SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 556
Privacy Preserving Keyword Search over Encrypted Data in the Cloud
D. VETRISELVI1, N.M. JAYASHRI2
1Assistant Professor Deptartment of Computer Science and Engineering Jeppiaar SRR Engineering College, Padur
Chennai, Tamil Nadu, INDIA
2B.E Department of Computer Science and Engineering Jeppiaar SRR Engineering College, Padur
Chennai, Tamil Nadu, INDIA
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Research in cloud computing is receiving tons of
attention from both academic and industrial worlds. Clouds
can provide several kind of services like applications (e.g.,
Google Apps, Microsoft online), infrastructures (e.g.,Amazon’s
EC2, Eucalyptus, Nimbus), and platforms to assist developers
write applications(e.g., Amazon’sS3, WindowsAzure). Muchof
the info stored in clouds is very sensitive, for instance , medical
records and social networks. Security and privacy are thus
vital issues in cloud computing. The user should authenticate
itself before beginning any transaction. It must be ensured
that the cloud doesn't tamper with the data that is out
sourced.In order to search in cloud, some requirements is
needed, search over encrypted data should support the
following three functions. In one hand, the searchable
encryption schemes support keyword search, and supply an
equivalent user experience as searching in Google search with
different keywords; single-keyword search is way from
satisfactory by only returning very limited and inaccurate
search results.,The search user would typically prefer cloud
servers to sort the returned search leads to a relevance-based
order ranked by the relevance of the search request to the
documents.
Key Words: EfficientRevocation,CiphertextPolicyAttribute
Based Encryption, Standard Model
1. INTRODUCTION
Mobile cloud computing has been detailed as a key enabling
technology to overcome the physical limit of mobile devices
towards scalable and flexible mobile services. In the mobile
cloud environment searchable encryption, which allows
precisely search over encrypted data, is a key technique to
maintain both the privacy andavailableofoutsourceddata in
cloud. On addressing the hardness , many research efforts
resolve to using the searchable symmetric encryption (SSE)
and searchable public-key encryption (SPE). By giving
thorough security analysis, we demonstrate that PSU are
able to do a high security level. Using extensive experiments
during a realworld mobile environment,weshowthatPUSis
more efficient compared with the prevailing proposals.
1.1 Proposed system
In Proposed system, PSU (personalized search)schemewith
efficient and secure updates we introduced an efficient and
reliable methodology for search over encrypted data.Here
the encrypted keyword search pre computes the resulting
hunt documents for the input query from users through
Natural language processing Techniquewhichiscarryout on
gateway (client side) on user fileupload.Hencethematching
documents which is pre compute the before arching the
encrypted cloud contents are retrieved from cloud. Here we
does not pull all the encrypted data’s from cloud for
searching, which is time consuming and inadequate. The
matching documents memory locations on mobile storage
are restore from the serializable objects whichisreservedin
the gateway. User can download the produced documents
after getting the keys from the group owner. Asymmetric
kind of encryption for key re-encryption and is more
assured.
2. TECHNOLOGIES USED
a) Cloud Computing
Cloud computing may be a sort of computing during which
dynamically scalable and sometimes virtualities resources
are provided as a service over the web .Users needn't have
knowledge of, skills in, or control over the technology
infrastructure within the "cloud" that supports them. The
concept generally conditions combinations of
infrastructureas a service (IaaS), platform as a service
(PaaS), software as a service (SaaS).Cloud computing
customers do notcommonly ownthephysical infrastructure.
serving as host to the software platform in question.Instead,
they avoid capital expenditure byrentingusagefroma third-
party provider.Cloud computing is a style of computing in
which dynamically scalable and often virtualized resources
are provided as a service over the web .Users needn't have
knowledge of, expertise in, or control over the technology
infrastructure in the"cloud"thatsupportsthem.Theconcept
generally incorporates combinations of infrastructure as a
service (IaaS) ,platform as a service (PaaS) ,software as a
service (SaaS).
b)JAVA
It is a Platform Independent. Java is an object-oriented
programming language matured initially by James Gosling
and colleagues at Sun Microsystems. The language, initially
called Oak (named after the oak trees outside Gosling's
office), was proposed to replaceC++,althoughthefeature set
better feature that of Objective C.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 557
Fig -1: WORKING OF JAVA
Windows NT System 8
Fig -2: JAVA
c) APACHE TOMCAT SERVER
Apache Tomcat is a web package developed at the Apache
Software Foundation. Tomcat appliance the servlet and the
JavaServer Pages (JSP) detail item particularization from
Sun Microsystems, providing an environment for Java code
to run in cooperation with a web server. It adds tools for
configuration and management but can also be construct by
editing configuration files that arenormallyXML -formatted.
Because Tomcat includes its own HTTP server privately,itis
also considered a standalone web server.
3. MODULES
The System is categorized into following modules:
1) Group creation
2) Text Mining process
3) Blind storage
4) Query search
1) GROUP CREATION: Data owner should be registered in
this environment and create a group. Data users also
registers and give request to group owner to add a group
user. Data owner accept the request from the user.
2) TEXT MINNING PROCESS: In this modulethedata owner
can upload the documents. Data owner can upload the files,
the content of file is to be separatedusingNLPtechniqueand
that words can get synonyms using Word Net tool.
3) BLIND STORAGE: The uploaded data’s are encrypted in
gateway after Natural languageProcessingisdoneandsaved
as index file. The owner can give access control and
authority to user while uploading the data.
4) QUERY SEARCH: Data user will try to haunt a query in
cloud server. The cloud servers plot reliefmapthekeywords
and search the related files.
Accept
request
Group
Creation
owner
Accept request
User User request
Group
owner
File
Upload
Natural
Language
Processing
technique
Word Net toolCreating Index
file
Owner Upload files Encryption
StorageBlocks Splitting
Stored in
blocks
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 558
4. Architecture Diagram
5. Conclusion
Hence we developed an efficient search in keyword through
updates which enable accurate, efficient and secure search
over encrypted data. Privacy is preserved for data in cloud
while storing in blind Storage, and also manage approach
control for each user.
6. Enhancement
 Multiple group creation, eachgroupishavingowner
and multiple users.
 Multimedia Search.
 To encrypt data using Asymmetric algorithm (RSA)
and key re-encryption.
 Using NLP technique and word net tool for text
mining process.
 Index file and Key generation on cloud.
REFERENCES
[1] Q. Shen, X. Liang, X. Shen, X. Lin, and H. Y. Luo, ‘‘Exploiting
geo-distributedcloudsfora E-healthmonitoringsystem with
minimum ser-vice delay and privacy preservation,’’ IEEE J.
Biomed. Health Informat., vol. 18, no. 2, pp. 430–439, Mar.
2014. VOLUME 6, NO. 1, MARCH 2018 107 IEEE
TRANSACTIONS ON EMERGINGTOPICS IN COMPUTINGLiet
al.: Personalized Search Over Encrypted Data With Efficient
and Secure Updates
[2] H. Liang, L. X. Cai, D. Huang, X. Shen, and D. Peng, ‘‘An
SMDP-based service model for interdomain resource
allocation in mobile cloud networks,’’ IEEE Trans. Veh.
Technol., vol. 61, no. 5, pp. 2222–2232, Jun. 2012.
[3] Y. Cai, F. Yu, and S. Bu, ‘‘Cloud computing meets mobile
wireless com-munications in next generation cellular
networks,’’ IEEE Netw., vol. 28,no. 6, pp. 54–59, Nov./Dec.
2014.
[4] D. Zeng, S. Guo, I. Stojmenovic, and S. Yu, ‘‘Stochastic
modeling and analysis of opportunistic computing in
intermittent mobile cloud,’’ in Proc. 8th IEEE Conf. Ind.
Electron. Appl. (ICIEA), Jun. 2013, pp. 1902–1907.
[5] S. Yu, R. Doss, W. Zhou, and S. Guo, ‘‘A general cloud
firewall framework with dynamic resource allocation,’’ in
Proc. ICC, Jun. 2013, pp. 1941–1945.
[6] F. R. Yu and V. Leung, Advances in Mobile Cloud
Computing Systems. Boca Raton, FL, USA: CRC Press, 2015.
Data
Owner
Upload files Encryption
Blind StorageSearch
Data
user

More Related Content

PDF
Secure retrieval of files using homomorphic encryption for cloud computing
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
Ijarcet vol-2-issue-3-951-956
PDF
IRJET- Multiple Keyword Search over Encrypted Cloud Data
PDF
Attribute-Based Data Sharing
DOCX
Secure distributed deduplication systems with improved reliability
PDF
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
PDF
Data Search in Cloud using the Encrypted Keywords
Secure retrieval of files using homomorphic encryption for cloud computing
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Ijarcet vol-2-issue-3-951-956
IRJET- Multiple Keyword Search over Encrypted Cloud Data
Attribute-Based Data Sharing
Secure distributed deduplication systems with improved reliability
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
Data Search in Cloud using the Encrypted Keywords

What's hot (20)

PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
PDF
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
PDF
Ijricit 01-006 a secluded approval on clould storage proceedings
PDF
Cloud Data Security using Elliptic Curve Cryptography
PDF
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
PDF
3 ijece 1 ed iqbal qc
PDF
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
PDF
H1803035056
PDF
Accessing secured data in cloud computing environment
PDF
Efficient Similarity Search Over Encrypted Data
PDF
Enabling efficient multi keyword ranked
PDF
Retrieving Secure Data from Cloud Using OTP
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
Ijariie1196
PDF
J018145862
PDF
Providing Secure Cloud for College Campus
PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
PDF
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Preserving Privacy Policy- Preserving public auditing for data in the cloud
Ijricit 01-006 a secluded approval on clould storage proceedings
Cloud Data Security using Elliptic Curve Cryptography
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
3 ijece 1 ed iqbal qc
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
H1803035056
Accessing secured data in cloud computing environment
Efficient Similarity Search Over Encrypted Data
Enabling efficient multi keyword ranked
Retrieving Secure Data from Cloud Using OTP
Secure Data Sharing In an Untrusted Cloud
Ijariie1196
J018145862
Providing Secure Cloud for College Campus
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Ad

Similar to IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud (20)

PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
PDF
Efficient and Empiric Keyword Search Using Cloud
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PDF
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
PDF
EPLQ:Efficient privacy preserving spatial range query for smart phones
PDF
Efficient Similarity Search over Encrypted Data
PDF
Efficient Privacy Preserving Clustering Based Multi Keyword Search
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PDF
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
PDF
Privacy preserving public auditing for secured cloud storage
PDF
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
PDF
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
PDF
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
PDF
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
PDF
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
PDF
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
PDF
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
PDF
IRJET - Multimedia Security on Cloud Computing using Cryptography
PDF
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
Efficient and Empiric Keyword Search Using Cloud
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
EPLQ:Efficient privacy preserving spatial range query for smart phones
Efficient Similarity Search over Encrypted Data
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
Privacy preserving public auditing for secured cloud storage
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET - Multimedia Security on Cloud Computing using Cryptography
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Feature types and data preprocessing steps
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
737-MAX_SRG.pdf student reference guides
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPTX
Management Information system : MIS-e-Business Systems.pptx
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
Feature types and data preprocessing steps
Abrasive, erosive and cavitation wear.pdf
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Categorization of Factors Affecting Classification Algorithms Selection
III.4.1.2_The_Space_Environment.p pdffdf
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Module 8- Technological and Communication Skills.pptx
737-MAX_SRG.pdf student reference guides
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Visual Aids for Exploratory Data Analysis.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Management Information system : MIS-e-Business Systems.pptx
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Fundamentals of Mechanical Engineering.pptx
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS

IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 556 Privacy Preserving Keyword Search over Encrypted Data in the Cloud D. VETRISELVI1, N.M. JAYASHRI2 1Assistant Professor Deptartment of Computer Science and Engineering Jeppiaar SRR Engineering College, Padur Chennai, Tamil Nadu, INDIA 2B.E Department of Computer Science and Engineering Jeppiaar SRR Engineering College, Padur Chennai, Tamil Nadu, INDIA ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Research in cloud computing is receiving tons of attention from both academic and industrial worlds. Clouds can provide several kind of services like applications (e.g., Google Apps, Microsoft online), infrastructures (e.g.,Amazon’s EC2, Eucalyptus, Nimbus), and platforms to assist developers write applications(e.g., Amazon’sS3, WindowsAzure). Muchof the info stored in clouds is very sensitive, for instance , medical records and social networks. Security and privacy are thus vital issues in cloud computing. The user should authenticate itself before beginning any transaction. It must be ensured that the cloud doesn't tamper with the data that is out sourced.In order to search in cloud, some requirements is needed, search over encrypted data should support the following three functions. In one hand, the searchable encryption schemes support keyword search, and supply an equivalent user experience as searching in Google search with different keywords; single-keyword search is way from satisfactory by only returning very limited and inaccurate search results.,The search user would typically prefer cloud servers to sort the returned search leads to a relevance-based order ranked by the relevance of the search request to the documents. Key Words: EfficientRevocation,CiphertextPolicyAttribute Based Encryption, Standard Model 1. INTRODUCTION Mobile cloud computing has been detailed as a key enabling technology to overcome the physical limit of mobile devices towards scalable and flexible mobile services. In the mobile cloud environment searchable encryption, which allows precisely search over encrypted data, is a key technique to maintain both the privacy andavailableofoutsourceddata in cloud. On addressing the hardness , many research efforts resolve to using the searchable symmetric encryption (SSE) and searchable public-key encryption (SPE). By giving thorough security analysis, we demonstrate that PSU are able to do a high security level. Using extensive experiments during a realworld mobile environment,weshowthatPUSis more efficient compared with the prevailing proposals. 1.1 Proposed system In Proposed system, PSU (personalized search)schemewith efficient and secure updates we introduced an efficient and reliable methodology for search over encrypted data.Here the encrypted keyword search pre computes the resulting hunt documents for the input query from users through Natural language processing Techniquewhichiscarryout on gateway (client side) on user fileupload.Hencethematching documents which is pre compute the before arching the encrypted cloud contents are retrieved from cloud. Here we does not pull all the encrypted data’s from cloud for searching, which is time consuming and inadequate. The matching documents memory locations on mobile storage are restore from the serializable objects whichisreservedin the gateway. User can download the produced documents after getting the keys from the group owner. Asymmetric kind of encryption for key re-encryption and is more assured. 2. TECHNOLOGIES USED a) Cloud Computing Cloud computing may be a sort of computing during which dynamically scalable and sometimes virtualities resources are provided as a service over the web .Users needn't have knowledge of, skills in, or control over the technology infrastructure within the "cloud" that supports them. The concept generally conditions combinations of infrastructureas a service (IaaS), platform as a service (PaaS), software as a service (SaaS).Cloud computing customers do notcommonly ownthephysical infrastructure. serving as host to the software platform in question.Instead, they avoid capital expenditure byrentingusagefroma third- party provider.Cloud computing is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the web .Users needn't have knowledge of, expertise in, or control over the technology infrastructure in the"cloud"thatsupportsthem.Theconcept generally incorporates combinations of infrastructure as a service (IaaS) ,platform as a service (PaaS) ,software as a service (SaaS). b)JAVA It is a Platform Independent. Java is an object-oriented programming language matured initially by James Gosling and colleagues at Sun Microsystems. The language, initially called Oak (named after the oak trees outside Gosling's office), was proposed to replaceC++,althoughthefeature set better feature that of Objective C.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 557 Fig -1: WORKING OF JAVA Windows NT System 8 Fig -2: JAVA c) APACHE TOMCAT SERVER Apache Tomcat is a web package developed at the Apache Software Foundation. Tomcat appliance the servlet and the JavaServer Pages (JSP) detail item particularization from Sun Microsystems, providing an environment for Java code to run in cooperation with a web server. It adds tools for configuration and management but can also be construct by editing configuration files that arenormallyXML -formatted. Because Tomcat includes its own HTTP server privately,itis also considered a standalone web server. 3. MODULES The System is categorized into following modules: 1) Group creation 2) Text Mining process 3) Blind storage 4) Query search 1) GROUP CREATION: Data owner should be registered in this environment and create a group. Data users also registers and give request to group owner to add a group user. Data owner accept the request from the user. 2) TEXT MINNING PROCESS: In this modulethedata owner can upload the documents. Data owner can upload the files, the content of file is to be separatedusingNLPtechniqueand that words can get synonyms using Word Net tool. 3) BLIND STORAGE: The uploaded data’s are encrypted in gateway after Natural languageProcessingisdoneandsaved as index file. The owner can give access control and authority to user while uploading the data. 4) QUERY SEARCH: Data user will try to haunt a query in cloud server. The cloud servers plot reliefmapthekeywords and search the related files. Accept request Group Creation owner Accept request User User request Group owner File Upload Natural Language Processing technique Word Net toolCreating Index file Owner Upload files Encryption StorageBlocks Splitting Stored in blocks
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 558 4. Architecture Diagram 5. Conclusion Hence we developed an efficient search in keyword through updates which enable accurate, efficient and secure search over encrypted data. Privacy is preserved for data in cloud while storing in blind Storage, and also manage approach control for each user. 6. Enhancement  Multiple group creation, eachgroupishavingowner and multiple users.  Multimedia Search.  To encrypt data using Asymmetric algorithm (RSA) and key re-encryption.  Using NLP technique and word net tool for text mining process.  Index file and Key generation on cloud. REFERENCES [1] Q. Shen, X. Liang, X. Shen, X. Lin, and H. Y. Luo, ‘‘Exploiting geo-distributedcloudsfora E-healthmonitoringsystem with minimum ser-vice delay and privacy preservation,’’ IEEE J. Biomed. Health Informat., vol. 18, no. 2, pp. 430–439, Mar. 2014. VOLUME 6, NO. 1, MARCH 2018 107 IEEE TRANSACTIONS ON EMERGINGTOPICS IN COMPUTINGLiet al.: Personalized Search Over Encrypted Data With Efficient and Secure Updates [2] H. Liang, L. X. Cai, D. Huang, X. Shen, and D. Peng, ‘‘An SMDP-based service model for interdomain resource allocation in mobile cloud networks,’’ IEEE Trans. Veh. Technol., vol. 61, no. 5, pp. 2222–2232, Jun. 2012. [3] Y. Cai, F. Yu, and S. Bu, ‘‘Cloud computing meets mobile wireless com-munications in next generation cellular networks,’’ IEEE Netw., vol. 28,no. 6, pp. 54–59, Nov./Dec. 2014. [4] D. Zeng, S. Guo, I. Stojmenovic, and S. Yu, ‘‘Stochastic modeling and analysis of opportunistic computing in intermittent mobile cloud,’’ in Proc. 8th IEEE Conf. Ind. Electron. Appl. (ICIEA), Jun. 2013, pp. 1902–1907. [5] S. Yu, R. Doss, W. Zhou, and S. Guo, ‘‘A general cloud firewall framework with dynamic resource allocation,’’ in Proc. ICC, Jun. 2013, pp. 1941–1945. [6] F. R. Yu and V. Leung, Advances in Mobile Cloud Computing Systems. Boca Raton, FL, USA: CRC Press, 2015. Data Owner Upload files Encryption Blind StorageSearch Data user