SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 265
K-Gram based Composite Secret Sign Search over Encrypted Cloud
Information
Aditi Gaur1, Y.Geetha Sai2, Shriya G.N3
1,2,3Student, Dept. of Computer Science and Engineering, SRM Institute of Science and Technology,
Tamil Nadu, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - A growing number of owners of data has
transferred our data to cloud servers. Cloud data owners
tend to outsource information in an encrypted form for
confidentiality protection purposes. Developing an effective
and reliable search method for cipher-text is therefore
important. One problem is that the relationship between
documents is usually hidden in theencryptionprocess, which
can lead to a substantial deterioration oftheefficiencyofthe
search accuracy. Using the keyword-based app, all access
data from the cloud. The stable multi-keyword ranked cloud
to search for encrypted data, a top-k quest for big data
encryption against breaches of privacy, and attempt to find
an efficient and safe solution to this problem. It provides
open operations such as downloading, removing, adding
information. Using tree structure and nebulous search
method here to retrieve the cloud data. These types of
techniques are used to solve the keyword conjecture attack
problem. This offers transparent operations suchascopying,
deleting, and information adding. The cloud data is
extracted using a tree structureandnebuloussearchmethod
here. These types of strategies are used to solve the problem
of attack by keyword conjecture.
Key Words: Cloud computing, Multi keyword search,
Java, Semantic resemblance, Encryption
1. INTRODUCTION
Cloud computing infrastructure is ground-breaking new
technology and it significantly accelerates the production
of data storage, processing, and delivery on a wide scale.
Nevertheless, as data owners outsource their private data
to public cloud providers that are not within their trusted
management jurisdictions, security and privacy become
major concerns. To avoid leakage of information, sensitive
data must be encrypted. Most existing works find only
queries of single keywords without sufficient ranking
schemes. The keyword dictionary is static withthecurrent
multi-graded search strategy, and cannot be easily
expanded as the number of keywords grows. It also takes
no account of the user behaviour and the frequency of
keyword access. The out-of-order therankingproblemcan
emerge for the query matching result which contains a
large number of documents. This makes it difficult for the
data used to find the subset which most likely meets their
requirements. In this paper, we propose a versatile multi-
keyword query scheme, called MKQE to resolve the above
disadvantages. MKQE significantly decreasestheoverhead
management during the extension of the dictionary
keyword. When generating the query result it takes into
account keyword weights and user access history. Hence,
records that have higher levels of access and that fit more
to the access history of the users get higher rankings in the
corresponding result collection. Thepurposeoftheproject
is to provide users with various types of search options to
get the full number of file searches from the cloud's
encrypted data.
2. RELATED WORK
Using fuzzy search algorithms to upload the file we can
create lots of keywords for each file hereby providing the
statics based on different conditions, we can highlight the
output report of all these enhancedsearchmechanisms.By
providing the statics dependent on various circumstances,
we can highlight the output report of all such enhanced
search mechanisms. Keyword Guessing Attack is going to
happen in this program, the hackers can easily guess the
keyword because they can easilyhack ourcontentfromthe
cloud server. The current search method can only provide
the result based on the matching framework for Boolean
keywords, meaning that the environment would consider
the exact file name exactly the same as the keyword that
the file would be retrieved from the server, it will not have
any search results for misspelled keywords. And the new
search system never produces results based on related
keywords. Using fuzzy search algorithms to upload the file
we can create lots of keywords for each file hereby
providing the statics based on a differentcondition,wecan
highlight the output report of all these enhanced search
mechanisms. By providing the statics dependent on
various circumstances, we can highlight the output report
of all such enhanced search mechanisms.
3. LITERATURE SURVEY
a. Title: Practical technological searches on encrypted
data
Author: D. X. Song, D. Wagner, and A. Perrig
Year: 2000
Description: To that the protection and privacy risks, it is
beneficial to store data on data storage servers such as
mail servers and file servers in encryptedform.Ciphertext;
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 266
provide isolation of the search query, meaning that the
untrusted server can't know more about theplaintextthan
the search result; provide controlled search so that the
untrusted server can learn something more about the
plaintext. The algorithms we present are simple, fast (the
encryption and searchalgorithmsonlyrequireO(n)stream
cipher and block cipher operations for a document of
length n), and add almost no overhead space and
communication and are therefore practical to use
nowadays. Yet this typically means one hastocompromise
protection features. For example, if a client needs only
documents containing those terms to be retrieved, it was
not previously understood how to allow the data storage
server to conduct the search and address the question
without sacrificing data confidentiality. Within this paper,
we define our cryptographic schemes for the search
problem on encrypted data and providesecurity proofsfor
the resulting cryptosystems. There are a number of
important they are known to be secure: they provide
known confidentiality for encryption, in the sense that the
untrusted server cannot learn more about the plaintext
when only provided.
b. Title: privacy synonym based fuzzy multi keyword
graded search over encrypted cloud
Author: B.Wang, S.Yu, W. Lou, and Y. T. Hou
Year: 2014
Description: Cloud Storage is one of the most commonly
used cloud technologies at this time. As cloud use
increases, sensitive and personal data are also outsourced
which makes it necessary to protecttheconfidentialityand
integrity of this data. A simple way to secure data is to
encrypt it before outsourcing, but the recovery of the
necessary files from the encrypted cloud becomes a
problem involving searching through the encrypted data.
Different schemes have been proposed to fix this issue of
searching over encrypted cloud data, but none of the
current schemes offer ideal user search experience that
Plaintext search. In this paper, we suggest privacy search
meaning Fuzzy Multi-Keyword Ranked Search over
Encrypted Cloud Data, a plan of action that enhances the
user search experience to the greatest level by offering
multi-keyword searches based on both fuzzy and
synonymous, thus bringing encrypted search experience
closer to free search engines for text.Inaddition,byusinga
binary tree-based dynamic index, the scheme increases
index generation time and search the time relative to
existing schemes. Experimental findings reflect the
effectiveness of this proposed scheme as it decreases the
search time, i.e. the time to locate the required data, by 90
percent and minimizes the overhead of database updates
when new files need to be uploaded (database generation
time)Compared with current effective indexing schemes
for similar datasets in the literature. To this point, search
time optimization along with index generation time was
not done before.
c.Title: Similarity over outsourced cloud data achieving
used and privacy secured
Author: C.Wang, K. Ren, S. Yu, and K. M. R. Urs
Year: 2012
Description: As the data generated by individuals and
companies needing to be processed and used is growing
rapidly, data owners are encouraged to outsource their
complex local data management systems to the cloud for
their tremendous versatility and economical savings.
Nevertheless, because sensitive cloud data that need to be
encrypted before outsourcing, which obsolescence the
conventional data management service basedonplaintext
keyword search, how privacy-assured usage mechanisms
for outsourced cloud data are therefore of paramount
importance. Considering the vast number of on-demand
data users and the massive volume of outsourceddata files
in the cloud, the issue is especially daunting because it is
incredibly difficult to satisfy the realistic performance
criteria, device accessibility, andusersearchexperiences at
the highest level. In this paper, we discuss the question of
searching for stable and efficient similarity over
outsourced cloud data. Similarity search is a fundamental
and powerful method commonly used in the retrieval of
plaintext content, but not quite explored in the encrypted
data domain. First, our mechanism architecture takes
advantage of a suppressing technique to create storage-
efficient keyword similarity from a given document set,
editing distance as the similarity metric. We then create a
private tire-traverse search index based on that, and
display it correctly achieves the given search similarity
functionality with constant search time complexity. Under
stringent security treatment, we formally prove the
privacy-preserving assurance of the proposed system. To
show the generality of our system and further, expand the
scope of applications, we also demonstrate that our new
construction naturally supports fuzzy search, a notion
previously studied that aims only to tolerate types and
representation inconsistencies in theusersearchdata.The
comprehensive experiments with real data set on
Amazon's cloud platform further show the validity and
practicality of the proposed mechanism.
d. Title: Practical and efficient key word based search over
cloud data
Author: C. Orencik, M. Kantarcioglu, and E. Savas
Year: 2013
Description: Cloud computing solutions are becoming
increasingly popular each year, asmanycompaniestendto
outsource their data using reliable and efficient cloud
infrastructure, thus reducing hardware ownership costs.
Even though the benefits are welcomed, privacy remains a
problem awaiting addressing. We are implementing an
effective privacy conserving search method whereby uses
min hash functions over encrypted cloud data. Most
literature work can support only one feature search in
queries which reduces performance. One of the main
benefits ofourproposedapproachismulti-keywordsearch
functionality in a single query. The proposed method is
proven to fulfill the concept of adaptive mean time
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 267
protection. We also incorporate an efficient ranking
capability that is based on thevalues ofkeyworddocument
pairs in the term frequency-inverse document frequency
(TF-IDF). Our research shows that the proposed schemeis
known to be reliable, efficient and successful in protecting
privacy.
e.Title: Idea conceptual resemblance the methodology
focused on generative grammar and concepts
characteristics constitution
Author: M. Li, B. Lang, and J. Wang
Year: 2015
Description: In information retrieval, knowledge
acquisition and many other fields, calculation of
memantine similarity between words are important. The
latest studies aim primarily at single definitions consisting
of single words. They typically ignore the unique
constitutional characteristics of compounds for the
compound concepts composed of multiple terms and only
process them as single concepts, which can affect the
ultimate accuracy. In this paper, we propose a novel
ontology-based method for the measurement of the
Compound Concept Semantic Similarity called CCSS that
exploits the features of the concept constitution. The
composite is decomposed into Subject headings and
Auxiliary Words (SAA) in CCSS and the connections
between such two sets are used to calculate the similarity.
Additionally, the defects that can arise from SAA
recognition are corrected. In addition, many ontological
sources of knowledge such as taxonomic characteristics,
regional density, and depth are regarded. Extensive
experimental evaluations show that our approach greatly
outperforms current approaches.
4. EXISTING SYSTEM
Keyword-based information retrieval, commonly used for
searching from cloud storage on plaintext data. The data
encryption is a standard way of raising information
leakage. However, this will make it a very difficult job to
use data on the server-side, such as looking for encrypted
data. Researchers have suggested several cipher text
search schemes in recent years, by integrating the
techniques of cryptography. Such methods require large
operations and are very time-complex. Keyword Guessing
Attack is going to happen in this program, the hackers can
easily guess the keyword because they can easily hack our
content from the cloud server. The current search method
can only have the result based on the Boolean keyword
matching scheme, meaning that the actual name of the file
would be the same as the keyword that the file would be
retrieved from the server, and no search results would be
given for misspelled keywords. And the current search
system still never delivers the result based on related
keywords. Multi keyword search and fuzzy search were
introduced separately, and a combination of the two will
not result in a stable and efficient multi-keyword fuzzy
search scheme. Fuzzy multi-keyword search over
encrypted user data protection problem.
5. PROPOSED SYSTEM
Qualified search scheme for cloud storage information by
multi-keyword. Here we use the nebulous keyword
collection to build the keywords that are all feasible for
misspelling. Search keyword get encryptedandtestthefile
name in the cloud server with the original encrypted
collection if the keyword matches then we link the
nebulous keyword set for that particular keyword and
search the file list based on the nebulous keywords,
recover the files from the cloud server and find the search
output here as well. Extensivepreliminaryfindingsonreal-
life data sets demonstrate that our proposed solution can
greatly boost the ability to protect privacy infringements,
the scalability and the time-efficiency of query processing
over state-of - the-art methods. The keyword control
frequencies are taken into consideration when the
program produces a graded return results list. The data
owner should monitor the ability to unlink Query rates
without losingaccuracyandbetter-protectingdata privacy.
6. MODULES
a. Login/New User: Within this section, there is a lot of
protection to the login construction itself. Typically, the
name of the user account and the correct password of that
account are sufficient to explain and login, but here are
some more actions to do more.
b. Upload File: We want to load the input data in this
module then read the input data file and apply the pre-
processing to that input file. And the attached file can be
transferred into the next steps.
c. Frequent search: This module, we get the non-stop
words as input and measure the number of words andfind
repeated occurrence from non-stop words of each and
every word.
d. Similarity search: From the maximum frequency word
we find the weight age of each and every word to measure
the similarity between the terms based on the similarity
that we will divide the terms into clusters.
e. Linear search: In this module we will create keyword
search, each cluster has n number of similar terms as
keywords we will find the file for that cluster using the
lexical analysis tool.
f. Mail alert process: The user's upload and update
process must first get the secret key in the relevant user
email I d and then apply the secret key to encrypteddata to
send the server storage and decrypt it using the secret key
to access the corresponding data file to the private key
conversion of the server storage solutionusingtheSharing
KeyGen (SKA, t, m)..
g. File Downloading process: The method of uploading
files is to get the corresponding secret key to the
corresponding file to the user mail I d and decrypt the file
data afterward. The decryption key for the file transfer
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 268
process to storage servers, so that storageserversperform
the decryption procedure. And download the file.
7. ARCHITECTURE DIAGRAM
Fig-1: Architecture diagram
8. OUTPUT SCREENSHOTS
Fig-2: Main page
Fig-3: Admin login
Fig-4: File upload
Fig-5: Search page
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 269
Fig-6: Download file
9. FUTURE ENHANCEMENT
It maintains the confidentiality and security of the files
stored in the cloud and this keyword-based search helps
preserve the above. This can be achieved in a differentway
to incorporate more functionality at every part of the
device to improve the system's security and health.
10. CONCLUSION
A protected multi-keyword search scheme ranked above-
encrypted cloud data which simultaneously facilitates
dynamic update operations suchas removal anddocument
insertion. The cloud server runs through differentpathson
the index and the data user expects different results but
with the same high degree of query accuracy whilst. The
keyword-based search is also one commonly used data
operator in many applications for database and
information retrieval, and its conventional processing
methods cannot be applied directly to encrypted data. So
how to process these requests over encrypted data while
maintaining data privacy at the same time. Then we build
the multi-keywordtop-k searchschemeto boostthesearch
performance, which divides the dictionary into multiple
groups and only needs to be stored In the sense that you
don't need to send the exact filename to download the file,
if you send the maximum number of repeated terms, that
time will be downloaded in the decryptedformataswell as
the original file. This helps keep the files in the cloud
secure.
REFERENCES
[1] D. X. Song, D. Wagner, and A. Perrig, “Practical
techniques for searches on encrypted data,” in
IEEE Symposium on Security and Privacy, 2000,
pp. 44–55.
[2] B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy-
preserving multi-keyword fuzzy search over
encrypted data in the cloud,” inIEEEInternational
Conference on Computer Communications, 2014,
pp. 2112–2120.
[3] M. Kuzu, M. S. Islam, and M. Kantarcioglu,
“Efficient similarity search over encrypted data,”
in IEEE 28th International Conference on Data
Engineering (ICDE), 2012, pp. 1156–1167.
[4] C. Wang, K. Ren, S. Yu, and K. M. R. Urs, “Achieving
usable and privacy-assured similaritysearchover
outsourced cloud data,” in 2012 Proceedings of
IEEE INFOCOM, 2012, pp. 451–459.
[5] C. Orencik, M. Kantarcioglu, and E. Savas, “A
practical and secure multi-keyword search
method over encrypted cloud data,” in IEEE Sixth
International Conference on Cloud Computing
(CLOUD), 2013, pp. 390–397.
[6] M. Li, B. Lang, and J. Wang, “Compound concept
semantic similarity calculation based on ontology
and concept constitution features,” in Tools with
Artificial Intelligence (ICTAI), 2015 IEEE 27th
International Conference on, 2015, pp. 226–233.
[7] Z. Zhou, Y. Wang, and J. Gu, “A new model of
information content for semantic similarity in
wordnet,” in Future Generation Communication
and Networking Symposia, 2008. FGCNS’08.
Second International Conference on, vol. 3. IEEE,
2008, pp. 85–89.
[8] H. Hu, J. Xu, C. Ren, and B. Choi, “Processing
private queries over untrusteddata cloudthrough
privacy homomorphism,” in 2011 IEEE 27th
International Conference on Data Engineering,
2011, pp. 601–612.
[9] Z. Fu, X. Sun, N. Linge, and L. Zhou, “Achieving
Effective Cloud Search Services: Multi-keyword
Ranked Search over Encrypted Cloud Data
Supporting Synonym Query,” IEEE Transaction
Consumer Electronics, vol. 60, no.1, pp. 164-172,
2014.
[10] Q. Chai and G. Gong, “Verifiable Symmetric
Searchable Encryption for Semi- Honest-but-
Curious Cloud Servers,” IEEE International
Conference on Communications (ICC’12),pp.917-
922, 2012.

More Related Content

What's hot

Final 1st
Final 1stFinal 1st
Final 1st
gokulprema
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
IRJET Journal
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
 
Enabling efficient multi keyword ranked
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
Sakthi Sundaram
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keywordEnabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
IMPULSE_TECHNOLOGY
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Pvrtechnologies Nellore
 
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
iosrjce
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET Journal
 
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
Iaetsd Iaetsd
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
 
An efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword searchAn efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword search
redpel dot com
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
J017547478
J017547478J017547478
J017547478
IOSR Journals
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
1crore projects
 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
IRJET Journal
 

What's hot (18)

Final 1st
Final 1stFinal 1st
Final 1st
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
Enabling efficient multi keyword ranked
Enabling efficient multi keyword rankedEnabling efficient multi keyword ranked
Enabling efficient multi keyword ranked
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keywordEnabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
 
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
 
An efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword searchAn efficeient privacy preserving ranked keyword search
An efficeient privacy preserving ranked keyword search
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
J017547478
J017547478J017547478
J017547478
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
 
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted DataEfficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
 

Similar to IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud Information

IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
IRJET Journal
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
 
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
IJERA Editor
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
CloudTechnologies
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET Journal
 
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
hemanthbbc
 
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
 
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET Journal
 

Similar to IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud Information (20)

IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...IRJET-  	  A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
 
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingFuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
 
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...Ieeepro techno solutions  ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
 
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...Ieeepro techno solutions  ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 

Recently uploaded (20)

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 

IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud Information

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 265 K-Gram based Composite Secret Sign Search over Encrypted Cloud Information Aditi Gaur1, Y.Geetha Sai2, Shriya G.N3 1,2,3Student, Dept. of Computer Science and Engineering, SRM Institute of Science and Technology, Tamil Nadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - A growing number of owners of data has transferred our data to cloud servers. Cloud data owners tend to outsource information in an encrypted form for confidentiality protection purposes. Developing an effective and reliable search method for cipher-text is therefore important. One problem is that the relationship between documents is usually hidden in theencryptionprocess, which can lead to a substantial deterioration oftheefficiencyofthe search accuracy. Using the keyword-based app, all access data from the cloud. The stable multi-keyword ranked cloud to search for encrypted data, a top-k quest for big data encryption against breaches of privacy, and attempt to find an efficient and safe solution to this problem. It provides open operations such as downloading, removing, adding information. Using tree structure and nebulous search method here to retrieve the cloud data. These types of techniques are used to solve the keyword conjecture attack problem. This offers transparent operations suchascopying, deleting, and information adding. The cloud data is extracted using a tree structureandnebuloussearchmethod here. These types of strategies are used to solve the problem of attack by keyword conjecture. Key Words: Cloud computing, Multi keyword search, Java, Semantic resemblance, Encryption 1. INTRODUCTION Cloud computing infrastructure is ground-breaking new technology and it significantly accelerates the production of data storage, processing, and delivery on a wide scale. Nevertheless, as data owners outsource their private data to public cloud providers that are not within their trusted management jurisdictions, security and privacy become major concerns. To avoid leakage of information, sensitive data must be encrypted. Most existing works find only queries of single keywords without sufficient ranking schemes. The keyword dictionary is static withthecurrent multi-graded search strategy, and cannot be easily expanded as the number of keywords grows. It also takes no account of the user behaviour and the frequency of keyword access. The out-of-order therankingproblemcan emerge for the query matching result which contains a large number of documents. This makes it difficult for the data used to find the subset which most likely meets their requirements. In this paper, we propose a versatile multi- keyword query scheme, called MKQE to resolve the above disadvantages. MKQE significantly decreasestheoverhead management during the extension of the dictionary keyword. When generating the query result it takes into account keyword weights and user access history. Hence, records that have higher levels of access and that fit more to the access history of the users get higher rankings in the corresponding result collection. Thepurposeoftheproject is to provide users with various types of search options to get the full number of file searches from the cloud's encrypted data. 2. RELATED WORK Using fuzzy search algorithms to upload the file we can create lots of keywords for each file hereby providing the statics based on different conditions, we can highlight the output report of all these enhancedsearchmechanisms.By providing the statics dependent on various circumstances, we can highlight the output report of all such enhanced search mechanisms. Keyword Guessing Attack is going to happen in this program, the hackers can easily guess the keyword because they can easilyhack ourcontentfromthe cloud server. The current search method can only provide the result based on the matching framework for Boolean keywords, meaning that the environment would consider the exact file name exactly the same as the keyword that the file would be retrieved from the server, it will not have any search results for misspelled keywords. And the new search system never produces results based on related keywords. Using fuzzy search algorithms to upload the file we can create lots of keywords for each file hereby providing the statics based on a differentcondition,wecan highlight the output report of all these enhanced search mechanisms. By providing the statics dependent on various circumstances, we can highlight the output report of all such enhanced search mechanisms. 3. LITERATURE SURVEY a. Title: Practical technological searches on encrypted data Author: D. X. Song, D. Wagner, and A. Perrig Year: 2000 Description: To that the protection and privacy risks, it is beneficial to store data on data storage servers such as mail servers and file servers in encryptedform.Ciphertext;
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 266 provide isolation of the search query, meaning that the untrusted server can't know more about theplaintextthan the search result; provide controlled search so that the untrusted server can learn something more about the plaintext. The algorithms we present are simple, fast (the encryption and searchalgorithmsonlyrequireO(n)stream cipher and block cipher operations for a document of length n), and add almost no overhead space and communication and are therefore practical to use nowadays. Yet this typically means one hastocompromise protection features. For example, if a client needs only documents containing those terms to be retrieved, it was not previously understood how to allow the data storage server to conduct the search and address the question without sacrificing data confidentiality. Within this paper, we define our cryptographic schemes for the search problem on encrypted data and providesecurity proofsfor the resulting cryptosystems. There are a number of important they are known to be secure: they provide known confidentiality for encryption, in the sense that the untrusted server cannot learn more about the plaintext when only provided. b. Title: privacy synonym based fuzzy multi keyword graded search over encrypted cloud Author: B.Wang, S.Yu, W. Lou, and Y. T. Hou Year: 2014 Description: Cloud Storage is one of the most commonly used cloud technologies at this time. As cloud use increases, sensitive and personal data are also outsourced which makes it necessary to protecttheconfidentialityand integrity of this data. A simple way to secure data is to encrypt it before outsourcing, but the recovery of the necessary files from the encrypted cloud becomes a problem involving searching through the encrypted data. Different schemes have been proposed to fix this issue of searching over encrypted cloud data, but none of the current schemes offer ideal user search experience that Plaintext search. In this paper, we suggest privacy search meaning Fuzzy Multi-Keyword Ranked Search over Encrypted Cloud Data, a plan of action that enhances the user search experience to the greatest level by offering multi-keyword searches based on both fuzzy and synonymous, thus bringing encrypted search experience closer to free search engines for text.Inaddition,byusinga binary tree-based dynamic index, the scheme increases index generation time and search the time relative to existing schemes. Experimental findings reflect the effectiveness of this proposed scheme as it decreases the search time, i.e. the time to locate the required data, by 90 percent and minimizes the overhead of database updates when new files need to be uploaded (database generation time)Compared with current effective indexing schemes for similar datasets in the literature. To this point, search time optimization along with index generation time was not done before. c.Title: Similarity over outsourced cloud data achieving used and privacy secured Author: C.Wang, K. Ren, S. Yu, and K. M. R. Urs Year: 2012 Description: As the data generated by individuals and companies needing to be processed and used is growing rapidly, data owners are encouraged to outsource their complex local data management systems to the cloud for their tremendous versatility and economical savings. Nevertheless, because sensitive cloud data that need to be encrypted before outsourcing, which obsolescence the conventional data management service basedonplaintext keyword search, how privacy-assured usage mechanisms for outsourced cloud data are therefore of paramount importance. Considering the vast number of on-demand data users and the massive volume of outsourceddata files in the cloud, the issue is especially daunting because it is incredibly difficult to satisfy the realistic performance criteria, device accessibility, andusersearchexperiences at the highest level. In this paper, we discuss the question of searching for stable and efficient similarity over outsourced cloud data. Similarity search is a fundamental and powerful method commonly used in the retrieval of plaintext content, but not quite explored in the encrypted data domain. First, our mechanism architecture takes advantage of a suppressing technique to create storage- efficient keyword similarity from a given document set, editing distance as the similarity metric. We then create a private tire-traverse search index based on that, and display it correctly achieves the given search similarity functionality with constant search time complexity. Under stringent security treatment, we formally prove the privacy-preserving assurance of the proposed system. To show the generality of our system and further, expand the scope of applications, we also demonstrate that our new construction naturally supports fuzzy search, a notion previously studied that aims only to tolerate types and representation inconsistencies in theusersearchdata.The comprehensive experiments with real data set on Amazon's cloud platform further show the validity and practicality of the proposed mechanism. d. Title: Practical and efficient key word based search over cloud data Author: C. Orencik, M. Kantarcioglu, and E. Savas Year: 2013 Description: Cloud computing solutions are becoming increasingly popular each year, asmanycompaniestendto outsource their data using reliable and efficient cloud infrastructure, thus reducing hardware ownership costs. Even though the benefits are welcomed, privacy remains a problem awaiting addressing. We are implementing an effective privacy conserving search method whereby uses min hash functions over encrypted cloud data. Most literature work can support only one feature search in queries which reduces performance. One of the main benefits ofourproposedapproachismulti-keywordsearch functionality in a single query. The proposed method is proven to fulfill the concept of adaptive mean time
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 267 protection. We also incorporate an efficient ranking capability that is based on thevalues ofkeyworddocument pairs in the term frequency-inverse document frequency (TF-IDF). Our research shows that the proposed schemeis known to be reliable, efficient and successful in protecting privacy. e.Title: Idea conceptual resemblance the methodology focused on generative grammar and concepts characteristics constitution Author: M. Li, B. Lang, and J. Wang Year: 2015 Description: In information retrieval, knowledge acquisition and many other fields, calculation of memantine similarity between words are important. The latest studies aim primarily at single definitions consisting of single words. They typically ignore the unique constitutional characteristics of compounds for the compound concepts composed of multiple terms and only process them as single concepts, which can affect the ultimate accuracy. In this paper, we propose a novel ontology-based method for the measurement of the Compound Concept Semantic Similarity called CCSS that exploits the features of the concept constitution. The composite is decomposed into Subject headings and Auxiliary Words (SAA) in CCSS and the connections between such two sets are used to calculate the similarity. Additionally, the defects that can arise from SAA recognition are corrected. In addition, many ontological sources of knowledge such as taxonomic characteristics, regional density, and depth are regarded. Extensive experimental evaluations show that our approach greatly outperforms current approaches. 4. EXISTING SYSTEM Keyword-based information retrieval, commonly used for searching from cloud storage on plaintext data. The data encryption is a standard way of raising information leakage. However, this will make it a very difficult job to use data on the server-side, such as looking for encrypted data. Researchers have suggested several cipher text search schemes in recent years, by integrating the techniques of cryptography. Such methods require large operations and are very time-complex. Keyword Guessing Attack is going to happen in this program, the hackers can easily guess the keyword because they can easily hack our content from the cloud server. The current search method can only have the result based on the Boolean keyword matching scheme, meaning that the actual name of the file would be the same as the keyword that the file would be retrieved from the server, and no search results would be given for misspelled keywords. And the current search system still never delivers the result based on related keywords. Multi keyword search and fuzzy search were introduced separately, and a combination of the two will not result in a stable and efficient multi-keyword fuzzy search scheme. Fuzzy multi-keyword search over encrypted user data protection problem. 5. PROPOSED SYSTEM Qualified search scheme for cloud storage information by multi-keyword. Here we use the nebulous keyword collection to build the keywords that are all feasible for misspelling. Search keyword get encryptedandtestthefile name in the cloud server with the original encrypted collection if the keyword matches then we link the nebulous keyword set for that particular keyword and search the file list based on the nebulous keywords, recover the files from the cloud server and find the search output here as well. Extensivepreliminaryfindingsonreal- life data sets demonstrate that our proposed solution can greatly boost the ability to protect privacy infringements, the scalability and the time-efficiency of query processing over state-of - the-art methods. The keyword control frequencies are taken into consideration when the program produces a graded return results list. The data owner should monitor the ability to unlink Query rates without losingaccuracyandbetter-protectingdata privacy. 6. MODULES a. Login/New User: Within this section, there is a lot of protection to the login construction itself. Typically, the name of the user account and the correct password of that account are sufficient to explain and login, but here are some more actions to do more. b. Upload File: We want to load the input data in this module then read the input data file and apply the pre- processing to that input file. And the attached file can be transferred into the next steps. c. Frequent search: This module, we get the non-stop words as input and measure the number of words andfind repeated occurrence from non-stop words of each and every word. d. Similarity search: From the maximum frequency word we find the weight age of each and every word to measure the similarity between the terms based on the similarity that we will divide the terms into clusters. e. Linear search: In this module we will create keyword search, each cluster has n number of similar terms as keywords we will find the file for that cluster using the lexical analysis tool. f. Mail alert process: The user's upload and update process must first get the secret key in the relevant user email I d and then apply the secret key to encrypteddata to send the server storage and decrypt it using the secret key to access the corresponding data file to the private key conversion of the server storage solutionusingtheSharing KeyGen (SKA, t, m).. g. File Downloading process: The method of uploading files is to get the corresponding secret key to the corresponding file to the user mail I d and decrypt the file data afterward. The decryption key for the file transfer
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 268 process to storage servers, so that storageserversperform the decryption procedure. And download the file. 7. ARCHITECTURE DIAGRAM Fig-1: Architecture diagram 8. OUTPUT SCREENSHOTS Fig-2: Main page Fig-3: Admin login Fig-4: File upload Fig-5: Search page
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 04 | Apr 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 269 Fig-6: Download file 9. FUTURE ENHANCEMENT It maintains the confidentiality and security of the files stored in the cloud and this keyword-based search helps preserve the above. This can be achieved in a differentway to incorporate more functionality at every part of the device to improve the system's security and health. 10. CONCLUSION A protected multi-keyword search scheme ranked above- encrypted cloud data which simultaneously facilitates dynamic update operations suchas removal anddocument insertion. The cloud server runs through differentpathson the index and the data user expects different results but with the same high degree of query accuracy whilst. The keyword-based search is also one commonly used data operator in many applications for database and information retrieval, and its conventional processing methods cannot be applied directly to encrypted data. So how to process these requests over encrypted data while maintaining data privacy at the same time. Then we build the multi-keywordtop-k searchschemeto boostthesearch performance, which divides the dictionary into multiple groups and only needs to be stored In the sense that you don't need to send the exact filename to download the file, if you send the maximum number of repeated terms, that time will be downloaded in the decryptedformataswell as the original file. This helps keep the files in the cloud secure. REFERENCES [1] D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in IEEE Symposium on Security and Privacy, 2000, pp. 44–55. [2] B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy- preserving multi-keyword fuzzy search over encrypted data in the cloud,” inIEEEInternational Conference on Computer Communications, 2014, pp. 2112–2120. [3] M. Kuzu, M. S. Islam, and M. Kantarcioglu, “Efficient similarity search over encrypted data,” in IEEE 28th International Conference on Data Engineering (ICDE), 2012, pp. 1156–1167. [4] C. Wang, K. Ren, S. Yu, and K. M. R. Urs, “Achieving usable and privacy-assured similaritysearchover outsourced cloud data,” in 2012 Proceedings of IEEE INFOCOM, 2012, pp. 451–459. [5] C. Orencik, M. Kantarcioglu, and E. Savas, “A practical and secure multi-keyword search method over encrypted cloud data,” in IEEE Sixth International Conference on Cloud Computing (CLOUD), 2013, pp. 390–397. [6] M. Li, B. Lang, and J. Wang, “Compound concept semantic similarity calculation based on ontology and concept constitution features,” in Tools with Artificial Intelligence (ICTAI), 2015 IEEE 27th International Conference on, 2015, pp. 226–233. [7] Z. Zhou, Y. Wang, and J. Gu, “A new model of information content for semantic similarity in wordnet,” in Future Generation Communication and Networking Symposia, 2008. FGCNS’08. Second International Conference on, vol. 3. IEEE, 2008, pp. 85–89. [8] H. Hu, J. Xu, C. Ren, and B. Choi, “Processing private queries over untrusteddata cloudthrough privacy homomorphism,” in 2011 IEEE 27th International Conference on Data Engineering, 2011, pp. 601–612. [9] Z. Fu, X. Sun, N. Linge, and L. Zhou, “Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query,” IEEE Transaction Consumer Electronics, vol. 60, no.1, pp. 164-172, 2014. [10] Q. Chai and G. Gong, “Verifiable Symmetric Searchable Encryption for Semi- Honest-but- Curious Cloud Servers,” IEEE International Conference on Communications (ICC’12),pp.917- 922, 2012.