SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1028
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
1Amrapali S. Ahire, 2Shweta D. Dhokte, 3Prajakta J. Karpe, 4Sunil B. Palde,
5Prof. U. R. Patole
1,2,3,4 BE Students: Dept. of Computer Engineering, SVIT College, Chincholi, Nashik, Maharashtra, India
5 Professor: Dept. of Computer Engineering, SVIT College, Chincholi, Nashik, Maharashtra, India
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract - With increasing popularity of cloud computing,
the data owners outsource their sensitive data to cloud
servers for flexibility and reduced cost in data management.
To protect data privacy the sensitive data should be
encrypted by the data owner before outsourcing which
obsoletes data utilization like keyword-based document
retrieval. It is essential to develop an efficient and reliable
cipher text search techniques, so that data owners can easily
access and update cloud data. In this paper, we present a
secure multi-keyword ranked search scheme over encrypted
cloud data, which supports both multi-keyword ranked
search and dynamic update. We have used the vector space
model and the widely-used TF_IDF models are combined in
the index construction and query generation. To improve
search efficiency, we design tree based index structure
which supports insertion and deletion update well without
privacy leakage. To encrypt the indexes and query vectors
the secure KNN algorithm is used. To calculates relevance
score between encrypted index and query vectors our system
is efficient. Our scheme achieves optimal search efficiency.
Our scheme also reduces communication overhead. Hence
the analysis shows security and efficiency of our scheme.
Key Words: Cloud computing, Multi-keyword search,
data integrity, encrypted cloud data, searchable
encryption, dynamic update.
1. INTRODUCTION
Cloud computing is the use of computing resources that
are delivered as a service over a network. The name comes
from the common use of a cloud-shaped symbol as an
abstraction for the complex infrastructure it contains in
system diagrams. Cloud computing entrusts remote
services with user's data, software and computation. Cloud
computing enables access to shared pool configuration
system resources and higher-level services. These services
typically provide access to advanced software applications
and high-end networks of server computers. Cloud
computing has been considered as a new model of
enterprise IT infrastructure, which can organize huge
resource of computing, storage and applications, and
enable users to enjoy ubiquitous, convenient and on-
demand network access to a shared pool of configurable
computing resources with great efficiency and minimal
economic overhead. The cloud service providers (CSPs)
that keep the data for users they can access users’
sensitive information without authorization. To protect
the data confidentiality it is important to encrypt the data
before outsourcing. However, this will cause a huge cost in
terms of data usability.
1.1 Keyword Search Techniques
Searchable encryption (SE) schemes usually build an
encrypted searchable index based on the keyword within
the document set, by which its content is hidden to the
cloud server. Abundant works have been proposed under
different threat models to achieve various search
functionality, such as single keyword search, similarity
search, multi-keyword Boolean search, ranked search,
multi-keyword ranked search, etc.
1.2 Single Keyword Search
A single keyword searchable encryption schemes
usually builds an encrypted searchable index such that, it’s
content is hidden to the server, unless it is given
appropriate trapdoors generated via secret key(s).
However, it only supports single keyword search. Where
anyone with public key can write to the data stored on
server, but only authorized users with private key can
search. Single keyword search schemes uses encrypted
searchable index. These indexes content will be hidden to
the server. It is not comfortable enough to express
complex information needs is the major drawback of
single keyword search.
1.3 Multi-Keyword Search
Multi-keyword Boolean search allows the users to enter
multiple query keywords to request suitable documents.
These schemes retrieve search results based on the
existence of keywords and cannot provide acceptable
result ranking functionality. Multi-keyword search on
encrypted cloud data have been investigated in. It
provides security and efficient search by using two thread
models, cipher-text model and background model. A
secure k-Nearest Neighbor (k-NN) algorithm was
implemented in MRSE scheme. Efficient privacy-
preserving search over encrypted cloud data that utilizes
min hash functions to improve the precision rate. The
advantages of this scheme are multi keyword search in a
single query. The effective ranking capability based on
term frequency and inverse document frequency.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1029
2. PROPOSED SYSTEM
We construct a tree-based index structure that proposes a
“Greedy Depth-first Search” algorithm to provide efficient
multi-keyword ranked search result. The proposed
scheme achieves sub-linear search time. System also
supports the flexible deletion and insertion of documents.
Extensive experiments are conducted to demonstrate the
efficiency of the proposed scheme.
 The secure kNN algorithm is utilized to encrypt
the index and query vectors, and meanwhile
ensure accurate relevance score calculation
between encrypted index and query vectors.
 Abundant works have been proposed under
different threat models to achieve various search
functionality.
 To resist different attacks in different threat
models, we construct two secure search schemes:
the basic dynamic multi-keyword ranked search
scheme in the known cipher text model, and the
enhanced dynamic multi-keyword ranked search
scheme is known as background model.
3. SYSTEM ARCHITECTURE
Fig 1. System Architecture of Multi keyword Ranked
Search Scheme
3.1 DESCRIPTION OF A SYSTEM
To enable secure, efficient, accurate and dynamic
multi data our system has the following
 Multi keyword ranked search: To design a
search scheme over encrypted cloud data, which
is not only capable of effective multi-keyword
search, but also, with the use of vector space
model, supports search result similarity ranking.
 Dynamic: The proposed scheme is designed to
provide not only multi-keyword query and
accurate result ranking, but also dynamic update
on document collections.
 Search Efficiency: The scheme aims to achieve
sub linear search efficiency by exploring a special
tree-based index and an efficient search
algorithm.
 A. Privacy-preserving: The proposed scheme is
designed to prevent the document collection,
index trees and query vectors.
 B. Keyword Privacy: The proposed system
ensures the privacy of keyword. The cloud server
could not identify the specific keyword in query,
or document collection by analyzing the statistical
information like term frequency. Note that our
proposed scheme is not designed to protect
access pattern, i.e., the sequence of returned
documents.
4. IMPLEMENTATION
This project uses following modules:
Data Owner: This module helps the owner to register
their details and this also includes login details. This
module helps the owner to upload his file with encryption
using RSA algorithm. This ensures the files to be protected
from unauthorized user. Data owner has a collection of
documents F ={f1; f2; :::; fn} that he wants to outsource to
the cloud server in encrypted form. The data owner the
securely distributes the key information of trapdoor
generation and document decryption to the authorized
data users. Data owners would define the access policy
and compute the authorization cipher text for each
document.
Data User: Users are authorized ones to access the
documents of data owner. With t query keywords, the
authorized user can generate a trapdoor TD according to
search control mechanisms to fetch k encrypted
documents from cloud server. Then, the data user can
decrypt the documents with the shared secret key.
Cloud server: This module is used to help the server to
encrypt the document using RSA Algorithm and to convert
the encrypted document to the Zip file with activation
code and then activation code send to the user for
download the files. Cloud server stores the encrypted
document collection C and encrypted searchable tree
index. After receiving the trapdoor TD from the data user,
the cloud server executes search over the index tree I,
returns the corresponding collection of top-k ranked
encrypted documents. The server needs to update the
index I and document collection C according to the
received information.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1030
5. CONCLUSIONS
In this paper, a secure, efficient and dynamic search
scheme is proposed, which supports not only the accurate
multi-keyword ranked search but also the dynamic
deletion and insertion of documents. binary tree as the
index that proposes a “Greedy Depth-first Search”
algorithm to obtain better efficiency than linear search.
For efficiency aspect, we propose a tree based index
structure. The tree based searchable designed in our
scheme can support dynamic update well, only accessing
portion of the index tree. The security of the system is
ensured with two threat models by using the secure KNN
algorithm. Extensive experiments show that the proposal
can achieve better efficiency in terms of functionalities and
computational overhead compared with the existing ones.
6. ACKNOWLEDGEMENT
We take this opportunity to express our hearty thanks to
all those who helped us in the completion of the paper. We
express our deep sense of gratitude to our guide Prof. U. R.
Patole, Asst. Prof., Computer Engineering Department, Sir
Visvesvaraya Institute of Technology, Chincholi for his
guidance and continuous motivation. We gratefully
acknowledge the help provided by him on many occasions,
for improvement of this project report with great interest.
We would be failing in our duties, if we do not express our
deep sense of gratitude to Prof. K. N. Shedge, Head,
Computer Engineering Department for permitting us to
avail the facility and constant encouragement. Lastly we
would like to thank all the staff members, colleagues, and
all our friends for their help and support from time to
time.
REFERENCES
[1] D. Liu, H. Li, Y. Yang, and H. Yang, “Achieving multi-
authority access control with efficient attribute revocation
in smart grid,” in Proceedings of ICC, 2014, pp. 634–639.
[2] Q. Zheng, S. Xu, and G. Ateniese, “Vabks: Verifiable
attribute-based keyword search over outsourced
encrypted data,” in Proceedings of INFOCOM. IEEE, 2014
[3] C. Wang, N. Cao, J. Li, K. Ren, and W. J. Lou, ”Secure
Ranked Keyword Search over Encrypted Cloud Data,” in
30th International Conference on Distributed Computing
Systems, Genova, Italy, pp. 253-262, 2010.
[4] S. Kamara and K. Lauter, Cryptographic cloud storage,
in Financial Cryptography and Data Security. Springer,
2010, pp. 136149.
[5] Wang, Cong, Ning Cao, Kui Ren, and Wenjing Lou.
”Enabling secure and efficient ranked keyword search
over outsourced cloud data,” IEEE Transactions on parallel
and distributed systems 23, no. 8 (2012): 1467-1479.
[6] S. Kamara and K. Lauter, “Cryptographic cloud
storage,” in Financial Cryptography and Data Security.
Springer, 2010, pp. 136–149.
[7] K. Ren, C.Wang, Q.Wang et al., “Security challenges for
the public cloud,” IEEE Internet Computing, vol. 16, no. 1,
pp. 69–73, 2012.
[8] H. Li, Y. Yang, M. Wen, H. Luo, and R. Lu, “Emrq: An
efficient multi-keyword range query scheme in smart grid
auction market.” KSII Transactions on Internet and
Information Systems, vol. 8, no. 11, pp.3937–3954, 2014.
[9] H. Li, D. Liu, Y. Dai, T. H. Luan, and X. S. Shen, “Enabling
efficient multi-keyword ranked search over encrypted
cloud data through blind storage,” IEEE Transactions on
Emerging Topics in Computing,
2014,DOI:10.1109/TETC.2014.2371239.
[10] Handa, R. and Challa, R.K., “A cluster based multi-
keyword search on outsourced encrypted cloud data ,”
International Conference on Computing for Sustainable
Global Development (INDIACom), pp. 115-120, 2015.
[11] C, Orencik and E. Savas, “An efficient privacy-
preserving multi-keyword search over encrypted cloud
data with ranking,”, Springer Distributed and Parallel
Databases, pp. 119–160, 2014.
[12] Pasupuleti Syam Kumar, Subramanian Ramalingam,
and Rajkumar Buyya. ”An efficient and secure privacy-
preserving approach for outsourced data of resource
constrained mobile devices in cloud computing.” Journal of
Network and Computer Applications 64 (2016): 12-22.
[13] Sun, Wenhai, Bing Wang, Ning Cao, Ming Li, Wenjing
Lou, Y. Thomas Hou, and Hui Li. ”Verifiable privacy-
preserving multi-keyword text search in the cloud
supporting similarity-based ranking.” IEEE Transactions
on Parallel and Distributed Systems 25, no. 11 (2014):
3025-3035.

More Related Content

PDF
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
DOCX
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
PDF
Efficient Privacy Preserving Clustering Based Multi Keyword Search
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
PDF
Retrieving Secure Data from Cloud Using OTP
PDF
Data Search in Cloud using the Encrypted Keywords
PDF
Paper id 28201425
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Efficient Privacy Preserving Clustering Based Multi Keyword Search
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
Retrieving Secure Data from Cloud Using OTP
Data Search in Cloud using the Encrypted Keywords
Paper id 28201425

What's hot (20)

PDF
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PPTX
Final 1st
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
PDF
Enabling efficient multi keyword ranked
DOCX
Enabling secure and efficient ranked keyword
PDF
Efficient Similarity Search Over Encrypted Data
PDF
J017547478
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
IRJET- Privacy Preserving Keyword Search over Cloud Data
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
PDF
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
PDF
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
PDF
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
PDF
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
PDF
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Final 1st
Privacy preserving multi-keyword ranked search over encrypted cloud data
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...
Enabling efficient multi keyword ranked
Enabling secure and efficient ranked keyword
Efficient Similarity Search Over Encrypted Data
J017547478
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
IRJET- Privacy Preserving Keyword Search over Cloud Data
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Ad

Similar to Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme (20)

DOCX
A secure and dynamic multi keyword ranked
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
A secure and dynamic multi
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
DOCX
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
DOCX
A secure and dynamic multi keyword ranked
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
PDF
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
PDF
IRJET- Multiple Keyword Search over Encrypted Cloud Data
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
PDF
An efficeient privacy preserving ranked keyword search
PDF
Efficient and Empiric Keyword Search Using Cloud
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
DOCX
Enabling fine grained multi-keyword search
PDF
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
IRJET- Multiple Keyword Search over Encrypted Cloud Data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
An efficeient privacy preserving ranked keyword search
Efficient and Empiric Keyword Search Using Cloud
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
Enabling fine grained multi-keyword search
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Welding lecture in detail for understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
PPT on Performance Review to get promotions
PPTX
web development for engineering and engineering
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Lecture Notes Electrical Wiring System Components
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Digital Logic Computer Design lecture notes
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Foundation to blockchain - A guide to Blockchain Tech
Automation-in-Manufacturing-Chapter-Introduction.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
bas. eng. economics group 4 presentation 1.pptx
Welding lecture in detail for understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPT on Performance Review to get promotions
web development for engineering and engineering
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Lecture Notes Electrical Wiring System Components
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Digital Logic Computer Design lecture notes

Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1028 Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme 1Amrapali S. Ahire, 2Shweta D. Dhokte, 3Prajakta J. Karpe, 4Sunil B. Palde, 5Prof. U. R. Patole 1,2,3,4 BE Students: Dept. of Computer Engineering, SVIT College, Chincholi, Nashik, Maharashtra, India 5 Professor: Dept. of Computer Engineering, SVIT College, Chincholi, Nashik, Maharashtra, India ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract - With increasing popularity of cloud computing, the data owners outsource their sensitive data to cloud servers for flexibility and reduced cost in data management. To protect data privacy the sensitive data should be encrypted by the data owner before outsourcing which obsoletes data utilization like keyword-based document retrieval. It is essential to develop an efficient and reliable cipher text search techniques, so that data owners can easily access and update cloud data. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which supports both multi-keyword ranked search and dynamic update. We have used the vector space model and the widely-used TF_IDF models are combined in the index construction and query generation. To improve search efficiency, we design tree based index structure which supports insertion and deletion update well without privacy leakage. To encrypt the indexes and query vectors the secure KNN algorithm is used. To calculates relevance score between encrypted index and query vectors our system is efficient. Our scheme achieves optimal search efficiency. Our scheme also reduces communication overhead. Hence the analysis shows security and efficiency of our scheme. Key Words: Cloud computing, Multi-keyword search, data integrity, encrypted cloud data, searchable encryption, dynamic update. 1. INTRODUCTION Cloud computing is the use of computing resources that are delivered as a service over a network. The name comes from the common use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with user's data, software and computation. Cloud computing enables access to shared pool configuration system resources and higher-level services. These services typically provide access to advanced software applications and high-end networks of server computers. Cloud computing has been considered as a new model of enterprise IT infrastructure, which can organize huge resource of computing, storage and applications, and enable users to enjoy ubiquitous, convenient and on- demand network access to a shared pool of configurable computing resources with great efficiency and minimal economic overhead. The cloud service providers (CSPs) that keep the data for users they can access users’ sensitive information without authorization. To protect the data confidentiality it is important to encrypt the data before outsourcing. However, this will cause a huge cost in terms of data usability. 1.1 Keyword Search Techniques Searchable encryption (SE) schemes usually build an encrypted searchable index based on the keyword within the document set, by which its content is hidden to the cloud server. Abundant works have been proposed under different threat models to achieve various search functionality, such as single keyword search, similarity search, multi-keyword Boolean search, ranked search, multi-keyword ranked search, etc. 1.2 Single Keyword Search A single keyword searchable encryption schemes usually builds an encrypted searchable index such that, it’s content is hidden to the server, unless it is given appropriate trapdoors generated via secret key(s). However, it only supports single keyword search. Where anyone with public key can write to the data stored on server, but only authorized users with private key can search. Single keyword search schemes uses encrypted searchable index. These indexes content will be hidden to the server. It is not comfortable enough to express complex information needs is the major drawback of single keyword search. 1.3 Multi-Keyword Search Multi-keyword Boolean search allows the users to enter multiple query keywords to request suitable documents. These schemes retrieve search results based on the existence of keywords and cannot provide acceptable result ranking functionality. Multi-keyword search on encrypted cloud data have been investigated in. It provides security and efficient search by using two thread models, cipher-text model and background model. A secure k-Nearest Neighbor (k-NN) algorithm was implemented in MRSE scheme. Efficient privacy- preserving search over encrypted cloud data that utilizes min hash functions to improve the precision rate. The advantages of this scheme are multi keyword search in a single query. The effective ranking capability based on term frequency and inverse document frequency.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1029 2. PROPOSED SYSTEM We construct a tree-based index structure that proposes a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search result. The proposed scheme achieves sub-linear search time. System also supports the flexible deletion and insertion of documents. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.  The secure kNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure accurate relevance score calculation between encrypted index and query vectors.  Abundant works have been proposed under different threat models to achieve various search functionality.  To resist different attacks in different threat models, we construct two secure search schemes: the basic dynamic multi-keyword ranked search scheme in the known cipher text model, and the enhanced dynamic multi-keyword ranked search scheme is known as background model. 3. SYSTEM ARCHITECTURE Fig 1. System Architecture of Multi keyword Ranked Search Scheme 3.1 DESCRIPTION OF A SYSTEM To enable secure, efficient, accurate and dynamic multi data our system has the following  Multi keyword ranked search: To design a search scheme over encrypted cloud data, which is not only capable of effective multi-keyword search, but also, with the use of vector space model, supports search result similarity ranking.  Dynamic: The proposed scheme is designed to provide not only multi-keyword query and accurate result ranking, but also dynamic update on document collections.  Search Efficiency: The scheme aims to achieve sub linear search efficiency by exploring a special tree-based index and an efficient search algorithm.  A. Privacy-preserving: The proposed scheme is designed to prevent the document collection, index trees and query vectors.  B. Keyword Privacy: The proposed system ensures the privacy of keyword. The cloud server could not identify the specific keyword in query, or document collection by analyzing the statistical information like term frequency. Note that our proposed scheme is not designed to protect access pattern, i.e., the sequence of returned documents. 4. IMPLEMENTATION This project uses following modules: Data Owner: This module helps the owner to register their details and this also includes login details. This module helps the owner to upload his file with encryption using RSA algorithm. This ensures the files to be protected from unauthorized user. Data owner has a collection of documents F ={f1; f2; :::; fn} that he wants to outsource to the cloud server in encrypted form. The data owner the securely distributes the key information of trapdoor generation and document decryption to the authorized data users. Data owners would define the access policy and compute the authorization cipher text for each document. Data User: Users are authorized ones to access the documents of data owner. With t query keywords, the authorized user can generate a trapdoor TD according to search control mechanisms to fetch k encrypted documents from cloud server. Then, the data user can decrypt the documents with the shared secret key. Cloud server: This module is used to help the server to encrypt the document using RSA Algorithm and to convert the encrypted document to the Zip file with activation code and then activation code send to the user for download the files. Cloud server stores the encrypted document collection C and encrypted searchable tree index. After receiving the trapdoor TD from the data user, the cloud server executes search over the index tree I, returns the corresponding collection of top-k ranked encrypted documents. The server needs to update the index I and document collection C according to the received information.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 01 | Jan-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1030 5. CONCLUSIONS In this paper, a secure, efficient and dynamic search scheme is proposed, which supports not only the accurate multi-keyword ranked search but also the dynamic deletion and insertion of documents. binary tree as the index that proposes a “Greedy Depth-first Search” algorithm to obtain better efficiency than linear search. For efficiency aspect, we propose a tree based index structure. The tree based searchable designed in our scheme can support dynamic update well, only accessing portion of the index tree. The security of the system is ensured with two threat models by using the secure KNN algorithm. Extensive experiments show that the proposal can achieve better efficiency in terms of functionalities and computational overhead compared with the existing ones. 6. ACKNOWLEDGEMENT We take this opportunity to express our hearty thanks to all those who helped us in the completion of the paper. We express our deep sense of gratitude to our guide Prof. U. R. Patole, Asst. Prof., Computer Engineering Department, Sir Visvesvaraya Institute of Technology, Chincholi for his guidance and continuous motivation. We gratefully acknowledge the help provided by him on many occasions, for improvement of this project report with great interest. We would be failing in our duties, if we do not express our deep sense of gratitude to Prof. K. N. Shedge, Head, Computer Engineering Department for permitting us to avail the facility and constant encouragement. Lastly we would like to thank all the staff members, colleagues, and all our friends for their help and support from time to time. REFERENCES [1] D. Liu, H. Li, Y. Yang, and H. Yang, “Achieving multi- authority access control with efficient attribute revocation in smart grid,” in Proceedings of ICC, 2014, pp. 634–639. [2] Q. Zheng, S. Xu, and G. Ateniese, “Vabks: Verifiable attribute-based keyword search over outsourced encrypted data,” in Proceedings of INFOCOM. IEEE, 2014 [3] C. Wang, N. Cao, J. Li, K. Ren, and W. J. Lou, ”Secure Ranked Keyword Search over Encrypted Cloud Data,” in 30th International Conference on Distributed Computing Systems, Genova, Italy, pp. 253-262, 2010. [4] S. Kamara and K. Lauter, Cryptographic cloud storage, in Financial Cryptography and Data Security. Springer, 2010, pp. 136149. [5] Wang, Cong, Ning Cao, Kui Ren, and Wenjing Lou. ”Enabling secure and efficient ranked keyword search over outsourced cloud data,” IEEE Transactions on parallel and distributed systems 23, no. 8 (2012): 1467-1479. [6] S. Kamara and K. Lauter, “Cryptographic cloud storage,” in Financial Cryptography and Data Security. Springer, 2010, pp. 136–149. [7] K. Ren, C.Wang, Q.Wang et al., “Security challenges for the public cloud,” IEEE Internet Computing, vol. 16, no. 1, pp. 69–73, 2012. [8] H. Li, Y. Yang, M. Wen, H. Luo, and R. Lu, “Emrq: An efficient multi-keyword range query scheme in smart grid auction market.” KSII Transactions on Internet and Information Systems, vol. 8, no. 11, pp.3937–3954, 2014. [9] H. Li, D. Liu, Y. Dai, T. H. Luan, and X. S. Shen, “Enabling efficient multi-keyword ranked search over encrypted cloud data through blind storage,” IEEE Transactions on Emerging Topics in Computing, 2014,DOI:10.1109/TETC.2014.2371239. [10] Handa, R. and Challa, R.K., “A cluster based multi- keyword search on outsourced encrypted cloud data ,” International Conference on Computing for Sustainable Global Development (INDIACom), pp. 115-120, 2015. [11] C, Orencik and E. Savas, “An efficient privacy- preserving multi-keyword search over encrypted cloud data with ranking,”, Springer Distributed and Parallel Databases, pp. 119–160, 2014. [12] Pasupuleti Syam Kumar, Subramanian Ramalingam, and Rajkumar Buyya. ”An efficient and secure privacy- preserving approach for outsourced data of resource constrained mobile devices in cloud computing.” Journal of Network and Computer Applications 64 (2016): 12-22. [13] Sun, Wenhai, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, and Hui Li. ”Verifiable privacy- preserving multi-keyword text search in the cloud supporting similarity-based ranking.” IEEE Transactions on Parallel and Distributed Systems 25, no. 11 (2014): 3025-3035.