Using Cloud Storage, users can remotely store their data and enjoy on-demand high quality
applications and services. To ensure safety of stored data, it becomes must to encrypt data before storing in the
global space. In cloud data, search arises only with plain data. But it is essential to invoke search with
encrypted data. The specialty of cloud data storage is that it allows copious keywords in a solitary query and
sorts the resultant data documents in relevance order. The proposed multi keyword search based on ranking
over an encrypted cloud data uses feature of similarity and inner product similarity matching. The vector space
model helps to provide sufficient search accuracy and homomorphic encryption enables users to involve in
ranking while majority of computing work is done on server side by operations only on cipher text. Thus in this
method for Top-K retrieval user gets an interested/used link in top. To selectively share documents fine-grained
attribute-based access control policies can be used.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Define and solve the problem of effective and secure ranked keyword search over encrypted cloud data.
Ranked search greatly enhances system usability by returning the matching files in a ranked order regarding to
certain relevance criteria (e.g., keyword frequency), thus making one step closer towards practical deployment of
privecy- preserving data hosting services in Cloud Computing. To improve the security for the data retrieval from
cloud environment, the One Time Password is used. The One Time Passwod is sent to the user mail to view the
original data. The Model exhibits the Querying Process over the cloud computing infrastructure using Secured and
Encrypted Data access and Ranking over the results would benefit the usre for the getting better results.
Secure Syntactic key Ranked Search over Encrypted Cloud in DataIJERA Editor
In Today‟s world cloud computing is one of the most effective data storage centre. The data owners usually
want to share or outsource their data. They find cloud is the alternative storage data centre to outsource their
data from local sites to cloud server. Outsourcing data will have great flexibility and economically effective.
Usually outsourcing data is sensitive data. So we need to provide some security to that data.
As data is sensitive we use access control mechanisms to stop accessing unauthorized users in clouds. The data
must be encrypted before it is going to outsource. Which obsoletes traditional data utilization based on plaintext
keyword search Thus, enabling an encrypted cloud data search service is of paramount importance. Cloud
usually maintains multiple users and also stores huge amount of data in it. In the proposed system we use a
multiple search keyword for searching most relevant data stored in clouds. In early system, the scheme is
entirely focused on single key search or a Boolean keyword search.
In implementing system we overcome the all the problems in the existing system like single key search
technique, unauthorized users access on data stored in clouds. We used Access Control method to to avoid
unauthorized access from data stored in clouds. For multi keyword search we proposed “coordinate matching”
that is “ as many matches as possible” for the given query.
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Define and solve the problem of effective and secure ranked keyword search over encrypted cloud data.
Ranked search greatly enhances system usability by returning the matching files in a ranked order regarding to
certain relevance criteria (e.g., keyword frequency), thus making one step closer towards practical deployment of
privecy- preserving data hosting services in Cloud Computing. To improve the security for the data retrieval from
cloud environment, the One Time Password is used. The One Time Passwod is sent to the user mail to view the
original data. The Model exhibits the Querying Process over the cloud computing infrastructure using Secured and
Encrypted Data access and Ranking over the results would benefit the usre for the getting better results.
Secure Syntactic key Ranked Search over Encrypted Cloud in DataIJERA Editor
In Today‟s world cloud computing is one of the most effective data storage centre. The data owners usually
want to share or outsource their data. They find cloud is the alternative storage data centre to outsource their
data from local sites to cloud server. Outsourcing data will have great flexibility and economically effective.
Usually outsourcing data is sensitive data. So we need to provide some security to that data.
As data is sensitive we use access control mechanisms to stop accessing unauthorized users in clouds. The data
must be encrypted before it is going to outsource. Which obsoletes traditional data utilization based on plaintext
keyword search Thus, enabling an encrypted cloud data search service is of paramount importance. Cloud
usually maintains multiple users and also stores huge amount of data in it. In the proposed system we use a
multiple search keyword for searching most relevant data stored in clouds. In early system, the scheme is
entirely focused on single key search or a Boolean keyword search.
In implementing system we overcome the all the problems in the existing system like single key search
technique, unauthorized users access on data stored in clouds. We used Access Control method to to avoid
unauthorized access from data stored in clouds. For multi keyword search we proposed “coordinate matching”
that is “ as many matches as possible” for the given query.
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Novel Approach for Data Security in Cloud EnvironmentSHREYASSRINATH94
Businesses and enterprises are shifting their work base from traditional obsolete systems to cloud servers. The reasons of the shift are rapid deployment of an application which enables the developers to launch their applications within a short duration of time, lower cost operating models, scalability and ability to use an operational budget. The increased demand for computer-intensive applications led to a huge growth in cloud services. Security of the stored files and applications in the cloud is a major concern due to lack of standardized control of the cloud. Traditional cryptographic algorithms like AES and RSA, though robust in nature, are not lightweight in a mobile cloud environment. This paper proposes a novel cryptographic method wherein the file is first encrypted and then stored in cloud and is decrypted using the same key which is used for encryption as and when needed. The experimental results of the identified test cases indeed prove that the proposed algorithm is lightweight in nature in terms of less execution time and less processing cycles. The lightweight approach of the proposed algorithm will benefit the user to encrypt large files in cloud.
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Secure retrieval of files using homomorphic encryption for cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
The advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to commercial public cloud for great flexibility and
economic savings. But for protecting data privacy, sensitive data has to be encrypted before
outsourcing.Considering the large number of data users and documents in cloud, it is crucial for
the search service to allow multi-keyword query and provide result similarity ranking to meet the
effective data retrieval need. Related works on searchable encryption focus on single keyword
search or Boolean keyword search, and rarely differentiate the search results. We first propose a
basic MRSE scheme using secure inner product computation, and then significantly improve it to
meet different privacy requirements in two levels of threat models. The Incremental High Utility
Pattern Transaction Frequency Tree (IHUPTF-Tree) is designed according to the transaction
frequency (descending order) of items to obtain a compact tree.
By using high utility pattern the items can be arranged in an efficient manner. Tree structure
is used to sort the items. Thus the items are sorted and frequent pattern is obtained. The frequent
pattern items are retrieved from the database by using hybrid tree (H-Tree) structure. So the
execution time becomes faster. Finally, the frequent pattern item that satisfies the threshold value
is displayed.
SPCHS Construction for Expeditious Keyword Search in Cipher TextIJMTST Journal
The subsisting public-key encryption schemes which are semantically secure, take linear search time with
the total number of cipher texts, thus making data retrieval from databases arduous or time consuming. So,
in order to rectify the current quandary, the paper proposes SPCHS Methodology for Expeditious Keyword
Search. In Searchable Public Key Cipher texts with Obnubilated Structures (SPCHS), the concept of
obnubilated structures is introduced. Here, the concept of filtering is utilized efficiently. This in turn, makes
data retrieval from sizably voluminous scale databases far more facile by reducing the time intricacy as well
as ensuring efficient performance. The time involution of our scheme depends only on the genuine number of
engendered cipher texts rather than all the number of cipher texts. Given a keyword for a file search,
predicated on the filtering mechanism we designate the file extension or type which has to be returned thus
ruling out all the other possibilities which not only makes probing more facile but withal preserves time
involution. This article gives an overview about SPCHS Mechanism and the sundry methods adopted.
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingIJERA Editor
As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. This significant drawback makes existing techniques unsuitable in cloud computing as it is greatly affect system usability, rendering user searching experiences very frustrating and system efficiency very low. In this paper, for the first time we formalize and solve the problem of effective fuzzy keyword search over encrypted cloud while maintaining keyword privacy. In our solution, we exploit edit distance to quantify keyword similarity and develop new advanced technique on constructing fuzzy keyword sets which greatly reduces the storage and representation overheads. In this way, we show that our proposed solution is secure and privacy preserving, while realizing the goal of fuzzy keyword search.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
A Novel Approach for Data Security in Cloud EnvironmentSHREYASSRINATH94
Businesses and enterprises are shifting their work base from traditional obsolete systems to cloud servers. The reasons of the shift are rapid deployment of an application which enables the developers to launch their applications within a short duration of time, lower cost operating models, scalability and ability to use an operational budget. The increased demand for computer-intensive applications led to a huge growth in cloud services. Security of the stored files and applications in the cloud is a major concern due to lack of standardized control of the cloud. Traditional cryptographic algorithms like AES and RSA, though robust in nature, are not lightweight in a mobile cloud environment. This paper proposes a novel cryptographic method wherein the file is first encrypted and then stored in cloud and is decrypted using the same key which is used for encryption as and when needed. The experimental results of the identified test cases indeed prove that the proposed algorithm is lightweight in nature in terms of less execution time and less processing cycles. The lightweight approach of the proposed algorithm will benefit the user to encrypt large files in cloud.
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Secure retrieval of files using homomorphic encryption for cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
The advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to commercial public cloud for great flexibility and
economic savings. But for protecting data privacy, sensitive data has to be encrypted before
outsourcing.Considering the large number of data users and documents in cloud, it is crucial for
the search service to allow multi-keyword query and provide result similarity ranking to meet the
effective data retrieval need. Related works on searchable encryption focus on single keyword
search or Boolean keyword search, and rarely differentiate the search results. We first propose a
basic MRSE scheme using secure inner product computation, and then significantly improve it to
meet different privacy requirements in two levels of threat models. The Incremental High Utility
Pattern Transaction Frequency Tree (IHUPTF-Tree) is designed according to the transaction
frequency (descending order) of items to obtain a compact tree.
By using high utility pattern the items can be arranged in an efficient manner. Tree structure
is used to sort the items. Thus the items are sorted and frequent pattern is obtained. The frequent
pattern items are retrieved from the database by using hybrid tree (H-Tree) structure. So the
execution time becomes faster. Finally, the frequent pattern item that satisfies the threshold value
is displayed.
SPCHS Construction for Expeditious Keyword Search in Cipher TextIJMTST Journal
The subsisting public-key encryption schemes which are semantically secure, take linear search time with
the total number of cipher texts, thus making data retrieval from databases arduous or time consuming. So,
in order to rectify the current quandary, the paper proposes SPCHS Methodology for Expeditious Keyword
Search. In Searchable Public Key Cipher texts with Obnubilated Structures (SPCHS), the concept of
obnubilated structures is introduced. Here, the concept of filtering is utilized efficiently. This in turn, makes
data retrieval from sizably voluminous scale databases far more facile by reducing the time intricacy as well
as ensuring efficient performance. The time involution of our scheme depends only on the genuine number of
engendered cipher texts rather than all the number of cipher texts. Given a keyword for a file search,
predicated on the filtering mechanism we designate the file extension or type which has to be returned thus
ruling out all the other possibilities which not only makes probing more facile but withal preserves time
involution. This article gives an overview about SPCHS Mechanism and the sundry methods adopted.
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingIJERA Editor
As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. This significant drawback makes existing techniques unsuitable in cloud computing as it is greatly affect system usability, rendering user searching experiences very frustrating and system efficiency very low. In this paper, for the first time we formalize and solve the problem of effective fuzzy keyword search over encrypted cloud while maintaining keyword privacy. In our solution, we exploit edit distance to quantify keyword similarity and develop new advanced technique on constructing fuzzy keyword sets which greatly reduces the storage and representation overheads. In this way, we show that our proposed solution is secure and privacy preserving, while realizing the goal of fuzzy keyword search.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataCloudTechnologies
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data M-Tech IEEE 2017 Projects B-Tech IEEE 2017 Projects Paper Publishing UGC Journals
A secure and dynamic multi keyword rankednexgentech15
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...nexgentechnology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...IJCI JOURNAL
Cloud computing is an emanating technology allowing
users to perform data processing, use as storage
and data admission services from around the world t
hrough internet. The Cloud service providers charge
depending on the user’s usage. Imposing confidentia
lity and scalability on cloud data increases the
complexity of cloud computing. As sensitive informa
tion is centralized into the cloud, this informatio
n must
be encrypted and uploaded to cloud for the data pri
vacy and efficient data utilization. As the data be
comes
complex and number of users are increasing searchin
g of the files must be allowed through multiple
keyword of the end users interest. The traditional
searchable encryption schemes allows users to searc
h in
the encrypted cloud data through keywords, which su
pport only Boolean search, i.e., whether a keyword
exists in a file or not, without any relevance of d
ata files and the queried keyword. Searching of dat
a in the
cloud using Single keyword ranked search results to
o coarse output and the data privacy is opposed usi
ng
server side ranking based on order-preserving encry
ption (OPE)
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Childhood Factors that influence success in later lifeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Student`S Approach towards Social Network Sitesiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorphic Encryption
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. I (Nov – Dec. 2015), PP 103-112
www.iosrjournals.org
DOI: 10.9790/0661-1761103112 www.iosrjournals.org 103 | Page
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud
Data Using Homomorphic Encryption
Sruthi V 1
, Surekha Mariam Varghese 2
1, 2(
Dept. of CSE, Mar Athanasius College of Engineering, Kothamangalam, Kerala, India)
Abstract: Using Cloud Storage, users can remotely store their data and enjoy on-demand high quality
applications and services. To ensure safety of stored data, it becomes must to encrypt data before storing in the
global space. In cloud data, search arises only with plain data. But it is essential to invoke search with
encrypted data. The specialty of cloud data storage is that it allows copious keywords in a solitary query and
sorts the resultant data documents in relevance order. The proposed multi keyword search based on ranking
over an encrypted cloud data uses feature of similarity and inner product similarity matching. The vector space
model helps to provide sufficient search accuracy and homomorphic encryption enables users to involve in
ranking while majority of computing work is done on server side by operations only on cipher text. Thus in this
method for Top-K retrieval user gets an interested/used link in top. To selectively share documents fine-grained
attribute-based access control policies can be used.
Keywords: cloud storage, vector space model, homomorphic encryption, cosine similarity.
I. Introduction
Cloud refers to internet or network or as a synonym to something with so many capabilities. Cloud
computing describes a variety of different types of computing concepts that involve a large number of
computers connected through a communication network. Broader concept of converged
infrastructure and shared services layed the foundation of cloud computing. The term cloud is not simply the
synonym term for the Internet rather, the cloud is where we go to use technology when we need it, for as long as
we need it and does not need to install anything on our desktop/pc. Moreover there is no need to pay for the
technology when we are not using it. The cloud thus can be both software and infrastructure. Security is one of
the most often-cited objections to cloud computing. Cloud users face security threats both from outside and
inside the cloud. In the cloud, this responsibility is divided among potentially many parties, including the cloud
user, the cloud vendor, and any third-party vendors that users rely on for security-sensitive software or
configurations. The cloud user is responsible for application-level security. The cloud provider is responsible for
physical security. When users outsource their private data onto the cloud, the cloud service providers can control
and monitor the data without having permission from the data owner.
To ensure privacy, users thus needed to encrypt the data before outsourcing it onto cloud. But
encrypting the data to be uploaded will greatly affect the data utilization. Moreover, data owners may share
their outsourced data with a number of users. The data users on the other hand want to retrieve the data files
they are interested in. One of the most popular ways for this is through keyword-based retrieval. Keyword-based
retrieval is a typical search technique widely applied in plaintext scenarios, in which users retrieve relevant files
based on keywords. But searching is a difficult task in ciphertext scenario as limited operations can only be
performed on encrypted data. Besides it is also required that the retrieved files must be in the order of relevance.
The existing searchable encryption techniques do not suit for cloud computing scenario because they support
only exact keyword search and does not consider the significance of retrieved file with the queried keyword.
Moreover it employs server side ranking which causes the leakage of sensitive information. This significant
drawback of existing schemes signifies the importance of a new method that supports multikeyword search.
In this paper Secure Multikeyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorphic
Encryption is proposed. This paper is organized as follows: in section II, the related work is discussed. Section
III describes implementation of multikeyword top-k retrieval in encrypted cloud using homomorphic encryption.
Security and performance analysis of the proposed system is analyzed in section IV. Section V and VI gives the
result and conclusion for the work.
II. Related Work
As the communication services are growing tremendously, outsourcing sensitive data into a global
storage space has become common. Documents containing private sensitive data are uploaded into the trusted
third party so as to perform operations such as sharing, editing, deleting, searching, retrieval etc on them.
Preserving the confidentiality of the data while information retrieval, is now a big challenge. To overcome this
challenge, data owners encrypt their data before uploading into the global space. This encryption in turn affect
2. Secure Multi-Keyword Top-K Retrieval over Encrypted Cloud Data Using Homomorphic Encryption
DOI: 10.9790/0661-1761103112 www.iosrjournals.org 104 | Page
the search and retrieval of data based on keywords. Since the data is uploaded into the global space maintained
in the remote server as encrypted, the challenge is that how to enable efficient and secure search and retrieval
over such encrypted data. Multi keyword searching in plain text scenarios is very common e.g. google search.
But the condition is different in case of cloud. In cloud searching is a difficult task and time consuming as the
data exist in encrypted form. To facilitate search on cloud a number of searchable symmetric encryption
schemes exist. At earlier times the data owner has to download all the encrypted documents uploaded by him
on the cloud, to retrieve a particular document. This way of document retrieval becomes infeasible as the
number of uploaded documents increases. To overcome this scenario and to share the documents with others,
proposed single keyword search.
To meet this need, several searchable symmetric encryptions[10] are available such as boolean
keyword search, fuzzy keyword search etc. Order Preserving Encryptions [OPE] based on SSE scheme are
there, but that technique breaches the privacy of sensitive information. Moreover, they allow only single
keyword in search query. In order preserving encryption keyword frequency is used as ranking criteria, i.e.
instead of all the files containing that keyword, gives retrieval result as the most relevant files. In OPE the server
can obtain additional information through statistical analysis. Relative distribution of terms, co-occurrence of
terms, searching patterns, access patterns etc of the plain text are revealed even it is in encrypted form in OPE.
Access pattern refers to which keywords and the corresponding files have to be retrieved during each search
request and Search pattern refers to whether the keywords retrieved between two requests are the same.
According to [1], there are two possible statistic leakages: term distribution and inter distribution.
In single keyword search, the keyword in the query issued by the data user is compared with the
documents. Documents matching the keyword are only retrieved in this case. Here the relevance of the queried
keyword with the document is not considered hence ranking is not possible. To broaden the search criteria, later
introduced boolean keyword search, fuzzy keyword search, single keyword search with ranking, fuzzy keyword
search with ranking etc. Boolean operators such as AND, OR, NOT are used for boolean keyword search along
with the keyword to be searched. For example, a Boolean search could be "Apple" AND "Computers". This
would limit the search results to only those documents containing the two keywords.
Fuzzy keyword search [2] retrieve the documents where the queried keyword is present, if exact match
is not obtained it will return the documents matching the closest to the queried keyword i.e. find matches even
when users misspell words. Semantic context is considered in fuzzy search. Mainly 3 techniques are there for
fuzzy keyword search viz: Wild Card based technique, Gram-based technique and symbol-based trie traversed
scheme. All these techniques uses edit distance to quantify the severity of violation. Insertion, deletion and
substitution are used for determining the edit distance. Suppose the queried keyword is APPLE; then with edit
distance 1, the set of fuzzy keywords to be searched become: {APPLE,*APPLE, *PPLE,
A*PLE,AP*LE,APPL*E, APPLE*}. Substrings of the queried keyword are used in gram based fuzzy search
technique. Each substring thus formed is called grams. Grams for the keyword APPLE are {APPLE, APLE,
APPE, APPL, PPLE}. The concept of queried keywords sharing common prefix has common nodes. Based on
this a multi-way trie is constructed for every keyword and depth-first search is performed. Embedding of edit
distance into hamming distance and combining it with private identification scheme [6] is more efficient can
fuzzy keyword search as this technique does not require a predefined set of keywords relevant to the current
queried keyword.
The scheme introduced by [3], [4] support topk single keyword based retrieval. To make the search
efficient and relevant to the user it is necessary to have multikeyword search in encrypted data along with
ranking. Indexing [7] [8] is the efficient technique for efficient search. Index management scheme [5] make use
of two techniques viz: Proxy re-encryption function and searchable encryption function. However each data
owner requires the index build for his document to be secure and at the same time must facilitate searching.
Homomorphic encryption [6] with additive and multiplicative properties can be applied to the secure index build
and can perform any operation on the ciphertext, will map to the same operation on the plain text. Major
limitations of the existing system thus include: single keyword search and boolean keyword search without
ranking, single keyword search with ranking, ranking on server-side with leakage of sensitive information and
does not support multikeyword search with ranking.
So there arise the need for new searchable encryption scheme which uses new technologies in
information retrieval community and cryptographic community. Thus Two Round Searchable Encryption
(TRSE) scheme has been proposed. TRSE enables multi-keyword search and top-k retrieval. It enables us to get
the retrieval result as the most relevant files that match users‟ interest. It means that files are ranked in the order
of relevance of the interest of the user. The concept of homomorphic encryption, relevance scoring, vector space
model and key management are used in this top-k retrieval of data. Since the all operation is performed on
encrypted data, information leakage is eliminated.
3. Secure Multi-Keyword Top-K Retrieval over Encrypted Cloud Data Using Homomorphic Encryption
DOI: 10.9790/0661-1761103112 www.iosrjournals.org 105 | Page
III. Implementation
The proposed secure multikeyword top-k retrieval over encrypted cloud data make use of the
techniques of information retrieval community i.e. vector space model and cryptographic community i.e.
homomorphic encryption. In proposed system to ensure security and efficiency most of the work is done by
cloud, but ranking is left to the cloud user. As most users want the documents that are most relevant to them, in
top-k multi keyword retrieval the cloud calculate the score for each document as per the keywords in the query.
Term frequency-inverse document frequency weighing scheme is used to assign score for each document and
cosine similarity to find the similarity. Cloud server then returns the calculated scores to the data user and data
user send back the top-k scores to the cloud server. Thus there is a two round communication between cloud
server and data user, hence called Two Round Searchable Symmetric Encryption Scheme [TRSE].
Large organizations require sharing a number of documents of large size within group. Cloud provides
suitable platform for sharing documents as well as resources. Usually to prevent leakage of sensitive
information, the uploaded documents are encrypted. Retrieval of interested document is done with the help of a
secure index. Data owners itself build an index for each documents he uploads into the cloud. The index so build
is encrypted using homomorphic encryption scheme. Here Apache‟s Lucene API is used to extract keyword.
Apache Lucene is a high performance full featured text extractor which extracts the keywords from the
encrypted uploaded document. The cloud server stores the encrypted documents and corresponding encrypted
index. Cloud users who want to retrieve the documents of his interest in relevant order issues query, which is
also homomorphically encrypted. Cloud server on receiving the query extract the key terms and stem it. To find
the documents satisfying all the keywords in the query, both the documents and the query is represented as
vector. Each dimension of the vector corresponds to the presence and absence of the keyword. The presence of a
term in the vector is denoted by 1 otherwise 0. Term frequency-inverse document frequency is used to calculate
the score of each term and cosine similarity to rank the documents. After ranking top-k documents scores
matching the user‟s interest is returned back to the data user.
3.1 Techniques Used
For greater flexibility, data owners outsource their data from local systems to remote servers. Security
issues are to be considered if sensitive data is outsourced into the global space. For protecting data, they are
encrypted before uploading. Search on plain text is an easy task. But it is complicated in cipher text scenarios.
Several searchable symmetric encryption schemes are there for cipher text search. But they do not consider the
relevance of document and allow only single keyword in a search query. For a large data management
environment, multiple keyword based search is necessary. Existing schemes that supports ranked search have
low efficiency and security. So for having security in information retrieval, an encryption mechanism called
Homomorphic Encryption is being used.
Homomorphic Encryption Scheme
Encryption scheme that provides security at both user side and on server side is needed. Moreover only
addition and multiplication operations over integers are needed as a result of using the vector space model and
relevance scoring, thus homomorphic encryption is employed here. Homomorphic encryption maps specific
operations in cipher text to that to plain text. Pailier cryptosystem shows additive homomorphic property. A
Homomorphic encryption is additive, if:
Enc (x⊕y) = Enc(x) ⊗ Enc(y)
Enc (Σ mi) = Π Enc (mi)
i=1 i=1
Suppose C1 and C2 be the two cipher text such that:
C1 = gm1
. r1
n
mod n2
C2 = gm2
. r2
n
mod n2
Then,
C1.C 2 = gm1
. r1
n
gm2
. r2
n
mod n2
= gm1
+ m2 (r1 r2 )n mod n2
An example for additive homomorphic property is shown below:
Let (n, g) = (2501, 92)
m1 = 34 and m2 = 16
C1 = 9234
5 2501
mod n2
= 1129735 (r1 =5)
C2 = 9216
7 2501
mod n2
= 5140305 (r2 =7)
C1 . C2 = 2010769
m1 + m2 =50
C 1+2 =9250
. 352501
mod n2
= 2010769
Thus Paillier cryptosystem shows the property of additive Homomorphic encryption. Electronic voting
is an example of additive Homomorphic encryption
4. Secure Multi-Keyword Top-K Retrieval over Encrypted Cloud Data Using Homomorphic Encryption
DOI: 10.9790/0661-1761103112 www.iosrjournals.org 106 | Page
Scoring Scheme
To weight the relevance of a document with respect to a keyword the simplest way is scoring. For
scoring different ranking models exists; of these most common is TF-IDF weighing scheme. Many variations of
the tf-idf exist. Term frequency and Inverse document frequency are the two attributes of this scoring scheme.
How many times a particular keyword occurs in a document are defined by Term Frequency (tf) whereas in how
many document a particular keyword exists is defined by Document frequency (df). The inverse document
frequency is calculated as follows:
Idf = log [N/ df], where N is the number of files.
Then, by using tf-idf weighting scheme a term t in file f is given a score as:
tf – idft,f = tft,f X idft
A combination of the Vector Space Model and the Boolean model is used in Lucene Scoring. Vector
space model determines how many times a query keyword appears in a document with respect to the number of
times the keyword appears in all the documents in the collection. Boolean model on the other hand narrows
down the documents that need to be scored based on the use of boolean logic.
Vector Space Model
To find the similarity of queried keyword with the existing documents, vector space model is used. In
vector space model both documents and query is represented in the form of vector. For example consider the
following two texts:
Text 1: Ram loves me more than Krishna loves me
Text 2: Lakshmana likes me more than Ram loves me
The keywords that occur in this are: me Ram loves Krishna than more likes Lakshmana
Then count the number of times each keyword exists in the text as:
me 2 2
Ram 1 1
likes 0 1
loves 2 1
Lakshmana 0 1
Krishna 1 0
than 1 1
more 1 1
The two vectors that correspond to the text are:
a: [2, 1, 0, 2, 0, 1, 1, 1]
b: [2, 1, 1, 1, 1, 0, 1, 1]
Here an 8 dimensional vector is formed. Cosine similarity is further used to find the similarity.
Cosine Similarity
To rank the documents different ranking techniques are available. Here to retrieve the top-K documents
matching the user‟s interest, cosine similarity is used. An example for calculating cosine similarity is given
below:
Consider a small collection of documents, consisting the following three documents:
document1: “very good times”
document2: “very good post”
document3: “los angeles times”
Step1: Calculating Term frequency
For all the documents, then calculate the tf scores for all the terms in C. Assign the score 1 if the keyword
appear in that particular document, otherwise assign 0:
Table 3.1 Term Frequency
angles Los very post times Good
document1 0 0 1 0 1 1
document2 0 0 1 1 0 1
document3 1 1 0 0 1 0
Step2: Inverse Document Frequency
The total number of documents is N=3. Therefore, the idf values for the terms are:
angles log
2
(3/1)=1.584
los log
2
(3/1)=1.584
very log
2
(3/2)=0.584
5. Secure Multi-Keyword Top-K Retrieval over Encrypted Cloud Data Using Homomorphic Encryption
DOI: 10.9790/0661-1761103112 www.iosrjournals.org 107 | Page
post log
2
(3/1)=1.584
times log
2
(3/2)=0.584
good log
2
(3/2)=0.584
Step 3: TF x IDF
Then multiply the tf scores by the idf values of each term, obtaining the following matrix of documents-
by-terms:
Table 3.2 TF-IDF Matrix
angles Los very post times Good
d1 0 0 0.584 0 0.584 0.584
d2 0 0 0.584 1.584 0 0.584
d3 1.584 1.584 0 0 0.584 0
Step 4: Vector Space Model And Cosine Similarity
Let the query given by the user be: “very very times”, calculate the tf-idf vector for the query, and
compute the score of each document in C relative to this query, using the cosine similarity. When computing the
tf-idf values for the query terms, divide the frequency by the maximum frequency (2) and multiply with the idf
values.
Using the formula given below we can find out the similarity between any two documents.
The query entered by the user can also be represented as a vector
q [ 0 0 (2/2)*0.584 0 (1/2)*0.584=0.292 0]
Calculate the length of each document and of the query:
Length of d1 = sqrt(0.584^2+0.584^2+0.584^2)=1.011
Length of d2 = sqrt(0.584^2+1.584^2+0.584^2)=1.786
Length of d3 = sqrt(1.584^2+1.584^2+0.584^2)=2.316
Length of q = sqrt(0.584^2+0.292^2)=0.652
Then the similarity values are:
cosSim(d1,q) = (0*0+0*0+0.584*0.584+0*0+0.584*0.292+0.584*0) / (1.011*0.652) = 0.776
cosSim(d2,q) = (0*0+0*0+0.584*0.584+1.584*0+0*0.292+0.584*0) / (1.786*0.652) = 0.292
cosSim(d3,q) = (1.584*0+1.584*0+0*0.584+0*0+0.584*0.292+0*0) / (2.316*0.652) = 0.112
According to the similarity values, the final order in which the documents are presented as result to the
query will be: d1, d2, d3.
TRSE Scheme
Data management environment includes a group of data owners, their associated set of data user and a
storage space. Both data owner and user can login into the environment by registering their username and
password. On successful registration, data owner will have a unique ID in addition to his username and
password. After approval by the admin, data owner can upload, share, search and delete the documents.
The data owner has a collection of documents which may be of extension .txt, .doc and .pdf to be
uploaded into the trusted third party server for greater flexibility. For security purpose the uploaded documents
are encrypted before uploading and a secure searchable index is prepared by the owner. The keywords are taken
from documents, transformed into its root form by a process called stemming. Porter stemmer algorithm is
commonly used for this. Moreover, data owner is has to generate keys for homomorphic encryption; both secret
key and public key. The secure index so build is encrypted homomorphically. The ciphertext will be in integer
form. Then score value is calculated using TF-IDF function. The selected documents can be encrypted using any
symmetric encryption algorithm. Then both encrypted index and document are uploaded into remote global
space. Data user issues the query after proper authentication. The query is represented in vector form;
homomorphically encrypted and send to the remote server. Score for each document based on the query is
calculated and returns the encrypted score to the data user. Data user then picks the top-k scored documents and
requests the data owner for the decryption key. As the retrieval process takes a two round communication
between server and the data user, the scheme named as Two Round Searchable Symmetric Encryption scheme.
The score calculation is done by the server but ranking by the data user. At the time of data uploading, each data
Cosine Similarity (d1, d2) = Dot product(d1, d2) / ||d1|| * ||d2||
Dot product (d1,d2) = d1[0] * d2[0] + d1[1] * d2[1] * … * d1[n] * d2[n]
||d1|| = square root(d1[0]2
+ d1[1]2
+ ... + d1[n]2
)
||d2|| = square root(d2[0]2
+ d2[1]2
+ ... + d2[n]2
)
6. Secure Multi-Keyword Top-K Retrieval over Encrypted Cloud Data Using Homomorphic Encryption
DOI: 10.9790/0661-1761103112 www.iosrjournals.org 108 | Page
owner generates keys for homomorphic encryption, using which both the index and user query is encrypted. To
encrypt query vector and also to decrypt the retrieved documents, the data user needs keys from data owner. So
that data owner has to handle the in a secure manner. Decrypting keys are provided by the owner to the user is
by Mail-Id. The data files of extensions like .txt, .doc, .pdf etc are supported by this scheme.
TRSE scheme has 2 phases: Initialization phase and Retrieval phase. TRSE scheme setup and building
of index is done in the initialization phase whereas trapdoor generation, score calculation and ranking of
documents are done in the retrieval phase. Thus four algorithms are involved in the TRSE scheme such as for
building index, trapdoor generation, score calculation and ranking. As the user has less power of computation,
here most of the computation is done at the server i.e. score calculation by the server but ranking by the user.
In the initialization phase, data owners generates homomorphic keys for encryption viz secret key(sk)
and public key(pk) by using a secret key λ. This setup algorithm is done only once by the data user. The public
key pk is used to encrypt the index I build from the document being uploaded. Let the encrypted index denoted
by I‟
. In the retrieval phase operations are performed on the ciphertext. Data user issues multi-keyword query q.
keywords are extracted from the query using stemming algorithms. Let query q contains {k1, k2, k3 …kn}
keywords. Homomorphic encryption is also applied to the query q to generate q‟
. Encrypted q‟ is then compared
with the secure index to find a match and score is calculated. The data user picks the top-k scores send by the
cloud server and send back it to the cloud server itself. To decrypt the file data user sends request for decrypting
key.
3.2 Description Of Modules
The different modules involved in TRSE scheme are given below:
Preprocessing Module
Three different entities are involved in cloud computing environment: Cloud server, Data owner and Data
user. Data owner at first has to register with the cloud. After that the user has to wait until the administrator
approves him. The data owner can upload the documents. Third-party data storage and retrieval services are
hosted by the cloud server. As the uploaded data may contain sensitive, data is needed to be encrypted before
outsourcing. The admin also assigns a group to the data users.
Searchable Index Module
To effectively search documents, data owner has to build a searchable secure index for all the
documents being uploaded into the cloud. All the terms relevant to the document is extracted, stemmed and
counted. The document along with the index is then uploaded into the cloud.
Encrypt Module
The documents before uploading into the global space are encrypted using any encryption scheme,
whereas for the secure index homomorphic encryption is applied. Homomorphic encryption maps the operations
in cipher text and plain text domain. The additive and multiplicative property of homomorphic encryption is
utilized here. Thus Pailier homomorphic encryption is applied to the index build. Homomorphic keys should be
handled properly.
Processing Module
Processing module deals with how to get accurate search result based on the multiple keyword queries.
The users can enter the multiple words query in the encrypted form; the server stems that query into single
words. Then find the term frequency (tf) and inverse document frequency (idf) for each term.
Query Ranking Module
Score for each document is calculated based on the tf-idf value. The number of documents to be
retrieved is specified by the user. The query issued by the user as well as all the documents are represented in
the form of vector. Each dimension of the vector represents the presence of the particular keyword. If a
particular term is present then its value is 1, otherwise the value of that vector is set to 0. To rank documents
cosine similarity between user query and all documents is found. After ranking top-k scores are returned to the
user.
Log File Generation
For each user action a log file is generated at the cloud server. Log information is used by cloud admin
to get all information regarding document uploading and downloading. Data owners on the other hand use this
log file to get information about file‟s download.
7. Secure Multi-Keyword Top-K Retrieval over Encrypted Cloud Data Using Homomorphic Encryption
DOI: 10.9790/0661-1761103112 www.iosrjournals.org 109 | Page
3.3 System Architecture
IV. ANALYSIS
4.1 Security Analysis
Confidentiality of index is maintained
In the proposed scheme for the cloud server it does not possible to obtain information about data vector
and multi-keyword query vector. Moreover TF-IDF values, access pattern and search Pattern cannot be
deducted by the global server. Scoring of documents based on multikeyword query is done in the cloud but
confidentiality of index is maintained as index is homomorphically encrypted.
Unlinkability of trapdoor.
The user query I is homomorphically encrypted to I‟. In this proposed scheme for same search query,
the trap door generated will be different thus unlinkability is maintained.
Maintains keyword privacy
In traditional SSE scheme it is possible for the trusted third party to know about the querying keyword
by analyzing the access pattern, search pattern and term frequency. Moreover, they supports only single
keyword query. But the proposed system supports multikeyword query and conceal the term distribution details.
Hence preserves keyword privacy.
4.2 Performance Analysis
4.2.1 Index Building
Whenever a data owner uploads a document into the cloud, keywords are extracted, converted to root
form and encrypted using homomorphic encryption scheme. Keywords from the queried keyword is stemmed,
encrypted and mapped to the data vector. Length of the wordlist (secure index for each document) and the
number of documents in the files determines the data vectors dimensionality. On the other hand dimensionality
of the data vector directly determines cost for mapping. That is as number of documents increases the file size
increases, as document size increases the length of secure index increases. Figure below shows time cost for
building secure index for various documents with different number of keywords.
8. Secure Multi-Keyword Top-K Retrieval over Encrypted Cloud Data Using Homomorphic Encryption
DOI: 10.9790/0661-1761103112 www.iosrjournals.org 110 | Page
Figure 4.1: Index Building
From the above graph it can be inferred that the proposed scheme requires less time than traditional
SSE scheme to build a secure index.
4.2.2 Query Vector Generation
The time to build a query vector depends on the length of the secure index build for each document.
Thus the number of keywords in the user query has less influence on the vector generation.
Figure 4.2: Query Vector Generation
V. Results
There are so many searching techniques implemented in the cloud but the drawback with these
techniques is that they supports only exact keyword search. Moreover typical users searching behavior is also
revealed. The proposed system overcomes all these limitations. Distribution information from access pattern
and search pattern implies a similarity relationship among terms or files. Let Q1 and Q2 be the vectorized search
query corresponding to queries R1 and R2. Suppose one same keyword tk is requested in two queries R1 and R2,
then the positions m1i = m2i= 1 in the corresponding query vector Q1 and Q2. By using „Encrypt‟ function the
two vectorized queries are encrypted into different ciphertext. Even though same keywords are present in
different queries, the ciphertext of two queries are independent of each other, so that which keywords have been
retrieved are concealed thus, the access pattern and search pattern are secure in this TRSE scheme.
0
5
10
15
20
25
30
35
150 300 450 600 750 900 1000
Timecostofbuildingindexinseconds
Number of keywords
Index Building
Traditional SSE
TRSE
0
1
2
3
4
5
6
150 300 450 600 750 900 1000
Timecostinseconds
Number of keywords
Query Vector Generation
Traditional SSE
TRSE
9. Secure Multi-Keyword Top-K Retrieval over Encrypted Cloud Data Using Homomorphic Encryption
DOI: 10.9790/0661-1761103112 www.iosrjournals.org 111 | Page
Each data owners can login after providing proper credentials to perform operations like uploading,
searching, sharing and deleting. The figure3.1 shows the documents uploaded by the user bob and figure 3.2
shows the search by bob based on keyword “Big Data”. Compared to the existing TRSE scheme, the proposed
system enhances security. Data users can directly access the documents either within the group or shared to him
by the data owner. In the existing scheme data owner can share his/her documents with a number of users. The
data user on the other hand can download the documents shared to him by the user from the cloud server
directly. Once the data owner shares his document, he will lose control over that document. Document once
shared can‟t be withdrawn. But in proposed system a data user needs decrypting key from the data owner even if
the document is shared to him by the data owner. This enhances the security.
Figure 5.1: Documents uploaded by bob
Figure 5.2: Ranking of documents Based on “Big Data” keyword
VI. Conclusion
Now a day it‟s become common to access global storage space over the Internet. The main problem of
storing data in a trusted third party is regarding security. Even data is encrypted before outsourcing; effective
10. Secure Multi-Keyword Top-K Retrieval over Encrypted Cloud Data Using Homomorphic Encryption
DOI: 10.9790/0661-1761103112 www.iosrjournals.org 112 | Page
information retrieval is a big challenge. To overcome these challenges, proposed a scheme [TRSE Scheme]
which enables data owners to upload encrypted data files into global storage and allow several authorized users
to perform operations such as uploading, search, share and retrieval over them. Instead of all the files, proposed
method enable users to obtain the result with the most relevant files that match users' requirement. Documents
of highest relevance are only sending back to the user. In TRSE, the concept of homomorphic encryption,
relevance scoring, vector space model and key management are used. Since the search operation is performed
over encrypted data, information leakage can be eliminated and data can be searched and retrieved efficiently.
TRSE scheme supports multiple data owners and their associated set of users. Separate space for each data
owner is maintained at storage side. To facilitate search on encrypted index homomorphic encryption is used.
Homomorphic encryption maps operation in the ciphertext to that in plain text. Moreover,
homomorphic encryption enables users to involve in the ranking while the majority of computing work is done
on the server side by operations only on ciphertext. Since statistical analysis is not possible in homomorphic
ciphertext, the proposed scheme gives security to certain extends. Vector space model helps to provide
sufficient search accuracy. Each uploaded document is represented as vector with dimensions corresponding to
the presence or absence of keywords. The system can be further improved by implementing fully homomorphic
encryption which supports reduced ciphertext and key size.
References
[1] Jiadi Yu, Member, IEEE, Peng Lu, Yanmin Zhu, Member, IEEE, Guangtao Xue, Member, IEEE Computer Society, and Minglu Li,
Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data IEEE Transactions On Dependable And Secure
Computing, Vol. 10, No. 4, July/August 2013
[2] S. Ji, G. Li, C. Li, and J. Feng, Efficient interactive fuzzy keyword search. In Proc. of 18th International World Wide Web
Conference(WWW‟09), Madrid, Spain. ACM, April 2009
[3] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data”, Proc. IEEE 30th Intl
Conf. Distributed Computing Systems (ICDCS), 2010.
[4] A. Swaminathan, Y. Mao, G.-M. Su, H. Gou, A.L. Varna, S. He, M. Wu, and D.W. Oard, “Confidentiality- Preserving Rank-
Ordered Search”, Proc. Workshop Storage Security and Survivability, 2007.
[5] Sun-Ho Lee and Im-Yeong Lee,”Secure Index Management Scheme on Cloud Storage Environment” ,International Journal of
Security and Its Applications Vol. 6, No. 3, July, 2012
[6] Craig Gentry” Fully Homomorphic Encryption Using Ideal Lattices” In the 41st ACM Symposium on Theory of Computing
(STOC), 2009.
[7] S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r: Top-kRetrieval from a Confidential Index,” Proc. 12th Int‟l Conf.
Extending DatabaseTechnology: Advances in Database Technology(EDBT), 2009
[8] E.-J. Goh, “Secure indexes,” Cryptology ePrint Archive,Report 003/216,2003, http://eprint.iacr.org/.
[9] D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. S, “Public key encryption that allows PIR queries” CRYPTO conference 2007.
[10] R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, “Searchable Symmetric Encryption: Improved Definitions and Efficient
Constructions,” Proc. ACM 13th Conf. Computer and Comm. Security (CCS), 2006.