• No results found

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

N/A
N/A
Protected

Academic year: 2020

Share "A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

A Secure and Dynamic Multi-keyword Ranked Search

Scheme over Encrypted Cloud Data

1

Kollipara Sai Krishna . 2 I.Vinay M.Tech 3 Samrat Krishna M.Tech.(Phd)

1 (M-tech) Department of CSE Mandava Institute of Engineering Technology Vidya Nagar, Jaggayyapet.

Krishna Dist, Andhra Pradesh

2Assistent Professor, Department of CSE Mandava Institute of Engineering Technology Vidya Nagar,

Jaggayyapet. Krishna Dist, Andhra Pradesh

3Associate Professor, Department of CSE Mandava Institute of Engineering Technology Vidya Nagar,

Jaggayyapet. Krishna Dist, Andhra Pradesh

Abstract: Due to the expanding prevalence of

distributed computing, an ever increasing number of information proprietors are spurred to outsource their information to cloud servers for extraordinary comfort and decreased cost in information administration. Notwithstanding, delicate information ought to be encoded before outsourcing for security necessities, which obsoletes information usage like catchphrase based report recovery. In this paper, we exhibit a protected multi-watchword positioned seek plot over scrambled cloud information, which all the while underpins dynamic refresh tasks like cancellation and addition of reports. In particular, the vector space demonstrates and the broadly utilized TF_IDF display is consolidated in the file development and question age. We build an uncommon tree-based record structure and propose an "Insatiable

Depth-first Search" calculation to give

proficient multi-catchphrase positioned look. The protected KNN calculation is used to encode the record and inquiry vectors, and in the meantime guarantee exact importance score figuring between scrambled list and question vectors. With a specific end goal to oppose measurable assaults, ghost terms are added to the file vector for blinding list items. Because of the utilization of our unique tree-based list structure, the proposed plan can accomplish sub-straight hunt time and manage the erasure and inclusion of reports adaptably. Broad

analyses are directed to exhibit the productivity of the proposed plot.

Keywords: secure multi-keyword ranked

search.

I. INTRODUCTION

Distributed computing has been considered as another model of big business IT foundation, which can compose gigantic asset of figuring, stockpiling and applications, and empower clients to appreciate pervasive, advantageous and on demand arrange access to a common pool of configurable processing assets with

extraordinary productivity and negligible

monetary overhead. Pulled in by these engaging highlights, the two people and undertakings are roused to outsource their information to the cloud, rather than buying programming and equipment to deal with the information themselves. Notwithstanding of the different points of interest of cloud administrations,

outsourcing touchy data, (for example,

messages, individual wellbeing records,

organization back information, government reports, and so forth.) to remote servers brings

security concerns. The cloud specialist

(2)

information ease of use. For instance, the current strategies on catchphrase based data recovery, which are generally utilized on the plaintext information, can't be specifically connected on the encoded information. Downloading every one of the information from the cloud and unscramble locally is clearly unfeasible. So as to address the above issue, specialists have planned

some generalpurpose arrangements with

completely homomorphic encryption [3] or unaware RAMs [4]. Be that as it may, these strategies are not down to earth because of their high computational overhead for both the cloud disjoin and client. In actuality, more pragmatic uncommon reason arrangements, for example, accessible encryption (SE) plans have made particular commitments regarding productivity, usefulness and security. Accessible encryption plans empower the customer to store the scrambled information to the cloud and execute catchphrase look over ciphertext area. Up until now, copious works have been proposed under various risk models to accomplish different hunt usefulness, for example, single catchphrase seek, comparability look, multi-watchword boo lean

pursuit, positioned seek, multi-watchword

positioned look, and so on. Among them, multikeyword positioned seek accomplishes

increasingly consideration for its viable

materialness. As of late, some powerful plans have been proposed to help embedding and erasing activities on report gathering. These are critical fills in as it is exceptionally conceivable that the information proprietors need to refresh their information on the cloud server. Be that as it may, few of the dynamic plans bolster productive multikeyword positioned look.

II. RELATED WORK : The encoded

information to the cloud and execute

catchphrase seek over cipher text space. Because of various cryptography Primitives, accessible

encryption plans can be developed utilizing open key based cryptography. or then again symmetric key based cryptography. Tune et al. proposed the main symmetric accessible encryption (SSE) plot, and the pursuit time of their plan is direct to the measure of the information gathering. Goh [8] proposed formal security definitions for SSE and composed a plan in view of Bloom channel. The pursuit time of Goh's plan is O (n), where n is the cardinality of the record gathering. Curtmola et al. [10] proposed two plans (SSE-1 and SSE-2) which accomplish the ideal hunt time. Their SSE1 plot is secure against picked catchphrase assaults (CKA1) and SSE-2 is secure against versatile chosen keyword assaults (CKA2). These early works are single watchword boolean hunt plans, which are exceptionally straightforward as far as usefulness. A while later, rich works have been proposed under various risk models to accomplish different pursuit usefulness, for example, single catchphrase seek, likeness ,multi-watchword Boolean inquiry, positioned look, and multi-catchphrase positioned look and so on Multi-watchword boo lean inquiry enables

the clients to enter different question

(3)

early works have understood the positioned look utilizing request protecting methods, yet they are outlined just for single catchphrase seeks. Cao et

al. understood the principal protection

safeguarding multi-catchphrase positioned seek plot, in which archives and inquiries are spoken to as vectors of word reference estimate. With the "arrange coordinating", the records are positioned by the quantity of coordinated question catchphrases. Be that as it may, Cao et al's. plot does not think about the significance of the distinctive catchphrases, and in this way isn't

sufficiently exact. Likewise, the inquiry

productivity of the plan is direct with the cardinality of record calculation.

Sun et al. shown a safe multi-catchphrase look scheme that sponsorships likeness based situating. The makers manufactured an open record tree in perspective of vector space show and got cosine measure together with TF×IDF to give situating results. Sun et al's. look computation achieves better than anything straight chase capability however realizes precision hardship. O¨ rencik et al. proposed a secured multikeyword look for strategy which utilized close-by delicate hash (LSH) abilities to group the similar documents. The LSH count is fitting for similar request yet can't give redress situating. In , Zhang et al. proposed an arrangement to oversee secure multi-catchphrase situated look for in a multi-proprietor appear. In this arrangement, particular data proprietors use various puzzle keys to scramble their reports and catchphrases while affirmed data customers would inquiry be able to without knowing keys of these unmistakable data proprietors. The makers proposed an "Additional substance Order Preserving Function" to recuperate the most material question things. In any case, these works don't support dynamic errands.

III. Problem STATEMENT

A. Leaving Model A general method to manage guarantee the data protection is to encode the

data previously outsourcing. Available

encryption designs enable the client to store the mixed data to the cloud and execute watchword investigate ciphertext zone. Up until this point, extensive works have been proposed under different peril models to achieve distinctive interest value, for instance, single catchphrase look, comparability look for, multi-watchword boolean request, situated look, multi-watchword situated look for, et cetera. Among them,

multi-catchphrase situated look for achieves

progressively thought for its rational pertinence. Starting late, some intense plans have been proposed to help embeddings and eradicating exercises on record aggregation. These are basic fills in as it is outstandingly possible that the data proprietors need to invigorate their data on the cloud server.

Disadvantages:

• Huge cost similar to data comfort. For

example, the present methodology on

watchword based information recuperation, which are by and large used on the plaintext data, can't be particularly associated on the mixed data. Downloading each one of the data from the cloud and unscramble locally is obviously silly.

•Existing System procedures not valuable in view of their high computational overhead for both the cloud detach and customer.

B .Proposed Model

(4)

record repeat (IDF)" show are participated in the rundown improvement and request age to give multikeyword situated look for. To get high request adequacy, we construct a tree-based rundown structure and propose an "Anxious Depth-first Search" computation in light of this record tree.

•The secure kNN figuring is utilized to encode the record and question vectors, and after that certification correct congruity score tally between mixed document and request vectors.

•To restrict particular ambushes in different risk models, we create two secure interest plots: the fundamental dynamic multi-catchphrase situated look for (BDMRS) scheme in the known ciphertext illustrate, and the updated dynamic multikeyword situated look (EDMRS) plot in the known establishment show. Central indicates Due the phenomenal structure of our tree-based document, the proposed look design can adaptably achieve sub-coordinate chase time and deal with the deletion and expansion of reports We layout an open encryption plot that support both the exact multi-catchphrase situated look for and versatile dynamic assignment on file gathering. Due to the exceptional structure of our tree-based document, the request versatile nature of the proposed plot is for the most part kept to logarithmic. Additionally, essentially, the proposed plan can achieve higher request efficiency by executing our "Anxious Depth-first Search" count. Also, parallel request can be adaptably performed to moreover diminish the time cost of chase process.

IV. DESIGN GOALS

To engage secure, capable, exact and dynamic multi data under the above models, our system has the going with

Dynamic: The proposed scheme is planned to give not simply multi-watchword question and exact result situating, yet also remarkable

invigorate on file aggregations. Request

Efficiency: The arrangement intends to achieve sublinear look adequacy by researching an unprecedented tree-based record and a beneficial chase estimation.

A. Security ensuring: The arrangement is planned to shield the cloud server from taking in

additional information about the record

amassing, the rundown tree, and the inquiry. The specific assurance necessities are compacted as takes after,

B. Record Confidentiality and Query

Confidentiality: The essential plaintext

information, fusing catchphrases in the rundown and request, TF estimations of watchwords set away in the document, and IDF estimations of question watchwords, should be protected from cloud server;

C. Trapdoor Unlinkability: The cloud server should not have the ability to choose if two mixed request (trapdoors) are created from a comparable interest inquire;

D. Catchphrase Privacy: The cloud server couldn't perceive the specific watchword in request, document or file amassing by exploring the truthful information like term repeat. Note that our proposed plot isn't planned to secure access outline, i.e., the course of action of returned records.

(5)

balanced binary tree as the index, and

propose a “Greedy Depth-first Search”

algorithm to obtain better efficiency than

linear search. In addition, the parallel search

process can be carried out to further reduce

the time cost. The security of the scheme is

protected against two threat models by using

the secure kNN algorithm. Experimental

results demonstrate the efficiency of our

proposed scheme. There are still many

challenge problems in symmetric SE

schemes. In the proposed scheme, the data

owner is responsible for generating updating

information and sending them to the cloud

server. Thus, the data owner needs to store

the unencrypted index tree and the

information that are necessary to recalculate

the IDF values. Such an active data owner

may not be very suitable for the cloud

computing model. It could be a meaningful

but difficult future work to design a dynamic

searchable

encryption

scheme

whose

updating operation can be completed by

cloud server only, meanwhile reserving the

ability to support multi-keyword ranked

search. In addition, as the most of works

about searchable encryption, our scheme

mainly considers the challenge from the

cloud server. Actually, there are many

secure challenges in a multiuser scheme.

Firstly, all the users usually keep the same

secure key for trapdoor generation in a

symmetric SE scheme. In this case, the

revocation of the user is big challenge. If it

is needed to revoke a user in this scheme, we

need to rebuild the index and distribute the

new secure keys to all the authorized users.

Secondly, symmetric SE schemes usually

assume that all the data users are

trustworthy. It is not practical and a

dishonest data user will lead to many secure

problems. For example, a dishonest data

user may search the documents and

distribute the decrypted documents to the

unauthorized ones. Even more, a dishonest

data user may distribute his/her secure keys

to the unauthorized ones. In the future

works, we will try to improve the SE

scheme to handle these challenge problems.

REFERENCES

[1] K. Ren, C.Wang, Q.Wang et al.,

“Security challenges for the public cloud,”

IEEE Internet Computing, vol. 16, no. 1, pp.

69–73, 2012.

[2]

S.

Kamara

and

K.

Lauter,

“Cryptographic cloud storage,” in Financial

Cryptography and Data Security. Springer,

2010, pp. 136–149.

[3] C. Gentry, “A fully homomorphic

encryption scheme,” Ph.D. dissertation,

Stanford University, 2009.

[4] O. Goldreich and R. Ostrovsky,

“Software protection and simulation on

oblivious rams,” Journal of the ACM

(JACM), vol. 43, no. 3, pp. 431–473, 1996.

[5] D. Boneh, G. Di Crescenzo, R.

Ostrovsky, and G. Persiano, “Public key

encryption with keyword search,” in

Advances in CryptologyEurocrypt 2004.

Springer, 2004, pp. 506–522.

(6)

that allows pir queries,” in Advances in

Cryptology-CRYPTO 2007. Springer, 2007,

pp. 50–67.

[7] D. X. Song, D. Wagner, and A. Perrig,

“Practical techniques for searches on

encrypted data,” in Security and Privacy,

2000. S&P 2000. Proceedings. 2000 IEEE

Symposium on. IEEE, 2000,pp. 44– 55.

[8] E.-J. Goh et al., “Secure indexes.” IACR

Cryptology ePrint Archive, vol. 2003, p.

216, 2003.

[9] Y.-C. Chang and M. Mitzenmacher,

“Privacy preserving keyword searches on

remote encrypted data,” in Proceedings of

the Third international conference on

Applied

Cryptography

and

Network

Security. Springer-Verlag, 2005, pp. 442–

455.

[10] R. Curtmola, J. Garay, S. Kamara, and

R. Ostrovsky, “Searchable symmetric

encryption:

improved

definitions

and

efficient constructions,” in Proceedings of

the 13th ACM conference on Computer and

communications security. ACM, 2006, pp.

79–88.

[11] J. Li, Q. Wang, C. Wang, N. Cao, K.

Ren, and W. Lou, “Fuzzy keyword search

over encrypted data in cloud computing,” in

INFOCOM, 2010 Proceedings IEEE. IEEE,

2010, pp. 1–5.

References

Related documents

CUAJ ? Original Research Di Lena et al Mirabegron for IC/BPS Mirabegron as adjuvant treatment for patients with interstitial cystitis/bladder pain syndrome Michael Di Lena; Victoria

Original Article CLONINIG AND EXPRESSION OF BAB PATHOGENICITY ISLAND ANTIGENS FOR THE PRODUCTION OF VACCINE AGAINST HELICOBACTER PYLORI, THE RISK FACTOR FOR GASTRIC CANCER Indian

On 45° panel top face was punctured fully and core failure was observed shown in Fig6.At 30 J impact energy level the two peak loads were observed in the 45° stitched panel shown

The distribution-class dynamic voltage restorer (DVR) is a series connected power electronics device which can compensate for distribution system sags and swell [21].Dynamic

Accessing information is an essential factor in decision making processes occurring in different domains. Therefore, broadening the coverage of available information for

Second, the steady- state levels of two AAPs, Gap1 and Tat2, were higher in cells overexpressing SSH4 , RCR2 , and RCR1 , a finding that accounts for their ability to increase

To encourage the adoption of FPSDs, the objective of this research were to (1) propose an efficient, effective, and safe approach to test the compatibility