SlideShare a Scribd company logo
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER
ENCRYPTED CLOUD DATA
ABSTRACT
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud
Data Due to the increasing popularity of cloud computing, more and more data owners are
motivated to outsource their data to cloud servers for great convenience and reduced cost in data
management. However, sensitive data should be encrypted before outsourcing for privacy
requirements, which obsoletes data utilization like keyword-based document retrieval. In this
paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data,
which simultaneously supports dynamic update operations like deletion and insertion of
documents. Specifically, the vector space model and the widely-used TFIDF model are
combined in the index construction and query generation. We construct a special tree-based
index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-
keyword ranked search. The secure kNN algorithm is utilized to encrypt the index and query
vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and
query vectors. In order to resist statistical attacks, phantom terms are added to the index vector
for blinding search results . Due to the use of our special tree-based index structure, the proposed
scheme can achieve sub-linear search time and deal with the deletion and insertion of documents
flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed
scheme.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
EXISTING SYSTEM
The existing techniques on keyword-based information retrieval, which are widely used
on the plaintext data, cannot be directly applied on the encrypted data. Downloading all the data
from the cloud and decrypt locally is obviously impractical. All these multi keyword search
schemes retrieve search results based on the existence of keywords, which cannot provide
acceptable result ranking functionality. However, sensitive data should be encrypted before
outsourcing for privacy requirements, which obsoletes data utilization like keyword-based
document retrieval.
EXISTING SYSTEM ALGORITHMS
Specifically, the vector space model and the widely-used TFIDF model are combined in
the index construction and query generation.
PROPOSED SYSTEM
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud
Data We construct a special tree-based index structure and propose a “Greedy Depth-first
Search” algorithm to provide efficient multi-keyword ranked search. The proposed scheme can
achieve sub-linear search time and deal with the deletion and insertion of documents flexibly.
Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.
 Abundant works have been proposed under different threat models to achieve various
search functionality,
 Recently, some dynamic schemes have been proposed to support inserting and deleting
operations on document collection.
 This paper proposes a secure tree-based search scheme over the encrypted cloud data,
which supports multi keyword ranked search and dynamic operation on the document
collection.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
PROPOSED SYSTEM ALGORITHMS
 Algorithm to provide efficient multi-keyword ranked search .
 The secure kNN algorithm is utilized to encrypt the index and query vectors.
 Propose a “Greedy Depth-first Search” algorithm based on this index tree.
 Algorithm achieves better-than-linear search efficiency but results in precision
loss.
 The LSH algorithm is suitable for similar search but cannot provide exact
ranking.
 {I′s ; ci} ← GenUpdateInfo (SK; Ts; i; up type)) This algorithm generates the
update information {I′s ; ci} which will be sent to the cloud server.

ADVANTAGES
Despite of the various advantages of cloud services, outsourcing sensitive
information such as e-mails, personal health records, company finance data, government
documents, etc.
System Architecture
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
TREE-BASED INDEX WITH THE DOCUMENT COLLECTION
We construct a special keyword balanced binary tree as the index, and propose a
“Greedy Depth-first Search” algorithm to obtain better efficiency than linear search.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com

More Related Content

DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
A secure and dynamic multi
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOCX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...

What's hot (20)

PPT
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
A secure and dynamic multi keyword ranked
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
DOCX
Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
PPTX
Final 1st
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PDF
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
PDF
MongoDB .local Houston 2019: Best Practices for Working with IoT and Time-ser...
PDF
Efficient Privacy Preserving Clustering Based Multi Keyword Search
DOCX
DOCX
privacy preserving multi keyword ranked search over encrypted cloud data
PDF
MongoDB .local London 2019: Best Practices for Working with IoT and Time-seri...
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Privacy preserving multi-keyword ranked search over encrypted cloud data
Final 1st
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
MongoDB .local Houston 2019: Best Practices for Working with IoT and Time-ser...
Efficient Privacy Preserving Clustering Based Multi Keyword Search
privacy preserving multi keyword ranked search over encrypted cloud data
MongoDB .local London 2019: Best Practices for Working with IoT and Time-seri...
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Ad

Similar to A secure and dynamic multi keyword ranked search scheme over encrypted cloud data (20)

PDF
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
DOCX
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
DOCX
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
DOCX
A secure and dynamic multi keyword ranked
DOCX
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Clou...
PDF
IRJET- Data Mining - Secure Keyword Manager
PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
PDF
An efficeient privacy preserving ranked keyword search
PDF
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
PDF
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
PPT
2_PPT Multi Keyword Search in cloud data.ppt
PDF
2016 BE Final year Projects in chennai - 1 Crore Projects
PDF
Ijarcet vol-2-issue-3-881-883
PDF
Retrieving Secure Data from Cloud Using OTP
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
A secure and dynamic multi keyword ranked
Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Clou...
IRJET- Data Mining - Secure Keyword Manager
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
An efficeient privacy preserving ranked keyword search
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
2_PPT Multi Keyword Search in cloud data.ppt
2016 BE Final year Projects in chennai - 1 Crore Projects
Ijarcet vol-2-issue-3-881-883
Retrieving Secure Data from Cloud Using OTP
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
sap open course for s4hana steps from ECC to s4
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Big Data Technologies - Introduction.pptx
Encapsulation theory and applications.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
sap open course for s4hana steps from ECC to s4
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectral efficient network and resource selection model in 5G networks
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Programs and apps: productivity, graphics, security and other tools
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Big Data Technologies - Introduction.pptx

A secure and dynamic multi keyword ranked search scheme over encrypted cloud data

  • 1. A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA ABSTRACT A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TFIDF model are combined in the index construction and query generation. We construct a special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi- keyword ranked search. The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors. In order to resist statistical attacks, phantom terms are added to the index vector for blinding search results . Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
  • 2. EXISTING SYSTEM The existing techniques on keyword-based information retrieval, which are widely used on the plaintext data, cannot be directly applied on the encrypted data. Downloading all the data from the cloud and decrypt locally is obviously impractical. All these multi keyword search schemes retrieve search results based on the existence of keywords, which cannot provide acceptable result ranking functionality. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data utilization like keyword-based document retrieval. EXISTING SYSTEM ALGORITHMS Specifically, the vector space model and the widely-used TFIDF model are combined in the index construction and query generation. PROPOSED SYSTEM A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data We construct a special tree-based index structure and propose a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search. The proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.  Abundant works have been proposed under different threat models to achieve various search functionality,  Recently, some dynamic schemes have been proposed to support inserting and deleting operations on document collection.  This paper proposes a secure tree-based search scheme over the encrypted cloud data, which supports multi keyword ranked search and dynamic operation on the document collection. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
  • 3. PROPOSED SYSTEM ALGORITHMS  Algorithm to provide efficient multi-keyword ranked search .  The secure kNN algorithm is utilized to encrypt the index and query vectors.  Propose a “Greedy Depth-first Search” algorithm based on this index tree.  Algorithm achieves better-than-linear search efficiency but results in precision loss.  The LSH algorithm is suitable for similar search but cannot provide exact ranking.  {I′s ; ci} ← GenUpdateInfo (SK; Ts; i; up type)) This algorithm generates the update information {I′s ; ci} which will be sent to the cloud server.  ADVANTAGES Despite of the various advantages of cloud services, outsourcing sensitive information such as e-mails, personal health records, company finance data, government documents, etc. System Architecture #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
  • 4. TREE-BASED INDEX WITH THE DOCUMENT COLLECTION We construct a special keyword balanced binary tree as the index, and propose a “Greedy Depth-first Search” algorithm to obtain better efficiency than linear search. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com