Cloud computing has become an integral part of IT
industry. As it becomes prevalent, more and more sensitive
information are being centralized in the cloud. A user stores his
files in a cloud, and retrieves them whenever he wants to use
them. The users search their documents through keyword in
plaintext. There is a cloud service provider (CSP), whose
purpose is to provide more and more security and privacy. To
keep user data confidential against an unfrosted CSP, an easy
way is to apply cryptographic approaches, by disclosing the data
decryption key only to authorized users. Thus the keyword
privacy is maintained. Although traditional searchable
encryption techniques allow users to securely search over
encrypted data through keywords, they support only Boolean
search and are not yet sufficient to meet the effective data
utilization need that is inherently demanded by large number of
users and huge amount of data files in cloud. In this paper, we
define and solve the problem of secure ranked keyword search
over encrypted cloud data.
Manoj Gadekar : completed his B.E. in Computer Science and
Engineering from Dr. B.A.M. University Aurangabad. Currently he is
perusing his master’s degree from same university. His research
interest lies in cloud computing and data mining.
Prof. S. N. Jaiswal : completed his BE (CSE) from Government
College of Engineering, Aurangabad (1991), M. E. (CSE) (2009)
from Walchand College of Engineering, Sangli. He has published 02
research papers in International Journals. His areas of interest are
Data Mining and Cloud Computing
Ranked keyword Search
Symmetric Encryption
algorithm
Rank based search
multiple string matching
relevance scoring
privacy preserving
cloud computing
We proposed the system to solve the problem of
supporting efficient ranked keyword search for achieving
effective utilization of remotely stored encrypted data in
Cloud Computing. We first give a basic scheme and show
that by following the same existing searchable encryption
framework, it is very inefficient to achieve ranked search.
We then appropriately weaken the security guarantee,
resort to the newly developed crypto AES algorithm. The
cloud setup consists of several virtual machines installed
on it. Virtualization concept is the base for implementing
cloud computing technology. Number of vm`s can be
deployed on the local host which completely depends on
base system configuration. On each VM different types of
server can be made to run. Data owner A selects any
plaintext file from virtual machine (vm1) system which is
to be uploaded on the cloud on another virtual machine
(vm2). File chosen by the user A is encrypted by using
AES encryption algorithm. The encrypted file is not
readable to a normal user since that file contains cipher
text in it. Authorized B user from local host can decrypt
file, can access a confidential data.
[1] C. Wang, N. Cao, K. Ren, and W. Lou, “Enabling
Secure and Efficient Ranked Keyword Search over
Outsourced Cloud Data”, Proc. IEEE, Parallel and
Distributed Systems, Aug. 2012.
[2] D. Song, D. Wagner, and A. Perrig.:“Practical
Techniques for Searches on Encrypted Data.” in Proc.
of IEEE Symposium on Security and Privacy? (2000).
[3] Y.-C. Chang and M. Mitzenmacher.: “Privacy
Preserving Keyword Searches on Remote Encrypted
Data.” in Proc. of ACNS?05 (2005). [4] Remya
Rajan.: “Efficient and Privacy Preserving Multi User
Keyword Search for Cloud Storage Services.”
International Journal of Advanced Technology And
Engineering Research (IJATER), ISSN 2250- 3536,
Vol 2,Issue 4 (2012).