International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2276
Providing High Securtiy for Encrypted data in cloud
Aswin kumar S1, Kirubakaran A2, Mothish A3, Venkatesan V4, Anitha M5
1,2,3,4UG Scholar, Department of Computer Science Engineering, Kingston Engineering College, Tamilnadu, India.
5Assistant Professor, Dept. of Computer Science & Engineering, Kingston Engineering college, Tamilnadu , India.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Secure pursuit strategies over encoded cloud
information enable an approved client to inquiry information
documents of enthusiasm by submitting scrambled question
catchphrases to the cloud server in a protection safeguarding
way. The practically speaking, the returned question results
might be mistaken or deficient in the exploitative cloud
condition. we outline a protected, effectively incorporated, and
fine-grained question comes about confirmation instrument,
by which, given an encoded inquiry comes about set, the
question client not exclusively can check the rightnessofevery
information record in the set yet in addition can additionally
check what number of or which qualified information
documents are not returned if the set is inadequate before
unscrambling. The check plot is free coupling to concrete
secure inquiry procedures and can be effectively coordinated
into any safe question conspire. We accomplish the objective
by building secure check question for scrambled cloud
information. Topography can exacerbate the effects of
pollutants, trapping them inside a limited area or making it
easy for pollutants to settle instead of being swept away by
winds. Load balancing in the cloud computing environment
has an important impact on the performance.
Key Words: Cloud computing, Trapdoor key, Decryption,
AES Algorithm, Object verification.
1. INTRODUCTION
Cloud computing means storing the data, and
accessing the data in remote. When you upload the files in
cloud, you will be able to access or downloadthefileanytime
and anywhere and from any device. An example of a cloud
computing provider is Google’s Gmail and Drive.
By using the concept ofcloud computingthisproject
includes some advanced level security by using the three
private keys. Data user, Data owner plays a major role. First
data owner wants to login/register, then they are allowed to
upload the files in the cloud and allows to verifies the data
users to give permission to access their files. Data user also
need to login/register, then only they are able to search or
request file that can be uploaded by the data owner. The
cloud can be verify the data owner. Once the data owner
verifies the data user, the three keys will be providedtodata
user the registered mail id. The three keys namely trapdoor
key, file decryption key, object verification key. By using
three keys only the data user can be able to accessthefilesin
the cloud. The files can be uploaded by the data user in the
cloud, it can be uploaded aftertheencryption. AESalgorithm
can be used to encrypt the file. That file can’tberead without
decrypting it. Third key called object verification key, this
key consists of two keys. The two key is mainly provided for
checking whether anyhacker/attackeraretriedtoaccessthe
data. If hackers try to overcome these process, one of the
object verification key will be automatically changed. By
seeing the changes in object verification key, data owner
have to know that the data can be tried to access by some
unauthorized person.
2. ANALYSIS OF PREVIOUS METHOD
Our understanding about previous method, it only
matter of public concern is how to guarantee the security of
data that is outsourced to a remote cloud server and breaks
away from the direct control of data owners. Encryption on
private data before outsourcing is an effective measure to
protect data confidentiality. However, encrypted data make
Effective data retrieval a very challenging task. First
introduced the concept of searchable encryption and
proposed a practical technique that allows users to search
over encrypted data through encrypted query keywords.
Later, many searchable encryption schemes were proposed
based on symmetric keyand public-keysettingtostrengthen
security and improve query efficiency with the growing
popularity of cloud computing, how to securely and
efficiently search over encrypted cloud data becomes a
research focus. Some approaches have been proposedbased
on traditional searchable encryption schemes.
In existing system, the cloud server may return
erroneous or incomplete query results once they behaves
dishonestly for illegal profits. A latent space with lower-
dimensionality while preserving important discriminative
features amongst users. To learn an effective latent
representation, we simultaneously incorporate prior
knowledge, such as temporality of wellness features and
heterogeneity of users. They first present the notations and
then formally define the problem of representation learning
of longitudinal data.
3. PROPOSED SYSTEM
A secure and fine-grained query results verification
scheme by constructing the verification object for encrypted
outsourced data files. When a query ends, the query results
set along with the corresponding verification object are
returned together, by which the query user can accurately
verify: 1) the correctness of each encrypted data file in the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2277
results set; 2) how many qualified data files are not returned
and 3) which qualified data files are not returned.
Furthermore,ourproposedverificationschemeislightweight
and loose-couplingtoconcretesecurequeryschemesandcan
be very easily equipped into any secure query scheme for
cloud computing.Justaspossiblytamperingordeletingquery
results, the dishonestcloud server may also tamper or forget
verification objects themselves to make the data user
impossible to perform verification operation. Specially, once
the cloud server knows that the query results verification
scheme is provided in the secure search system, this
information may leak query user’s privacy and expose some
useful contents about data files. More importantly, this
exposed information may become temptations of
misbehavior for the cloud server.
Fig-1 : Proposed diagram
4. MODULES
4.1. QUERY RESULTS VERIFICATION
The query result verification mechanism allowsthe
data user to verify the results. In this project, we designed a
safe, easy to integrate Fine-grained query results validation
mechanism, by giving a given query resultset,thequeryuser
can not only verify The correctness of each data file in the
collection can also be further checked if the collection does
not return how many or which qualified data files
4.2. OUTSOURCING ENCRYPTED FILE
Cloud computing is a model forenablingubiquitous,
convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., networks, servers,
storage, applications, and services that can be rapidly
provisioned and released with minimal management effort
or service provider interaction. The data owner will
outsource the encrypted file to the cloud server,
automatically three different keys will be generated for the
file.
We propose a secure, easily integrated, and fine-
grained query results verification scheme for secure search
over encrypted cloud data. Different from previous works,
our scheme can verify the correctness of each encrypted
query result or further accurately find out how many or
which qualified data files are returned by the dishonest
cloud server. A short signature technique is designed to
guarantee the authenticity of verification object itself.
Moreover, we design a secure verification object request
technique, by which the cloud server knows nothing about
which verification object is requested by the data user and
actually returned by the cloud server. Performance and
accuracy experiments demonstrate the validity and
efficiency of our proposed scheme.
4.3. VERIFICATION OBJECT CONSTRUCTION
To maximize reduce storage and communication
cost and achieve privacy guarantee of the verification
objects. Trapdoor key, verificationobjectkeyanddecryption
key is automatically constructed. The trapdoor key is
basically differentiate the data owner and hacker.
4.4. VERIFICATION OBJECT SIGNATURE AND
AUTHENTICATION:
When a query ends, the query results set and
corresponding verification object are together returned to
the query user, who verifies the correctness and
completeness of query results based on the verification
object. Our proposed query results verification scheme not
only allows the query user to easily verify the correctness of
each encrypted data file in the query results set, but also
enables the data user to efficiently perform completeness
verification before decrypting query results.
4.5. UNAUTHORIZED DATA ACCESS ALERT
Whenthecloudserverorunauthorizedpersongains
the access of the information or data which is stored by the
user. The data user will get alert whenever anyone try to
access the data or information. We can prevent from
accessing the user information or data by verifying the
verification object.
4.6. UNAUTHORIZED DATA ACCESS ALERT
Whenthecloudserverorunauthorizedpersongains
the access of the information or data which is stored by the
user. The data user will get alert whenever anyone try to
access the data or information. We can prevent from
accessing the user information or data by verifying the
verification object.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2278
5. Conclusion:
We propose a secure, easily integrated, and fine-
grained query results verification scheme for secure search
over encrypted cloud data. Different from previous works,
our scheme can verify the correctness of each encrypted
query result or further accurately find out how many or
which qualified data files are returned by the dishonest
cloud server. A short signature technique is designed to
guarantee the authenticity of verification object itself.
Moreover, we design a secure verification object request
technique, by which the cloud server knows nothing about
which verification object is requested by the data user and
actually returned by the cloud server. Performance and
accuracy experiments demonstrate the validity and
efficiency of our proposed scheme.
6. REFERENCES
[1] N. Park and D. J. Lilja, “Characterizing datasets for data
dedupli- cation in backup applications,” in Proc. IEEE Int.
Symp. Workload Characterization (IISWC), 2010, pp. 1–10.
[2] A. ODriscoll, J. Daugelaite, and R. D. Sleator, “Big data,
hadoop and cloud computing in genomics,” J. Biomed.
Inform., vol. 46, no. 5, pp. 774–781, 2013.
[3] P. C. Zikopoulos, C. Eaton, D. DeRoos, T. Deutsch, and G.
Lapis, Understanding Big Data. New York,NY,USA:McGraw-
Hill, 2012.
[4] M. Dong, H. Li, K. Ota, and H. Zhu, “HVSTO: Efficient
privacy preserving hybrid storage in cloud data center,” in
Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM
WKSHPS), 2014, pp. 529–534.
[5] J. Li, Y. K. Li, X. Chen, P. P. Lee, and W. Lou, “A hybrid
cloud approach for secure authorized deduplication,” IEEE
Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206–1216,
May 2015.
[6] M. Dutch. (2008, Jun.). SNIA: Understanding Data De-
Duplication Ratios [Online]. Available:
http://www.snia.org/sites/default/files/
Understanding_Data_De-duplication_Ratios-20080718.pdf
[7] M. Dong, H. Li, K. Ota, L. T. Yang, and H. Zhu, “Multicloud-
based evacuation services for emergency management,”
IEEE Cloud Comput., vol. 1, no. 4, pp. 50–59, Nov. 2014.
[8] J. Long, A. Liu, M. Dong, and Z. Li, “An energy-efficientand
sink- location privacy enhanced scheme for WSNS through
ring based rout- ing,” J. Parallel Distrib. Comput., vol. 81, pp.
47–65, 2015.
[9] M. Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen,
“PaRQ: A privacy-preserving range query scheme over
encrypted metering data for smart grid,” IEEE Trans.
Emerging Topics Comput., vol. 1, no. 1, pp. 178–191, Jun.
2013.

More Related Content

PDF
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
PDF
Paper id 27201446
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
PDF
Enhanced Security Through Token
PDF
IRJET- Securing Cloud Data Under Key Exposure
PDF
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
PDF
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
PDF
IRJET - Virtual Data Auditing at Overcast Environment
Achieving Secure, Universal, and Fine Grainedquery Results Verification for S...
Paper id 27201446
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Enhanced Security Through Token
IRJET- Securing Cloud Data Under Key Exposure
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
IRJET- Accomplishing Secure, Widespread, and Fine-Grained Question Results Ch...
IRJET - Virtual Data Auditing at Overcast Environment

What's hot (20)

PDF
The Recent Trend: Vigorous unidentified validation access control system with...
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
PDF
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
PDF
J018145862
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
PDF
Cloud Auditing With Zero Knowledge Privacy
PDF
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
PDF
IJSRED-V2I5P16
DOCX
Public integrity auditing for shared dynamic cloud data with group user revoc...
PDF
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
PDF
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
DOCX
4.authentication and key agreement based on anonymous identity for peer to-pe...
PDF
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
Insuring Security for Outsourced Data Stored in Cloud Environment
PDF
A Survey on Assured deletion and Access Control
PDF
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
The Recent Trend: Vigorous unidentified validation access control system with...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
J018145862
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Cloud Auditing With Zero Knowledge Privacy
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
IJSRED-V2I5P16
Public integrity auditing for shared dynamic cloud data with group user revoc...
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
Two Aspect Validation Control Frameworks for Online Distributed Services
4.authentication and key agreement based on anonymous identity for peer to-pe...
Enabling Secure Data Sharing Scheme in the Cloud Storage Groups
International Journal of Engineering and Science Invention (IJESI)
Insuring Security for Outsourced Data Stored in Cloud Environment
A Survey on Assured deletion and Access Control
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Ad

Similar to IRJET - Providing High Securtiy for Encrypted Data in Cloud (20)

PDF
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
PDF
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
Enhanced security framework to ensure data security
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
PDF
Periodic Auditing of Data in Cloud Using Random Bits
PDF
Iaetsd storage privacy protection against data
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
Efficient and Empiric Keyword Search Using Cloud
PDF
Security Check in Cloud Computing through Third Party Auditor
PDF
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
PDF
J017236366
PDF
Secure Data Storage in Cloud Using Encryption and Steganography
PDF
Attribute-Based Data Sharing
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PDF
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
PDF
Privacy preserving public auditing for secure cloud storage
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Towards Achieving Efficient and Secure Way to Share the Data
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Enhanced security framework to ensure data security
Enhanced security framework to ensure data security in cloud using security b...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
Periodic Auditing of Data in Cloud Using Random Bits
Iaetsd storage privacy protection against data
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
Efficient and Empiric Keyword Search Using Cloud
Security Check in Cloud Computing through Third Party Auditor
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
J017236366
Secure Data Storage in Cloud Using Encryption and Steganography
Attribute-Based Data Sharing
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
Privacy preserving public auditing for secure cloud storage
International Journal of Engineering Research and Development (IJERD)
Towards Achieving Efficient and Secure Way to Share the Data
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPT
Total quality management ppt for engineering students
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
Design Guidelines and solutions for Plastics parts
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PPTX
introduction to high performance computing
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
Software Engineering and software moduleing
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPTX
Current and future trends in Computer Vision.pptx
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Total quality management ppt for engineering students
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Design Guidelines and solutions for Plastics parts
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
introduction to high performance computing
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
distributed database system" (DDBS) is often used to refer to both the distri...
Software Engineering and software moduleing
CyberSecurity Mobile and Wireless Devices
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Current and future trends in Computer Vision.pptx
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Fundamentals of safety and accident prevention -final (1).pptx
III.4.1.2_The_Space_Environment.p pdffdf
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS

IRJET - Providing High Securtiy for Encrypted Data in Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2276 Providing High Securtiy for Encrypted data in cloud Aswin kumar S1, Kirubakaran A2, Mothish A3, Venkatesan V4, Anitha M5 1,2,3,4UG Scholar, Department of Computer Science Engineering, Kingston Engineering College, Tamilnadu, India. 5Assistant Professor, Dept. of Computer Science & Engineering, Kingston Engineering college, Tamilnadu , India. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Secure pursuit strategies over encoded cloud information enable an approved client to inquiry information documents of enthusiasm by submitting scrambled question catchphrases to the cloud server in a protection safeguarding way. The practically speaking, the returned question results might be mistaken or deficient in the exploitative cloud condition. we outline a protected, effectively incorporated, and fine-grained question comes about confirmation instrument, by which, given an encoded inquiry comes about set, the question client not exclusively can check the rightnessofevery information record in the set yet in addition can additionally check what number of or which qualified information documents are not returned if the set is inadequate before unscrambling. The check plot is free coupling to concrete secure inquiry procedures and can be effectively coordinated into any safe question conspire. We accomplish the objective by building secure check question for scrambled cloud information. Topography can exacerbate the effects of pollutants, trapping them inside a limited area or making it easy for pollutants to settle instead of being swept away by winds. Load balancing in the cloud computing environment has an important impact on the performance. Key Words: Cloud computing, Trapdoor key, Decryption, AES Algorithm, Object verification. 1. INTRODUCTION Cloud computing means storing the data, and accessing the data in remote. When you upload the files in cloud, you will be able to access or downloadthefileanytime and anywhere and from any device. An example of a cloud computing provider is Google’s Gmail and Drive. By using the concept ofcloud computingthisproject includes some advanced level security by using the three private keys. Data user, Data owner plays a major role. First data owner wants to login/register, then they are allowed to upload the files in the cloud and allows to verifies the data users to give permission to access their files. Data user also need to login/register, then only they are able to search or request file that can be uploaded by the data owner. The cloud can be verify the data owner. Once the data owner verifies the data user, the three keys will be providedtodata user the registered mail id. The three keys namely trapdoor key, file decryption key, object verification key. By using three keys only the data user can be able to accessthefilesin the cloud. The files can be uploaded by the data user in the cloud, it can be uploaded aftertheencryption. AESalgorithm can be used to encrypt the file. That file can’tberead without decrypting it. Third key called object verification key, this key consists of two keys. The two key is mainly provided for checking whether anyhacker/attackeraretriedtoaccessthe data. If hackers try to overcome these process, one of the object verification key will be automatically changed. By seeing the changes in object verification key, data owner have to know that the data can be tried to access by some unauthorized person. 2. ANALYSIS OF PREVIOUS METHOD Our understanding about previous method, it only matter of public concern is how to guarantee the security of data that is outsourced to a remote cloud server and breaks away from the direct control of data owners. Encryption on private data before outsourcing is an effective measure to protect data confidentiality. However, encrypted data make Effective data retrieval a very challenging task. First introduced the concept of searchable encryption and proposed a practical technique that allows users to search over encrypted data through encrypted query keywords. Later, many searchable encryption schemes were proposed based on symmetric keyand public-keysettingtostrengthen security and improve query efficiency with the growing popularity of cloud computing, how to securely and efficiently search over encrypted cloud data becomes a research focus. Some approaches have been proposedbased on traditional searchable encryption schemes. In existing system, the cloud server may return erroneous or incomplete query results once they behaves dishonestly for illegal profits. A latent space with lower- dimensionality while preserving important discriminative features amongst users. To learn an effective latent representation, we simultaneously incorporate prior knowledge, such as temporality of wellness features and heterogeneity of users. They first present the notations and then formally define the problem of representation learning of longitudinal data. 3. PROPOSED SYSTEM A secure and fine-grained query results verification scheme by constructing the verification object for encrypted outsourced data files. When a query ends, the query results set along with the corresponding verification object are returned together, by which the query user can accurately verify: 1) the correctness of each encrypted data file in the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2277 results set; 2) how many qualified data files are not returned and 3) which qualified data files are not returned. Furthermore,ourproposedverificationschemeislightweight and loose-couplingtoconcretesecurequeryschemesandcan be very easily equipped into any secure query scheme for cloud computing.Justaspossiblytamperingordeletingquery results, the dishonestcloud server may also tamper or forget verification objects themselves to make the data user impossible to perform verification operation. Specially, once the cloud server knows that the query results verification scheme is provided in the secure search system, this information may leak query user’s privacy and expose some useful contents about data files. More importantly, this exposed information may become temptations of misbehavior for the cloud server. Fig-1 : Proposed diagram 4. MODULES 4.1. QUERY RESULTS VERIFICATION The query result verification mechanism allowsthe data user to verify the results. In this project, we designed a safe, easy to integrate Fine-grained query results validation mechanism, by giving a given query resultset,thequeryuser can not only verify The correctness of each data file in the collection can also be further checked if the collection does not return how many or which qualified data files 4.2. OUTSOURCING ENCRYPTED FILE Cloud computing is a model forenablingubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction. The data owner will outsource the encrypted file to the cloud server, automatically three different keys will be generated for the file. We propose a secure, easily integrated, and fine- grained query results verification scheme for secure search over encrypted cloud data. Different from previous works, our scheme can verify the correctness of each encrypted query result or further accurately find out how many or which qualified data files are returned by the dishonest cloud server. A short signature technique is designed to guarantee the authenticity of verification object itself. Moreover, we design a secure verification object request technique, by which the cloud server knows nothing about which verification object is requested by the data user and actually returned by the cloud server. Performance and accuracy experiments demonstrate the validity and efficiency of our proposed scheme. 4.3. VERIFICATION OBJECT CONSTRUCTION To maximize reduce storage and communication cost and achieve privacy guarantee of the verification objects. Trapdoor key, verificationobjectkeyanddecryption key is automatically constructed. The trapdoor key is basically differentiate the data owner and hacker. 4.4. VERIFICATION OBJECT SIGNATURE AND AUTHENTICATION: When a query ends, the query results set and corresponding verification object are together returned to the query user, who verifies the correctness and completeness of query results based on the verification object. Our proposed query results verification scheme not only allows the query user to easily verify the correctness of each encrypted data file in the query results set, but also enables the data user to efficiently perform completeness verification before decrypting query results. 4.5. UNAUTHORIZED DATA ACCESS ALERT Whenthecloudserverorunauthorizedpersongains the access of the information or data which is stored by the user. The data user will get alert whenever anyone try to access the data or information. We can prevent from accessing the user information or data by verifying the verification object. 4.6. UNAUTHORIZED DATA ACCESS ALERT Whenthecloudserverorunauthorizedpersongains the access of the information or data which is stored by the user. The data user will get alert whenever anyone try to access the data or information. We can prevent from accessing the user information or data by verifying the verification object.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2278 5. Conclusion: We propose a secure, easily integrated, and fine- grained query results verification scheme for secure search over encrypted cloud data. Different from previous works, our scheme can verify the correctness of each encrypted query result or further accurately find out how many or which qualified data files are returned by the dishonest cloud server. A short signature technique is designed to guarantee the authenticity of verification object itself. Moreover, we design a secure verification object request technique, by which the cloud server knows nothing about which verification object is requested by the data user and actually returned by the cloud server. Performance and accuracy experiments demonstrate the validity and efficiency of our proposed scheme. 6. REFERENCES [1] N. Park and D. J. Lilja, “Characterizing datasets for data dedupli- cation in backup applications,” in Proc. IEEE Int. Symp. Workload Characterization (IISWC), 2010, pp. 1–10. [2] A. ODriscoll, J. Daugelaite, and R. D. Sleator, “Big data, hadoop and cloud computing in genomics,” J. Biomed. Inform., vol. 46, no. 5, pp. 774–781, 2013. [3] P. C. Zikopoulos, C. Eaton, D. DeRoos, T. Deutsch, and G. Lapis, Understanding Big Data. New York,NY,USA:McGraw- Hill, 2012. [4] M. Dong, H. Li, K. Ota, and H. Zhu, “HVSTO: Efficient privacy preserving hybrid storage in cloud data center,” in Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), 2014, pp. 529–534. [5] J. Li, Y. K. Li, X. Chen, P. P. Lee, and W. Lou, “A hybrid cloud approach for secure authorized deduplication,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 5, pp. 1206–1216, May 2015. [6] M. Dutch. (2008, Jun.). SNIA: Understanding Data De- Duplication Ratios [Online]. Available: http://www.snia.org/sites/default/files/ Understanding_Data_De-duplication_Ratios-20080718.pdf [7] M. Dong, H. Li, K. Ota, L. T. Yang, and H. Zhu, “Multicloud- based evacuation services for emergency management,” IEEE Cloud Comput., vol. 1, no. 4, pp. 50–59, Nov. 2014. [8] J. Long, A. Liu, M. Dong, and Z. Li, “An energy-efficientand sink- location privacy enhanced scheme for WSNS through ring based rout- ing,” J. Parallel Distrib. Comput., vol. 81, pp. 47–65, 2015. [9] M. Wen, R. Lu, K. Zhang, J. Lei, X. Liang, and X. Shen, “PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid,” IEEE Trans. Emerging Topics Comput., vol. 1, no. 1, pp. 178–191, Jun. 2013.