and thesaurus) containing noisedata,which
cause the semantic similarity to be inaccurate. Compared
with other KBs, ontology has good support for logic
reasoning and can structurally express the semantic
information of concepts. Several ontology-basedviewpoints
have been proposed to assess the similarity between
concepts through mining ontology information from
different aspects. Each document generally consists of more
than one keyword, the index of a document is associated
with multiple keyword vectors. Locality-Sensitive Hashing
(LSH) function is able to hash similar items to the similar
bucket with elevated probability. Hence, we construct the
document index by using LSH to map multiple keyword
vectors into only one vector. The frequency of the keyword
in the document is also considered and is positionedintothe
index vector as the value of corresponding element. A
semantic-based keyword search scheme returns results
according to the semantic Interconnectedness between
documents and a query.
2. History and Background:
Owners prefer to outsource documentsinan encryptedform
for the purpose of privacy preserving. Therefore, it is crucial
to develop structured and reliable cipher text search
techniques.
One challenge is thattheconnectionbetweendocuments will
be normally secreted in the processofencryption,which will
ultimately lead to significant search accuracy performance
degradation. Also the quantity of data in data centers has
encountered a dramatic growth. This will make iteven more
challenging to design cipher text search schemes that can
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
ยฉ 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 322
provide efficient and reliable online informationretrieval on
large volume of encrypted data. A conventional way to
reduce information leakage is data encryption.
However, this will also make server-side data utilization,
such as discerning on encrypted data, become a very
demanding task. In the recent years, manyciphertextsearch
schemes have been proposed by researchers by
incorporating the cryptography techniques. These schemas
have been proven with provable security, but their methods
need massive operations. They also have high time
complexity.
Therefore, the traditional methodsarenotacceptableforthe
big data scenario where data quantity is very big and
applications require online data processing. Sanctioning
keyword search directly over encrypted data is a desirable
technique for effective utilization of encrypted data
outsourced to the cloud. Existing solutions provide multi
keyword exact search that does not indulge keyword
spelling error, or single keyword fuzzy search that indulges
typos to a certain extent [1].
The current fuzzy search schemes are dependent upon
building an expanded index that covers possible keyword
misspelling, which lead to significantly larger index file size
and higher search complexity. In cloud computing, scalable
and elastic storage and computation resources are
provisioned as measured services through the Internet.
Outsourcing data services to the cloud allows organizations
to enjoy not only monetary savings, but also simplified local
IT management since cloud infrastructures are physically
hosted and maintained by the cloud providers [2].
To minimize the risk of data leakage to the cloud service
providers, data owners prefertoencrypttheirsensitivedata,
e.g., user records, financial transactions, before outsourcing
to the cloud, while holding on to the decryption keys to
themselves and otherauthorizedusers.Thisinturnsupports
data utilization a challenging problem. Due to the alluring
features of cloud computing, huge amount of data havebeen
stored in the cloud.
Even though loud based services offer many upper hand
advantages, privacy and security of the sensitive data is of a
big concern. To reduce the concerns, it is desirable to
outsource sensitive data in encrypted form. Encrypted
storage protects the data against illegal access, but it
complicates some basic, yet important functionality such as
the search on the data.
However, all of them handle exact query matching rather
than similarity matching; a necessary requirement for real
world applications. Even though some sophisticated secure
multi-partycomputation basedcryptographic techniques are
available for comparability tests, they are computationally
intensive and do not scale for large data sources[3].
As the data produced by enterprises that need to be stored
and utilized are rapidly increasing at an increasingrate,data
owners are usually inspired to outsourcetheirlocal complex
data management systems into the cloud for its great
workability and economic savings. As sensitive cloud data
may have to be encrypted before outsourcing, which
obsoletes the traditional data utilization service based on
plaintext keyword search, how to enable privacy-assured
utilization mechanisms for outsourced cloud data is thus of
paramount importance.
Considering the huge number of on-demand data users and
vast amount of outsourced data files in cloud, the problemis
particularly demanding, as it is extremely difficult to meet
also the general and practical requirements of performance,
system usability. Aside from abolishing the local storage
management, storing data into the cloud serves no purpose
unless and until they can be easily searched and utilized.
Thus, exploring privacy-assured and effectivesearchservice
over encrypted cloud data is of paramount importance [4].
Data owners get inspired to outsource their complex data
management systems from local sites to the commercial
public cloud for great flexibility and economic savings. But
for protecting data privacy, sensitive data have to be
encrypted before outsourcing, which obsoletes traditional
data utilization based on plaintext keyword search. Thus,
enabling an encrypted cloud data search service is of
paramount importance.
Considering the huge amount of data users and documents
in the cloud, it is necessary to allow multiplekeywordsinthe
search request and return documents in the order of their
relevance to these keywords. Related works on searchable
encryption focus on single keyword search. It is also known
as Boolean keyword search, and it rarely sorts the search
results.
To meet the effective data retrieval need,thelargeamount of
documents demand the cloud server to perform result
relevance ranking, instead of returning undifferentiated
results. These ranked search system enables the data users
to find the most similar information quickly, rather than
burdensomely sorting through every match in the content
collection making our process exhaustive.
Ranked search can also elegantly eliminate the unnecessary
network traffic by sending back only the most relevant data,
which is highly desirable in the โ€œpay-as-you-useโ€ cloud
paradigm[5]. Cloud computing infrastructure is a promising
and a new technology and greatly accelerates the
development of large scale data storage, processing and
distribution.
However, security and privacy becomes a major issue when
data owners outsource their sensitive data onto the public
cloud servers that are not within their trustworthy
management domains. To avoid information this leakage,
private data has to be encrypted before uploadingitontothe
cloud servers, which makes it a big challenge to support
efficient keyword based queries and rank the matching
results on the encrypted data. A huge amount of current
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
ยฉ 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 323
works only consider a single keyword queries without
appropriate ranking schemes.
In the existing multi-keyword ranked search approach, the
keyword dictionary is static and cannot be expanded that
easily when the number of keywords also increases.Flexible
and economic strategy for data management and resource
sharing is provided by cloud computing infrastructures. It
can reduce the hardware and software costsandalsosystem
maintenance overheads.
It can also provide a convenient communication medium to
share the resources across data owners and data consumers.
For example Amazon Web Services [6].
3. System Architecture:
Fig 1: The model of keyword search
A document index is denoted by a vector generated with the
keywords of the document, and a secure index is the
encrypted index. A query is a vector generated with the
keywords of a search, and a trapdoor is a query which is
encrypted. In general, the document can be encrypted by
traditional encryption schemes such as AES.
๏‚ท Keygen : - Execution is done by the data owner or a
trusted authority (TA). Taking a securityparameter
d as input, it outputs a system symmetric key.
๏‚ท BuildIndex: - It is executed by the data owner.
Based on the symmetric key sk andthedocumentD,
the algorithm generates the secure index.
๏‚ท Trapdoor: - This is performed by the data owner.
With the keyword set Q that the user wants to
search, the algorithm generates the corresponding
trapdoor.
๏‚ท Search: - It is performed by the cloud server. Based
on the trapdoor and each secure index stored in the
server, the cloud server determines the correlation
coefficients between the query Q and each
document D and returns the ranked correlation
coefficients to the user.
The data owner publishes the encrypted documents.Healso
secures the indexes to the cloud server. To reduce the
computation burden, the data owner is allowedtooutsource
the generation of the trapdoor to TA by giving the private
key to it. In this case, whenever a user wants to search over
the encrypted documents, he/she submits the keywords to
TA which generates the correspondingtrapdoorand returns
it to the user. Then, the user sends the trapdoor to this cloud
server. Finally, the cloud server executes the search
algorithm with the trapdoor on all secure indexes and
returns the relevant documents to the user. TA is usually an
internal server. If there is no such trustable server in the
system, the trapdoor can be initiated by the data owner.
Also, some existing schemes assume that the authorization
between the data owner and users is carried out effectively.
1. Locality-Sensitive Hashing function: -The
Locality-sensitive hashing (LSH) function hashes
input items so that these common items map into
the similar โ€œbucketโ€ with high probability. It is able
to diminish the dimensionality of high-dimensional
data.
2. Secure k-Nearest Neighbor encryption: - It is the
fundamental queryoperationsinsomeapplications.
The goal of SkNN is to firmly spot the k-nearest
points in the encrypted database to a given
encrypted query, without allowing the data server
to obtain the content contained in the database or
the query.
3. Compound Concept Semantic Similarity
Calculation Method: - Depending upon their
semantic constituents, the compound concepts can
be divided into two types: Endocentric structure
and Exocentric structure.Theendocentricstructure
is true when one or more constituents of a
compound can play the central role and serve as a
definable subject heading.
4. Semantic Similarity Calculation:- To measurethe
semantic sameness of compound concepts, we put
forth a novel approach that considers the concept
constituent features and several other factors
influencing similarity.
5. Semantic Compound Keyword Based Search
Scheme: - The topic set in a field is used to
construct the semantic vector for each keyword.
More specifically, in the keyword vector, each
element correlates to a field topic, and its value is
the similarity between the topic and the keyword,
which is obtained usingCCSS.Becausethetopicsare
almost invariable, the dimensionality of the
keyword vector will not change with the adding or
deleting of the keywords or documents, which is
helpful in supporting data update.
6. Security Enhanced SCKS: - The nemesis is allowed
to submit queries adaptively, i.e. submitting the
next query after receiving the outcomes ofprevious
queries. Thus, the adversary can decide the next
query depending upon the previous outcomes.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
ยฉ 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 324
4. CONCLUSION:
To accurately extract the semantic informationofkeywords,
we first propose an ontology-based compound concept
semantic similaritycalculationmethod(CCSS), whichgreatly
improves the precision of sameness measurement between
compound concepts by comprehensively considering the
compound features and a variety of information sources in
ontology. Low overhead on computation and that thesearch
precision outperforms the current schemes.
REFERENCES:
[1]C. Chen, X. Zhu, P. Shen, J. Hu, S. Guo, Z. Tari, and A. Y.
Zomaya, โ€œAn efficient privacy- reserving ranked keyword
search method,โ€IEEE Transactions on Parallel and
Distributed Systems, vol. 27, no. 4,pp. 951โ€“963, 2016.
[2]B. Wang, S. Yu, W. Lou, and Y. T. Hou, โ€œPrivacy-preserving
multi-keyword fuzzy search over encrypted data in the
cloud,โ€ in IEEE International Conference on Computer
Communications, 2014, pp. 2112โ€“2120.
[3]M. Kuzu, M. S. Islam, and M. Kantarcioglu, โ€œEfficient
similarity search over encrypted data,โ€ in IEEE 28th
International Conference on Data Engineering (ICDE),2012,
pp. 1156โ€“1167.
[4]C. Wang, K. Ren, S. Yu, and K. M. R. Urs, โ€œAchieving usable
and privacy-assured similaritysearchoveroutsourcedcloud
data,โ€ in 2012 Proceedings of IEEEINFOCOM,2012,pp. 451โ€“
459.
[5]N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, โ€œPrivacy-
preserving multi-keyword ranked search over encrypted
cloud data,โ€ IEEE Transactions on Parallel and Distributed
Systems, vol. 25, no. 1, pp. 222โ€“233, 2014.
[6]R. Li, Z. Xu, W. Kang, K. C. Yow, and C. Z. Xu, โ€œEfficient
multikeyword ranked query over encrypted data in cloud
computing,โ€ Future Generation Computer Systems, vol. 30,
no. 1, pp. 179โ€“190,2014.

More Related Content

What's hot

Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Pvrtechnologies Nellore
ย 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
ย 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...LeMeniz Infotech
ย 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
ย 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...CloudTechnologies
ย 
Final 1st
Final 1stFinal 1st
Final 1stgokulprema
ย 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPapitha Velumani
ย 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedjpstudcorner
ย 
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Swathi Rampur
ย 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...Pvrtechnologies Nellore
ย 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDNexgen Technology
ย 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataIRJET Journal
ย 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataNexgen Technology
ย 
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingIJERA Editor
ย 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataIRJET Journal
ย 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...Editor IJCATR
ย 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
ย 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET Journal
ย 

What's hot (18)

Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
ย 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
ย 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
ย 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
ย 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
ย 
Final 1st
Final 1stFinal 1st
Final 1st
ย 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
ย 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
ย 
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
ย 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
ย 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
ย 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
ย 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
ย 
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
ย 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
ย 
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
ย 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
ย 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
ย 

Similar to IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme

iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...Iaetsd Iaetsd
ย 
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...hemanthbbc
ย 
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...ASAITHAMBIRAJAA
ย 
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...ASAITHAMBIRAJAA
ย 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET Journal
ย 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataCloudTechnologies
ย 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
ย 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEEMEMTECHSTUDENTPROJECTS
ย 
Cloud java titles adrit solutions
Cloud java titles adrit solutionsCloud java titles adrit solutions
Cloud java titles adrit solutionsAdrit Techno Solutions
ย 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search overIEEEFINALSEMSTUDENTPROJECTS
ย 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...ieeepondy
ย 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...finalsemprojects
ย 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeIRJET Journal
ย 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET Journal
ย 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPAM Publications
ย 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
ย 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
ย 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...IRJET Journal
ย 
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...iosrjce
ย 

Similar to IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme (20)

iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
ย 
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
ย 
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ย 
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ย 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
ย 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
ย 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
ย 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
ย 
Cloud java titles adrit solutions
Cloud java titles adrit solutionsCloud java titles adrit solutions
Cloud java titles adrit solutions
ย 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
ย 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
ย 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
ย 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
ย 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
ย 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
ย 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
ย 
552 556
552 556552 556
552 556
ย 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
ย 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
ย 
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
ย 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
ย 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
ย 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
ย 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
ย 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
ย 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
ย 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
ย 
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
ย 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
ย 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
ย 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
ย 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
ย 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
ย 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
ย 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
ย 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
ย 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
ย 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
ย 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
ย 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
ย 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
ย 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
ย 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
ย 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
ย 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
ย 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
ย 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
ย 
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
ย 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
ย 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
ย 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
ย 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
ย 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
ย 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
ย 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
ย 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
ย 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
ย 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
ย 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
ย 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
ย 

Recently uploaded

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7Call Girls in Nagpur High Profile Call Girls
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
ย 

Recently uploaded (20)

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ย 

IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 ยฉ 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 321 Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme Harsh Gupta1, Kartik Ahirrao2, Noopur Sonaje3, S.N. More4 1,2,3Dept. of Computer Engineering, LOGMIEER College, Maharashtra, INDIA 4Professor S.N. More, Dept. of Computer Engineering, LOGMIEER College, Maharashtra, INDIA ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Keyword search over encrypted data is crucial for accessing the outsourced sensitive data in cloudcomputing. In some situations, the keywords which the user searches on are only semantically related to the data rather than via an exact or fuzzy match. Therefore, semantic-based keyword search over encrypted cloud data becomes of foremost importance. However, existing schemes usually depend upon a global dictionary, which not only affects the accuracy of search results but also causes in abilityindataupdating. Additionally, although compound keyword search is frequent in practice, the existing approaches only process them as single words, which split the original semantics and achieve low accuracy. To address these limitations, we initially posit a compound concept semantic similarity (CCSS) calculation method to compute and measure the semantic similarity between compound concepts. Next, by combining CCSS with Locality- Sensitive Hashing function and the secure k-NearestNeighbor scheme, a semantic-based compound keyword search (SCKS) scheme is proposed. SCKS achieves not only semantic-based search but also multi-keyword search and ranked keyword search all together. Additionally, SCKS also eliminates the predefined global library. It can also efficiently support data update. The experimental results on real-world dataset indicate that SCKS introduces low overhead on computation and the search accuracy outperforms the existing schemes. Key Words: Searchable encryption, Semantic-based keyword search. 1. INTRODUCTION: In cloud computing, an exceeding number of personal or enterprise users outsource their data to cloud storage to enjoy the benefits of โ€pay-on-demandโ€ services and high computation execution. To preserveprivacy,userschooseto encrypt the data before outsourcing. Thus, the traditional keyword search cannot be directly executed on the encrypted data, which restrains the utilization of data. Semantic-based keyword search not only is convenient for users but also exactly expresses usersโ€™ intentions. Specifically, in some circumstances, users might not be familiar with the encrypted documents stored in cloud storage or might only want the semantically related results; therefore, the search keywords are usually semantically interconnected to the document rather than through an exact or even a fuzzy match. For example, the predefined keyword of a document is โ€œcloud-based storageโ€, and the keyword that a user searches is โ€œdistributed storageโ€. Obviously, these two considered words are neither an exact nor a fuzzy match, but they are semantically related. Hence, the semantic-based keyword search is of practical importance and has attracted much attention. However, the existing approaches must rely on a predefined global dictionary whose quality greatly influences the accuracy of the search result. Moreover, when the dataset is being outsourced to the cloud, update operations that include inserting new documents and modifying and deleting existing documents are frequent. Because the predefined dictionary is constructed based on all documents in the dataset, the update of a single document can cause the reconstruction of the dictionary and even all document indexes, which is inefficient. The semantic similarity between keywords in a query and keywordsofdocumentsis important because it also determinesthe exactnessofsearch results. However, in the aforementioned approaches, the semantic information used for measuring the semantic sameness was mined from some knowledge bases (KBs) (such as corpus and thesaurus) containing noisedata,which cause the semantic similarity to be inaccurate. Compared with other KBs, ontology has good support for logic reasoning and can structurally express the semantic information of concepts. Several ontology-basedviewpoints have been proposed to assess the similarity between concepts through mining ontology information from different aspects. Each document generally consists of more than one keyword, the index of a document is associated with multiple keyword vectors. Locality-Sensitive Hashing (LSH) function is able to hash similar items to the similar bucket with elevated probability. Hence, we construct the document index by using LSH to map multiple keyword vectors into only one vector. The frequency of the keyword in the document is also considered and is positionedintothe index vector as the value of corresponding element. A semantic-based keyword search scheme returns results according to the semantic Interconnectedness between documents and a query. 2. History and Background: Owners prefer to outsource documentsinan encryptedform for the purpose of privacy preserving. Therefore, it is crucial to develop structured and reliable cipher text search techniques. One challenge is thattheconnectionbetweendocuments will be normally secreted in the processofencryption,which will ultimately lead to significant search accuracy performance degradation. Also the quantity of data in data centers has encountered a dramatic growth. This will make iteven more challenging to design cipher text search schemes that can
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 ยฉ 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 322 provide efficient and reliable online informationretrieval on large volume of encrypted data. A conventional way to reduce information leakage is data encryption. However, this will also make server-side data utilization, such as discerning on encrypted data, become a very demanding task. In the recent years, manyciphertextsearch schemes have been proposed by researchers by incorporating the cryptography techniques. These schemas have been proven with provable security, but their methods need massive operations. They also have high time complexity. Therefore, the traditional methodsarenotacceptableforthe big data scenario where data quantity is very big and applications require online data processing. Sanctioning keyword search directly over encrypted data is a desirable technique for effective utilization of encrypted data outsourced to the cloud. Existing solutions provide multi keyword exact search that does not indulge keyword spelling error, or single keyword fuzzy search that indulges typos to a certain extent [1]. The current fuzzy search schemes are dependent upon building an expanded index that covers possible keyword misspelling, which lead to significantly larger index file size and higher search complexity. In cloud computing, scalable and elastic storage and computation resources are provisioned as measured services through the Internet. Outsourcing data services to the cloud allows organizations to enjoy not only monetary savings, but also simplified local IT management since cloud infrastructures are physically hosted and maintained by the cloud providers [2]. To minimize the risk of data leakage to the cloud service providers, data owners prefertoencrypttheirsensitivedata, e.g., user records, financial transactions, before outsourcing to the cloud, while holding on to the decryption keys to themselves and otherauthorizedusers.Thisinturnsupports data utilization a challenging problem. Due to the alluring features of cloud computing, huge amount of data havebeen stored in the cloud. Even though loud based services offer many upper hand advantages, privacy and security of the sensitive data is of a big concern. To reduce the concerns, it is desirable to outsource sensitive data in encrypted form. Encrypted storage protects the data against illegal access, but it complicates some basic, yet important functionality such as the search on the data. However, all of them handle exact query matching rather than similarity matching; a necessary requirement for real world applications. Even though some sophisticated secure multi-partycomputation basedcryptographic techniques are available for comparability tests, they are computationally intensive and do not scale for large data sources[3]. As the data produced by enterprises that need to be stored and utilized are rapidly increasing at an increasingrate,data owners are usually inspired to outsourcetheirlocal complex data management systems into the cloud for its great workability and economic savings. As sensitive cloud data may have to be encrypted before outsourcing, which obsoletes the traditional data utilization service based on plaintext keyword search, how to enable privacy-assured utilization mechanisms for outsourced cloud data is thus of paramount importance. Considering the huge number of on-demand data users and vast amount of outsourced data files in cloud, the problemis particularly demanding, as it is extremely difficult to meet also the general and practical requirements of performance, system usability. Aside from abolishing the local storage management, storing data into the cloud serves no purpose unless and until they can be easily searched and utilized. Thus, exploring privacy-assured and effectivesearchservice over encrypted cloud data is of paramount importance [4]. Data owners get inspired to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data have to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance. Considering the huge amount of data users and documents in the cloud, it is necessary to allow multiplekeywordsinthe search request and return documents in the order of their relevance to these keywords. Related works on searchable encryption focus on single keyword search. It is also known as Boolean keyword search, and it rarely sorts the search results. To meet the effective data retrieval need,thelargeamount of documents demand the cloud server to perform result relevance ranking, instead of returning undifferentiated results. These ranked search system enables the data users to find the most similar information quickly, rather than burdensomely sorting through every match in the content collection making our process exhaustive. Ranked search can also elegantly eliminate the unnecessary network traffic by sending back only the most relevant data, which is highly desirable in the โ€œpay-as-you-useโ€ cloud paradigm[5]. Cloud computing infrastructure is a promising and a new technology and greatly accelerates the development of large scale data storage, processing and distribution. However, security and privacy becomes a major issue when data owners outsource their sensitive data onto the public cloud servers that are not within their trustworthy management domains. To avoid information this leakage, private data has to be encrypted before uploadingitontothe cloud servers, which makes it a big challenge to support efficient keyword based queries and rank the matching results on the encrypted data. A huge amount of current
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 ยฉ 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 323 works only consider a single keyword queries without appropriate ranking schemes. In the existing multi-keyword ranked search approach, the keyword dictionary is static and cannot be expanded that easily when the number of keywords also increases.Flexible and economic strategy for data management and resource sharing is provided by cloud computing infrastructures. It can reduce the hardware and software costsandalsosystem maintenance overheads. It can also provide a convenient communication medium to share the resources across data owners and data consumers. For example Amazon Web Services [6]. 3. System Architecture: Fig 1: The model of keyword search A document index is denoted by a vector generated with the keywords of the document, and a secure index is the encrypted index. A query is a vector generated with the keywords of a search, and a trapdoor is a query which is encrypted. In general, the document can be encrypted by traditional encryption schemes such as AES. ๏‚ท Keygen : - Execution is done by the data owner or a trusted authority (TA). Taking a securityparameter d as input, it outputs a system symmetric key. ๏‚ท BuildIndex: - It is executed by the data owner. Based on the symmetric key sk andthedocumentD, the algorithm generates the secure index. ๏‚ท Trapdoor: - This is performed by the data owner. With the keyword set Q that the user wants to search, the algorithm generates the corresponding trapdoor. ๏‚ท Search: - It is performed by the cloud server. Based on the trapdoor and each secure index stored in the server, the cloud server determines the correlation coefficients between the query Q and each document D and returns the ranked correlation coefficients to the user. The data owner publishes the encrypted documents.Healso secures the indexes to the cloud server. To reduce the computation burden, the data owner is allowedtooutsource the generation of the trapdoor to TA by giving the private key to it. In this case, whenever a user wants to search over the encrypted documents, he/she submits the keywords to TA which generates the correspondingtrapdoorand returns it to the user. Then, the user sends the trapdoor to this cloud server. Finally, the cloud server executes the search algorithm with the trapdoor on all secure indexes and returns the relevant documents to the user. TA is usually an internal server. If there is no such trustable server in the system, the trapdoor can be initiated by the data owner. Also, some existing schemes assume that the authorization between the data owner and users is carried out effectively. 1. Locality-Sensitive Hashing function: -The Locality-sensitive hashing (LSH) function hashes input items so that these common items map into the similar โ€œbucketโ€ with high probability. It is able to diminish the dimensionality of high-dimensional data. 2. Secure k-Nearest Neighbor encryption: - It is the fundamental queryoperationsinsomeapplications. The goal of SkNN is to firmly spot the k-nearest points in the encrypted database to a given encrypted query, without allowing the data server to obtain the content contained in the database or the query. 3. Compound Concept Semantic Similarity Calculation Method: - Depending upon their semantic constituents, the compound concepts can be divided into two types: Endocentric structure and Exocentric structure.Theendocentricstructure is true when one or more constituents of a compound can play the central role and serve as a definable subject heading. 4. Semantic Similarity Calculation:- To measurethe semantic sameness of compound concepts, we put forth a novel approach that considers the concept constituent features and several other factors influencing similarity. 5. Semantic Compound Keyword Based Search Scheme: - The topic set in a field is used to construct the semantic vector for each keyword. More specifically, in the keyword vector, each element correlates to a field topic, and its value is the similarity between the topic and the keyword, which is obtained usingCCSS.Becausethetopicsare almost invariable, the dimensionality of the keyword vector will not change with the adding or deleting of the keywords or documents, which is helpful in supporting data update. 6. Security Enhanced SCKS: - The nemesis is allowed to submit queries adaptively, i.e. submitting the next query after receiving the outcomes ofprevious queries. Thus, the adversary can decide the next query depending upon the previous outcomes.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 ยฉ 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 324 4. CONCLUSION: To accurately extract the semantic informationofkeywords, we first propose an ontology-based compound concept semantic similaritycalculationmethod(CCSS), whichgreatly improves the precision of sameness measurement between compound concepts by comprehensively considering the compound features and a variety of information sources in ontology. Low overhead on computation and that thesearch precision outperforms the current schemes. REFERENCES: [1]C. Chen, X. Zhu, P. Shen, J. Hu, S. Guo, Z. Tari, and A. Y. Zomaya, โ€œAn efficient privacy- reserving ranked keyword search method,โ€IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 4,pp. 951โ€“963, 2016. [2]B. Wang, S. Yu, W. Lou, and Y. T. Hou, โ€œPrivacy-preserving multi-keyword fuzzy search over encrypted data in the cloud,โ€ in IEEE International Conference on Computer Communications, 2014, pp. 2112โ€“2120. [3]M. Kuzu, M. S. Islam, and M. Kantarcioglu, โ€œEfficient similarity search over encrypted data,โ€ in IEEE 28th International Conference on Data Engineering (ICDE),2012, pp. 1156โ€“1167. [4]C. Wang, K. Ren, S. Yu, and K. M. R. Urs, โ€œAchieving usable and privacy-assured similaritysearchoveroutsourcedcloud data,โ€ in 2012 Proceedings of IEEEINFOCOM,2012,pp. 451โ€“ 459. [5]N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, โ€œPrivacy- preserving multi-keyword ranked search over encrypted cloud data,โ€ IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 1, pp. 222โ€“233, 2014. [6]R. Li, Z. Xu, W. Kang, K. C. Yow, and C. Z. Xu, โ€œEfficient multikeyword ranked query over encrypted data in cloud computing,โ€ Future Generation Computer Systems, vol. 30, no. 1, pp. 179โ€“190,2014.