SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6995
ACCOMPLISHING SECURE, WIDESPREAD, AND FINE-GRAINED
QUESTION RESULTS CHECK FOR SECURE LOOK CONSPIRE OVER
ENCODED CLOUD INFORMATION.
Kiruthika .K1, Bhavana priyaY.S2, Suvarna Lakshmi .C3, Udaya Priya .R4
1Professor, Dept. of CSE, Panimalar Engineering College, Tamil Nadu, India
2, 3, 4 UG Student, Dept. of CSE, Panimalar Engineering College, Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Secure pursuit strategies over encoded cloud
information enable an approved client to inquiry information
documents of enthusiasm by submitting scrambled question
catchphrases to the cloud server in a protection safeguarding
way. In any case, practically speaking, the returned question
results might be mistaken or deficient in the exploitativecloud
condition. For instance, the cloud server may deliberately
preclude some qualified outcomes to spare computational
assets and correspondence overhead. In this manner, a well-
working secure inquiry framework ought to give a question
comes about check system that enables the information client
to confirm comes about. In this paper, we outline a protected,
effectively incorporated, and fine-grained question comes
about confirmation instrument, by which, given an encoded
inquiry comes about set, the question client can not only
exclusively check the rightness of every information record in
the set yet in addition can additionally cancheck whatnumber
of or which qualified information documents are not returned
if the set is inadequate before unscrambling. The check plot is
free coupling to concrete secure inquiry procedures and can
be effectively coordinated into any safe question conspire. We
accomplish the objective by building secure checkquestion for
scrambled cloud information. Moreover, ashortmarkstrategy
with greatly little stockpiling cost is proposed to ensure the
credibility of confirmation protestandacheckquestionaskfor
method is introduced to enable the inquiry client to safely get
the coveted check protest. Executionassessmentdemonstrates
that the proposed plans are down to earth and proficient.
Keywords: cloud server, query, secure, data files,
information.
1. INTRODUCTION
In a search process, for a returned query results set
that contains multiple encrypted data files, a data user
may wish to verify the correctness of each encrypted
data file (thus, he can remove incorrect results and
retain the correct onesastheultimatequeryresults)or
can check how many or which qualified data files are
not returned on earth if the cloud server intentionally
omits some query results. This information can be
regarded as a hard evidencetopunishthecloudserver.
This is challenging to achieve the fine-grained
verifications since the query and verification are
enforced in the encrypted environment. We propose a
secure and fine-grained query results verification
scheme by constructing the verification object for
encrypted outsourced data files. When a query ends,
the query results set along with the corresponding
verification object are returned together, by which the
query user can accurately verify: 1) the correctness of
each encrypted data file in the results set 2) how many
qualified data files are not returned and 3) which
qualified data files are not returned. Furthermore, our
proposed verification scheme is lightweight and
loosely coupled to concrete secure queryschemesand
can be very easily equipped into any secure query
schemeforcloudcomputing.However,somenecessary
extensions andimportantworks areneededforfurther
supply to perfect our original scheme such as detailed
performance evaluation and formal securitydefinition
and proof. More importantly, in the dishonest cloud
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6996
environment, the scheme suffers from the following
two important security problems: 1) Just as possibly
tampering or deleting query results, the dishonest
cloud server may also tamper or forge verification
objects themselvestomakethedatauserimpossible to
perform verification operation. Specially, once the
cloud server knows that the query results verification
scheme is provided in the secure search system, he
may return in veracious verification object to escape
responsibilities of misbehavior. 2) When a data user
wants to obtain the desired verification object, some
important information will be revealed such as which
verification objects are being or have been requested
before frequently,etc.Thisinformationmayleakquery
user’s privacy and expose some useful contents about
data files. More importantly, this exposed information
may become temptations of misbehavior for the cloud
server.
Figure1. Proposed System Architecture Design
1.1 System Scope and Contributions
Essentially, the secure search is thus a technique that
allows an authorized data user to search over the data
owner’s encrypteddatabysubmittingencryptedquery
keywords in a privacy-preserving manner and is an
effectiveextensionoftraditionalsearchableencryption
to adapt for the cloud computing environment.
Motivated by the effective information retrieval on
encrypted outsourced cloud data. The secure keyword
search issuesincloudcomputinghavebeenadequately
researched which aim to continually improve search
efficiency, reduce communication and computation
cost, and enrich the category of search function with
better securityandprivacyprotection.Acommonbasic
assumption of all these schemes is that the cloud is
considered to be an ”honest-but-curious”entityaswell
as always keeps robust and securesoftware/hardware
environments. As a result, under the ideal assumption,
the correct and complete query results always are
unexceptionally returned from the cloud server when
a query ends every time.
1.2 Proposed System Summary
A secure and fine-grained question results verification
scheme by constructing the verification object for
encrypted outsourced information files. Once a query
ends, the query results set along with the
corresponding verification object are returned along,
by which the query user will accurately verify the
correctness of every encrypted record file within the
results set, what percentage of qualified information
files are not returned and which qualified information
files does not seem to be returned. Moreover, our
proposedverificationschemeislight-weightandloose-
coupling to concrete secure query schemes and might
be very easily equipped into any secure query scheme
for cloud computing. Even as presumably tampering
or deleting query results, the dishonest cloud server
may additionally tamper or forget verification objects
themselves to make the data user impossible to
perform verification operation. Specially, once the
cloud server is aware of that the query results
verification scheme is provided within the secure
search system, this information may leak query user’s
privacy and expose some useful contents about data
files. More significantly, this exposed information
mightbecometemptationsofmisbehaviorforthecloud
server. We tend to formally propose the verifiable
secure search system model and threat model and
design a fine-grained queryresultsverificationscheme
for secure keyword search over encrypted cloud
information. We propose a brief signature technique
based on certificate less public-key cryptography to
ensure the authenticity of the verification objects
themselves. We design a novel verification object
request technique based on Parlier Encryption, where
the cloud server is aware of nothing regarding what
the data user is requesting for and which verification
objects are returned to the user. We offer the formal
security definition and proof and conduct extensive
performance experiments to gauge the accuracy and
potency of our proposed scheme.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6997
2. SYSTEM IMPLEMENTATION
2.1 Query Results Verification
The query result verification mechanism allows the
data user to verify the results. In this project, we have
designed a safe, easy to integrate Fine-grained query
results validation mechanism, by giving a given query
result set, the query user can not only verify the
correctness of each data file in the collection can also
further check whether the collection does not return
how many or which qualified data files.
2.2 Outsourcing Encrypted File
Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared
pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services
that can be rapidly provisioned and released with
minimal management effort or service provider
interaction. The data owner will outsource the
encrypted file to the cloud server and automatically
three different keys will be generated for the file.
2.3 Verification Object Construction
To maximize reduce storage and communication cost
and achieve privacy guarantee of the verification
objects. Trapdoor key, verification object key and
decryption key are automatically constructed. The
trapdoor key is basically to differentiate between the
data owner and hacker.
2.4 Verification Object Signature and
Authentication
When a query ends, the query results set and
correspondingverificationobjectaretogetherreturned
to the query user, who verifies the correctness and
completeness of queryresultsbasedontheverification
object. Our proposed queryresultsverificationscheme
not only allows the query user to easily verify the
correctness of each encrypted data file in the query
results set, but also enables the data user to efficiently
perform completeness verification before decrypting
query results.
2.5 Unauthorized Data Access Alert
When the cloud server or unauthorized person gains
the access of the information or data which is stored
by the user. The data user will get alert whenever
anyone tries to access the data or information. We can
prevent fromaccessingtheuserinformationordata by
verifying the verification object.
2.6 File Recovery
Data recovery is a process of salvaging (retrieving)
inaccessible, lost, corrupted, damaged or formatted
datafrom secondarystorage, removablemedia or files,
when the data stored in them cannot be accessed in a
normal way. Even the hacker will access the data or
even hacker does the tampering we can still recover
the whole document.
3. LITERATURE SURVEY
In the year of 2011, the authors Qian Wang "Cloud
Computing has been envisionedasthenext-generation
architecture of IT Enterprise. It moves the application
software and databases to the centralized large data
centers, where the management of the data and
services may not be fully trustworthy. This unique
paradigm brings about many new security challenges,
which have not been well understood. This work
studies the problem of ensuring the integrity of data
storage in Cloud Computing. We first identify the
difficulties and potential security problems of direct
extensions with fully dynamic data updates from prior
works and then show how to construct an elegant
verification scheme for the seamless integration of
these two salient features in our protocol design.
In the year of 2015, the authors " Peng Xu, Hai Jin”
Public-key encryptionwithkeywordsearch(PEKS)isa
versatile tool. It allows a third party knowing the
search trapdoor of a keyword to search encrypted
documents containing that keyword without
decrypting the documents or knowing the keyword.
However, it is shown that the keyword will be
compromised by a malicious third party under a
keyword guess attack (KGA) if the keyword space is in
a polynomial size. A malicious searcher can no longer
learn the exact keyword to be searched even if the
keyword space is small. We propose a universal
transformation which converts any anonymous
identity-based encryption (IBE) scheme into a secure
PEFKS scheme. Following the generic construction,we
instantiate the first PEFKS scheme proven to be secure
under KGA in the case that the keyword space is in a
polynomial size.
In the year 2013,” Wenhai Sun, Bing Wang.”, with the
growing popularity of cloud computing, huge amount
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6998
of documents are outsourced to the cloud for reduced
management cost and ease of access. Although
encryptionhelps protectinguserdataconfidentiality,it
leaves the well-functioning yet practically-efficient
secure search functions over encrypted data a
challenging problem. We present a verifiable privacy-
preserving multi-keyword text search (MTS) scheme
with similarity-based ranking to address this problem.
To support multi-keyword search and search result
ranking, we propose to build thesearchindexbasedon
term frequencyandthevectorspacemodelwithcosine
similarity measure to achieve higher search result
accuracy. In the year 2015,” Jyotiska Nath Khasnabish,
Mohammad Firoj Mithani.”, In IT service delivery and
support, the cloud paradigm has introduced the
problem of IT resource over-provisioning through
rapid automation of manual IT operations. Due to the
elastic nature of cloud computing, this shortcoming
ends up significantly reducing the real benefit, viz., the
cost-effectiveness of cloud adoption for Cloud Service
Consumers (CSC). Similarly, detecting and eliminating
such over provisioning without affecting the quality of
service (QoS) is extremely difficult for Cloud Service
Providers (CSPs) since they have no visibility into the
actual performance of business service but only into
the IT services. we have derived improved analytics to
address the issues and to accelerate real cloud
adoption for large enterprises within the context of
meeting (or exceeding) business service level
objectives (SLOs) and minimizing the cloud
subscription cost (OpEx) for the business. In the year
2015,” Beniamino Di Martino, Antonio Esposito and
Giuseppina Cretella”, During the past years the Cloud
Computing offer has exponentially grown, with new
Cloud providers, platforms and services being
introduced in the IT market. The extreme variety of
services, often providing non uniform and
incompatible interfaces,makesithardforcustomersto
decide how to develop, or even worse to migrate, their
own application into the Cloud. This situation can only
get worse when customers want to exploit services
from different providers,becauseoftheportabilityand
interoperabilityissuesthatoftenarise.Inthispaperwe
propose a uniform, integrated, machine-readable,
semantic representation of cloud services, patterns,
appliances and their compositions. Our approachaims
at supporting the development of new applications for
the Cloud environment, using semantic models and
automatic reasoning to enhance portability and
interoperability when multiple platformsareinvolved.
In particular,theproposedreasoningprocedureallows
to: perform automatic discovery of Cloud services and
Appliances; map between agnostic and vendor
dependent Cloud Patterns and Services; automatically
enrich the semantic knowledge base.
4. CONCLUSIONS
We propose a secure, easily integrated, and fine-
grained query results verification scheme for secure
search over encrypted cloud data. Different from
previous works, our scheme can verify the correctness
of each encrypted query result or further accurately
find out how many or which qualified data files are
returned by the dishonest cloud server. A short
signature technique is designed to guarantee the
authenticity of verification object itself. Moreover, we
design a secure verification object request technique,
by which the cloud server knows nothing about which
verification object is requested by the data user and
actually returnedbythecloudserver.Performanceand
accuracy experiments demonstrate the validity and
efficiency of our proposed scheme.
5. FUTURE ENHANCEMENTS
In future of outsource data -Search method is not
efficient since the cloud needs to search through the
whole database, which is very inefficient. In future we
have some work in this line that will be enhancements
for efficient verification for large-scale outsourced
data. This system works on semi trusted cloud but in
future it will be extended up to all types of cloud
environment and can provide better security.
Furthermore in future we can extend our search
scheme to use external storage more carefully while
maintaining privacy.
REFERENCES
 [1] N. Park and D. J. Lilja, “Characterizing
datasets for data dedupli- cation in backup
applications,” in Proc. IEEE Int. Symp.
Workload Characterization (IISWC), 2010, pp.
1–10.
 [2] A. ODriscoll, J. Daugelaite, and R. D. Sleator,
“Big data, hadoop and cloud computing in
genomics,” J. Biomed. Inform., vol. 46, no. 5, pp.
774–781, 2013.
 [3] P. C. Zikopoulos, C. Eaton, D. DeRoos, T.
Deutsch, and G. Lapis, Understanding Big Data.
New York, NY, USA: McGraw-Hill, 2012.
 [4] M. Dong, H. Li, K. Ota, and H. Zhu, “HVSTO:
Efficient privacy preserv- ing hybrid storagein
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6999
cloud data center,” in Proc. IEEE Conf. Comput.
Commun. Workshops (INFOCOM WKSHPS),
2014, pp. 529–534.
 [5] J. Li, Y. K. Li, X. Chen, P. P. Lee, and W. Lou,
“Ahybridcloudapproachforsecureauthorized
deduplication,” IEEE Trans. Parallel Distrib.
Syst., vol. 26, no. 5, pp. 1206–1216, May 2015.
 [6] M. Dutch. (2008, Jun.).SNIA:Understanding
Data De-Duplication Ratios [Online].Available:
http://www.snia.org/sites/default/files/
Understanding_Data_De-duplication_Ratios-
20080718.pdf [7] M. Dong, H. Li, K. Ota, L. T.
Yang,andH.Zhu,“Multicloud-basedevacuation
services for emergency management,” IEEE
Cloud Comput., vol. 1, no. 4, pp. 50–59, Nov.
2014.
 [8] J. Long, A. Liu, M. Dong, and Z. Li, “An
energy-efficient and sink- location privacy
enhancedschemeforWSNSthroughringbased
rout- ing,” J. Parallel Distrib. Comput., vol. 81,
pp. 47–65, 2015.
 [9] M. Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and
X. Shen, “PaRQ: A privacy-preserving range
query scheme over encrypted metering data
for smart grid,” IEEE Trans. Emerging Topics
Comput., vol. 1, no. 1, pp. 178–191, Jun. 2013.

More Related Content

What's hot

IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
IRJET Journal
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
Manasa Chowdary
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET Journal
 
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
IRJET Journal
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO
 
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
IRJET-  	  Efficient Data Access Control for Multi-authority Cloud StorageIRJET-  	  Efficient Data Access Control for Multi-authority Cloud Storage
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
IRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
IJERA Editor
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET Journal
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET Journal
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
eSAT Publishing House
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET Journal
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
 

What's hot (20)

IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
Oruta project report
Oruta project reportOruta project report
Oruta project report
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
IRJET- A Review on Lightweight Secure Data Sharing Scheme for Mobile Cloud Co...
 
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
IRJET-  	  Efficient Data Access Control for Multi-authority Cloud StorageIRJET-  	  Efficient Data Access Control for Multi-authority Cloud Storage
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...Access Control and Revocation for Digital Assets on Cloud with Consideration ...
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
IRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption SystemIRJET- Adaptable Wildcard Searchable Encryption System
IRJET- Adaptable Wildcard Searchable Encryption System
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 

Similar to IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Check for Secure Look Conspire Over Encoded Cloud Information

IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal
 
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
ijtsrd
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET Journal
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
IRJET Journal
 
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceEnabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
 
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud StorageReview Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
IRJET Journal
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET Journal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
 

Similar to IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Check for Secure Look Conspire Over Encoded Cloud Information (20)

IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET -  	  Providing High Securtiy for Encrypted Data in CloudIRJET -  	  Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
 
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
 
Enabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure ResistanceEnabling Cloud Storage Auditing with Key Exposure Resistance
Enabling Cloud Storage Auditing with Key Exposure Resistance
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud StorageReview Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 

Recently uploaded (20)

ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 

IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Check for Secure Look Conspire Over Encoded Cloud Information

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6995 ACCOMPLISHING SECURE, WIDESPREAD, AND FINE-GRAINED QUESTION RESULTS CHECK FOR SECURE LOOK CONSPIRE OVER ENCODED CLOUD INFORMATION. Kiruthika .K1, Bhavana priyaY.S2, Suvarna Lakshmi .C3, Udaya Priya .R4 1Professor, Dept. of CSE, Panimalar Engineering College, Tamil Nadu, India 2, 3, 4 UG Student, Dept. of CSE, Panimalar Engineering College, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Secure pursuit strategies over encoded cloud information enable an approved client to inquiry information documents of enthusiasm by submitting scrambled question catchphrases to the cloud server in a protection safeguarding way. In any case, practically speaking, the returned question results might be mistaken or deficient in the exploitativecloud condition. For instance, the cloud server may deliberately preclude some qualified outcomes to spare computational assets and correspondence overhead. In this manner, a well- working secure inquiry framework ought to give a question comes about check system that enables the information client to confirm comes about. In this paper, we outline a protected, effectively incorporated, and fine-grained question comes about confirmation instrument, by which, given an encoded inquiry comes about set, the question client can not only exclusively check the rightness of every information record in the set yet in addition can additionally cancheck whatnumber of or which qualified information documents are not returned if the set is inadequate before unscrambling. The check plot is free coupling to concrete secure inquiry procedures and can be effectively coordinated into any safe question conspire. We accomplish the objective by building secure checkquestion for scrambled cloud information. Moreover, ashortmarkstrategy with greatly little stockpiling cost is proposed to ensure the credibility of confirmation protestandacheckquestionaskfor method is introduced to enable the inquiry client to safely get the coveted check protest. Executionassessmentdemonstrates that the proposed plans are down to earth and proficient. Keywords: cloud server, query, secure, data files, information. 1. INTRODUCTION In a search process, for a returned query results set that contains multiple encrypted data files, a data user may wish to verify the correctness of each encrypted data file (thus, he can remove incorrect results and retain the correct onesastheultimatequeryresults)or can check how many or which qualified data files are not returned on earth if the cloud server intentionally omits some query results. This information can be regarded as a hard evidencetopunishthecloudserver. This is challenging to achieve the fine-grained verifications since the query and verification are enforced in the encrypted environment. We propose a secure and fine-grained query results verification scheme by constructing the verification object for encrypted outsourced data files. When a query ends, the query results set along with the corresponding verification object are returned together, by which the query user can accurately verify: 1) the correctness of each encrypted data file in the results set 2) how many qualified data files are not returned and 3) which qualified data files are not returned. Furthermore, our proposed verification scheme is lightweight and loosely coupled to concrete secure queryschemesand can be very easily equipped into any secure query schemeforcloudcomputing.However,somenecessary extensions andimportantworks areneededforfurther supply to perfect our original scheme such as detailed performance evaluation and formal securitydefinition and proof. More importantly, in the dishonest cloud
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6996 environment, the scheme suffers from the following two important security problems: 1) Just as possibly tampering or deleting query results, the dishonest cloud server may also tamper or forge verification objects themselvestomakethedatauserimpossible to perform verification operation. Specially, once the cloud server knows that the query results verification scheme is provided in the secure search system, he may return in veracious verification object to escape responsibilities of misbehavior. 2) When a data user wants to obtain the desired verification object, some important information will be revealed such as which verification objects are being or have been requested before frequently,etc.Thisinformationmayleakquery user’s privacy and expose some useful contents about data files. More importantly, this exposed information may become temptations of misbehavior for the cloud server. Figure1. Proposed System Architecture Design 1.1 System Scope and Contributions Essentially, the secure search is thus a technique that allows an authorized data user to search over the data owner’s encrypteddatabysubmittingencryptedquery keywords in a privacy-preserving manner and is an effectiveextensionoftraditionalsearchableencryption to adapt for the cloud computing environment. Motivated by the effective information retrieval on encrypted outsourced cloud data. The secure keyword search issuesincloudcomputinghavebeenadequately researched which aim to continually improve search efficiency, reduce communication and computation cost, and enrich the category of search function with better securityandprivacyprotection.Acommonbasic assumption of all these schemes is that the cloud is considered to be an ”honest-but-curious”entityaswell as always keeps robust and securesoftware/hardware environments. As a result, under the ideal assumption, the correct and complete query results always are unexceptionally returned from the cloud server when a query ends every time. 1.2 Proposed System Summary A secure and fine-grained question results verification scheme by constructing the verification object for encrypted outsourced information files. Once a query ends, the query results set along with the corresponding verification object are returned along, by which the query user will accurately verify the correctness of every encrypted record file within the results set, what percentage of qualified information files are not returned and which qualified information files does not seem to be returned. Moreover, our proposedverificationschemeislight-weightandloose- coupling to concrete secure query schemes and might be very easily equipped into any secure query scheme for cloud computing. Even as presumably tampering or deleting query results, the dishonest cloud server may additionally tamper or forget verification objects themselves to make the data user impossible to perform verification operation. Specially, once the cloud server is aware of that the query results verification scheme is provided within the secure search system, this information may leak query user’s privacy and expose some useful contents about data files. More significantly, this exposed information mightbecometemptationsofmisbehaviorforthecloud server. We tend to formally propose the verifiable secure search system model and threat model and design a fine-grained queryresultsverificationscheme for secure keyword search over encrypted cloud information. We propose a brief signature technique based on certificate less public-key cryptography to ensure the authenticity of the verification objects themselves. We design a novel verification object request technique based on Parlier Encryption, where the cloud server is aware of nothing regarding what the data user is requesting for and which verification objects are returned to the user. We offer the formal security definition and proof and conduct extensive performance experiments to gauge the accuracy and potency of our proposed scheme.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6997 2. SYSTEM IMPLEMENTATION 2.1 Query Results Verification The query result verification mechanism allows the data user to verify the results. In this project, we have designed a safe, easy to integrate Fine-grained query results validation mechanism, by giving a given query result set, the query user can not only verify the correctness of each data file in the collection can also further check whether the collection does not return how many or which qualified data files. 2.2 Outsourcing Encrypted File Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction. The data owner will outsource the encrypted file to the cloud server and automatically three different keys will be generated for the file. 2.3 Verification Object Construction To maximize reduce storage and communication cost and achieve privacy guarantee of the verification objects. Trapdoor key, verification object key and decryption key are automatically constructed. The trapdoor key is basically to differentiate between the data owner and hacker. 2.4 Verification Object Signature and Authentication When a query ends, the query results set and correspondingverificationobjectaretogetherreturned to the query user, who verifies the correctness and completeness of queryresultsbasedontheverification object. Our proposed queryresultsverificationscheme not only allows the query user to easily verify the correctness of each encrypted data file in the query results set, but also enables the data user to efficiently perform completeness verification before decrypting query results. 2.5 Unauthorized Data Access Alert When the cloud server or unauthorized person gains the access of the information or data which is stored by the user. The data user will get alert whenever anyone tries to access the data or information. We can prevent fromaccessingtheuserinformationordata by verifying the verification object. 2.6 File Recovery Data recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted datafrom secondarystorage, removablemedia or files, when the data stored in them cannot be accessed in a normal way. Even the hacker will access the data or even hacker does the tampering we can still recover the whole document. 3. LITERATURE SURVEY In the year of 2011, the authors Qian Wang "Cloud Computing has been envisionedasthenext-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood. This work studies the problem of ensuring the integrity of data storage in Cloud Computing. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for the seamless integration of these two salient features in our protocol design. In the year of 2015, the authors " Peng Xu, Hai Jin” Public-key encryptionwithkeywordsearch(PEKS)isa versatile tool. It allows a third party knowing the search trapdoor of a keyword to search encrypted documents containing that keyword without decrypting the documents or knowing the keyword. However, it is shown that the keyword will be compromised by a malicious third party under a keyword guess attack (KGA) if the keyword space is in a polynomial size. A malicious searcher can no longer learn the exact keyword to be searched even if the keyword space is small. We propose a universal transformation which converts any anonymous identity-based encryption (IBE) scheme into a secure PEFKS scheme. Following the generic construction,we instantiate the first PEFKS scheme proven to be secure under KGA in the case that the keyword space is in a polynomial size. In the year 2013,” Wenhai Sun, Bing Wang.”, with the growing popularity of cloud computing, huge amount
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6998 of documents are outsourced to the cloud for reduced management cost and ease of access. Although encryptionhelps protectinguserdataconfidentiality,it leaves the well-functioning yet practically-efficient secure search functions over encrypted data a challenging problem. We present a verifiable privacy- preserving multi-keyword text search (MTS) scheme with similarity-based ranking to address this problem. To support multi-keyword search and search result ranking, we propose to build thesearchindexbasedon term frequencyandthevectorspacemodelwithcosine similarity measure to achieve higher search result accuracy. In the year 2015,” Jyotiska Nath Khasnabish, Mohammad Firoj Mithani.”, In IT service delivery and support, the cloud paradigm has introduced the problem of IT resource over-provisioning through rapid automation of manual IT operations. Due to the elastic nature of cloud computing, this shortcoming ends up significantly reducing the real benefit, viz., the cost-effectiveness of cloud adoption for Cloud Service Consumers (CSC). Similarly, detecting and eliminating such over provisioning without affecting the quality of service (QoS) is extremely difficult for Cloud Service Providers (CSPs) since they have no visibility into the actual performance of business service but only into the IT services. we have derived improved analytics to address the issues and to accelerate real cloud adoption for large enterprises within the context of meeting (or exceeding) business service level objectives (SLOs) and minimizing the cloud subscription cost (OpEx) for the business. In the year 2015,” Beniamino Di Martino, Antonio Esposito and Giuseppina Cretella”, During the past years the Cloud Computing offer has exponentially grown, with new Cloud providers, platforms and services being introduced in the IT market. The extreme variety of services, often providing non uniform and incompatible interfaces,makesithardforcustomersto decide how to develop, or even worse to migrate, their own application into the Cloud. This situation can only get worse when customers want to exploit services from different providers,becauseoftheportabilityand interoperabilityissuesthatoftenarise.Inthispaperwe propose a uniform, integrated, machine-readable, semantic representation of cloud services, patterns, appliances and their compositions. Our approachaims at supporting the development of new applications for the Cloud environment, using semantic models and automatic reasoning to enhance portability and interoperability when multiple platformsareinvolved. In particular,theproposedreasoningprocedureallows to: perform automatic discovery of Cloud services and Appliances; map between agnostic and vendor dependent Cloud Patterns and Services; automatically enrich the semantic knowledge base. 4. CONCLUSIONS We propose a secure, easily integrated, and fine- grained query results verification scheme for secure search over encrypted cloud data. Different from previous works, our scheme can verify the correctness of each encrypted query result or further accurately find out how many or which qualified data files are returned by the dishonest cloud server. A short signature technique is designed to guarantee the authenticity of verification object itself. Moreover, we design a secure verification object request technique, by which the cloud server knows nothing about which verification object is requested by the data user and actually returnedbythecloudserver.Performanceand accuracy experiments demonstrate the validity and efficiency of our proposed scheme. 5. FUTURE ENHANCEMENTS In future of outsource data -Search method is not efficient since the cloud needs to search through the whole database, which is very inefficient. In future we have some work in this line that will be enhancements for efficient verification for large-scale outsourced data. This system works on semi trusted cloud but in future it will be extended up to all types of cloud environment and can provide better security. Furthermore in future we can extend our search scheme to use external storage more carefully while maintaining privacy. REFERENCES  [1] N. Park and D. J. Lilja, “Characterizing datasets for data dedupli- cation in backup applications,” in Proc. IEEE Int. Symp. Workload Characterization (IISWC), 2010, pp. 1–10.  [2] A. ODriscoll, J. Daugelaite, and R. D. Sleator, “Big data, hadoop and cloud computing in genomics,” J. Biomed. Inform., vol. 46, no. 5, pp. 774–781, 2013.  [3] P. C. Zikopoulos, C. Eaton, D. DeRoos, T. Deutsch, and G. Lapis, Understanding Big Data. New York, NY, USA: McGraw-Hill, 2012.  [4] M. Dong, H. Li, K. Ota, and H. Zhu, “HVSTO: Efficient privacy preserv- ing hybrid storagein
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6999 cloud data center,” in Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), 2014, pp. 529–534.  [5] J. Li, Y. K. Li, X. Chen, P. P. Lee, and W. Lou, “Ahybridcloudapproachforsecureauthorized deduplication,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206–1216, May 2015.  [6] M. Dutch. (2008, Jun.).SNIA:Understanding Data De-Duplication Ratios [Online].Available: http://www.snia.org/sites/default/files/ Understanding_Data_De-duplication_Ratios- 20080718.pdf [7] M. Dong, H. Li, K. Ota, L. T. Yang,andH.Zhu,“Multicloud-basedevacuation services for emergency management,” IEEE Cloud Comput., vol. 1, no. 4, pp. 50–59, Nov. 2014.  [8] J. Long, A. Liu, M. Dong, and Z. Li, “An energy-efficient and sink- location privacy enhancedschemeforWSNSthroughringbased rout- ing,” J. Parallel Distrib. Comput., vol. 81, pp. 47–65, 2015.  [9] M. Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen, “PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid,” IEEE Trans. Emerging Topics Comput., vol. 1, no. 1, pp. 178–191, Jun. 2013.