Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Secure Outsourced Text Data over Cloud Environment  
  Authors : Manoj Gadekar; Sunilkumar Jaiswal
  Cite as:

 

Cloud computing has become an integral part of IT industry. As it becomes prevalent, more and more sensitive information are being centralized in the cloud. A user stores his files in a cloud, and retrieves them whenever he wants to use them. The users search their documents through keyword in plaintext. There is a cloud service provider (CSP), whose purpose is to provide more and more security and privacy. To keep user data confidential against an unfrosted CSP, an easy way is to apply cryptographic approaches, by disclosing the data decryption key only to authorized users. Thus the keyword privacy is maintained. Although traditional searchable encryption techniques allow users to securely search over encrypted data through keywords, they support only Boolean search and are not yet sufficient to meet the effective data utilization need that is inherently demanded by large number of users and huge amount of data files in cloud. In this paper, we define and solve the problem of secure ranked keyword search over encrypted cloud data.

 

Published In : IJCSN Journal Volume 3, Issue 6

Date of Publication : December 2014

Pages : 525 - 528

Figures : 01

Tables : --

Publication Link : Secure Outsourced Text Data over Cloud Environment

 

 

 

Manoj Gadekar : completed his B.E. in Computer Science and Engineering from Dr. B.A.M. University Aurangabad. Currently he is perusing his master’s degree from same university. His research interest lies in cloud computing and data mining.

Prof. S. N. Jaiswal : completed his BE (CSE) from Government College of Engineering, Aurangabad (1991), M. E. (CSE) (2009) from Walchand College of Engineering, Sangli. He has published 02 research papers in International Journals. His areas of interest are Data Mining and Cloud Computing

 

 

 

 

 

 

 

Ranked keyword Search

Symmetric Encryption algorithm

Rank based search

multiple string matching

relevance scoring

privacy preserving

cloud computing

We proposed the system to solve the problem of supporting efficient ranked keyword search for achieving effective utilization of remotely stored encrypted data in Cloud Computing. We first give a basic scheme and show that by following the same existing searchable encryption framework, it is very inefficient to achieve ranked search. We then appropriately weaken the security guarantee, resort to the newly developed crypto AES algorithm. The cloud setup consists of several virtual machines installed on it. Virtualization concept is the base for implementing cloud computing technology. Number of vm`s can be deployed on the local host which completely depends on base system configuration. On each VM different types of server can be made to run. Data owner A selects any plaintext file from virtual machine (vm1) system which is to be uploaded on the cloud on another virtual machine (vm2). File chosen by the user A is encrypted by using AES encryption algorithm. The encrypted file is not readable to a normal user since that file contains cipher text in it. Authorized B user from local host can decrypt file, can access a confidential data.

 

 

 

 

 

 

 

 

 

[1] C. Wang, N. Cao, K. Ren, and W. Lou, “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”, Proc. IEEE, Parallel and Distributed Systems, Aug. 2012. [2] D. Song, D. Wagner, and A. Perrig.:“Practical Techniques for Searches on Encrypted Data.” in Proc. of IEEE Symposium on Security and Privacy? (2000). [3] Y.-C. Chang and M. Mitzenmacher.: “Privacy Preserving Keyword Searches on Remote Encrypted Data.” in Proc. of ACNS?05 (2005). [4] Remya Rajan.: “Efficient and Privacy Preserving Multi User Keyword Search for Cloud Storage Services.” International Journal of Advanced Technology And Engineering Research (IJATER), ISSN 2250- 3536, Vol 2,Issue 4 (2012).