SlideShare a Scribd company logo
Towards Secure Multi-Keyword Top-k Retrieval over
Encrypted Cloud Data
ABSTRACT:
Cloud computing has emerging as a promising pattern for data outsourcing and
high quality data services. However, concerns of sensitive information on cloud
potentially cause privacy problems. Data encryption protects data security to some
extent, but at the cost of compromised efficiency. Searchable symmetric
encryption (SSE) allows retrieval of encrypted data over cloud. In this paper, we
focus on addressing data privacy issues using searchable symmetric encryption
(SSE). For the first time, we formulate the privacy issue from the aspect of
similarity relevance and scheme robustness. We observe that server-side ranking
based on order-preserving encryption (OPE) inevitably leaks data privacy. To
eliminate the leakage, we propose a two-round searchable encryption (TRSE)
scheme that supports top-k multi-keyword retrieval. In TRSE, we employ a vector
space model and homomorphic encryption. The vector space model helps to
provide sufficient search accuracy, and the homomorphic encryption enables users
to involve in the ranking while the majority of computing work is done on the
server side by operations only on ciphertext. As a result, information leakage can
be eliminated and data security is ensured. Thorough security and performance
analysis show that the proposed scheme guarantees high security and practical
efficiency.
EXISTING SYSTEM:
Besides, in order to improve feasibility and save on the expense in the cloud
paradigm, it is preferred to get the retrieval result with the most relevant files that
match users’ interest instead of all the files, which indicates that the files should be
ranked in the order of relevance by users’ interest and only the files with the
highest relevances are sent back to users. A series of searchable symmetric
encryption schemes have been proposed to enable search on ciphertext. Traditional
SSE schemes enable users to securely retrieve the ciphertext, but these schemes
support only Boolean keyword search, i.e., whether a keyword exists in a file or
not, without considering the difference of relevance with the queried keyword of
these files in the result. Preventing the cloud from involving in ranking and
entrusting all the work to the user is a natural way to avoid information leakage.
However, the limited computational power on the user side and the high
computational overhead precludes information security.
DISADVANTAGES OF EXISTING SYSTEM:
To improve security without sacrificing efficiency, schemes presented in
show that they support top-k single keyword retrieval under various
scenarios.
Authors of made attempts to solve the problem of top-k multi-keyword over
encrypted cloud data.
These schemes, however, suffer from two problems - Boolean representation
and how to strike a balance between security and efficiency.
In the former, files are ranked only by the number of retrieved keywords,
which impairs search accuracy. In the latter, security is implicitly
compromised to tradeoff for efficiency, which is particularly undesirable in
security-oriented applications.
PROPOSED SYSTEM:
In this paper, we introduce the concepts of similarity relevance and scheme
robustness to formulate the privacy issue in searchable encryption schemes, and
then solve the insecurity problem by proposing a two-round searchable encryption
(TRSE) scheme. Novel technologies in the cryptography community and
information retrieval community are employed, including homomorphic
encryption and vector space model. In the proposed scheme, the majority of
computing work is done on the cloud while the user takes part in ranking, which
guarantees top k multi-keyword retrieval over encrypted cloud data with high
security and practical efficiency.
ADVANTAGES OF PROPOSED SYSTEM:
 We propose the concepts of similarity relevance and scheme robustness. We
thus perform the first attempt to formulate the privacy issue in searchable
encryption, and we show server side ranking based on order-preserving
encryption (OPE) inevitably violates data privacy
 We propose a two-round searchable encryption (TRSE) scheme, which
fulfills the secure multi-keyword top-k retrieval over encrypted cloud data.
Specifically, for the first time we employ relevance score to support multi-
keyword top-k retrieval.
 Thorough analysis on security demonstrates the proposed scheme guarantees
high data privacy. Furthermore, performance analysis and experimental
results show that our scheme is efficient for practical utilization.
SYSTEM ARCHITECTURE:
ALGORITHM USED:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Monitor : 15 inch VGA Colour.
Mouse : Logitech Mouse.
Ram : 512 MB
Keyboard : Standard Keyboard
SOFTWARE REQUIREMENTS:
Operating System : Windows XP.
Coding Language : ASP.NET, C#.Net.
Database : SQL Server 2005
REFERENCE:
Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue and Minglu Li “Towards Secure
Multi-Keyword Top-k Retrieval over Encrypted Cloud Data” - IEEE
TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING, 2013

More Related Content

PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOCX
privacy preserving multi keyword ranked search over encrypted cloud data
DOCX
Enabling fine grained multi-keyword search
PPTX
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
DOCX
A secure and dynamic multi keyword ranked
DOCX
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
PPTX
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
DOCX
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
Enabling fine grained multi-keyword search
Accurate and Efficient Secured Dynamic Multi-keyword Ranked Search
A secure and dynamic multi keyword ranked
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preserving multi-keyword ranked search over encrypted cloud data

What's hot (18)

PPTX
Final 1st
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
DOC
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
DOCX
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
DOCX
Searchable Symmetric Encryption with Forward Search Privacy
PDF
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
PPT
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
DOCX
Enabling secure and efficient ranked keyword
PDF
Searchable Encryption Systems
Final 1st
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Privacy preserving multi-keyword ranked search over encrypted cloud data
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Searchable Symmetric Encryption with Forward Search Privacy
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling secure and efficient ranked keyword
Searchable Encryption Systems
Ad

Viewers also liked (7)

PDF
Designing Teams for Emerging Challenges
PDF
UX, ethnography and possibilities: for Libraries, Museums and Archives
PDF
Study: The Future of VR, AR and Self-Driving Cars
PDF
Visual Design with Data
PDF
Hype vs. Reality: The AI Explainer
PDF
3 Things Every Sales Team Needs to Be Thinking About in 2017
PDF
How to Become a Thought Leader in Your Niche
Designing Teams for Emerging Challenges
UX, ethnography and possibilities: for Libraries, Museums and Archives
Study: The Future of VR, AR and Self-Driving Cars
Visual Design with Data
Hype vs. Reality: The AI Explainer
3 Things Every Sales Team Needs to Be Thinking About in 2017
How to Become a Thought Leader in Your Niche
Ad

Similar to Towards secure multi keyword top-k retrieval over encrypted cloud data (20)

PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
PDF
Retrieving Secure Data from Cloud Using OTP
PPTX
Privacy preserving multi-keyword ranked search over encrypted cloud data
PDF
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
DOCX
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
PDF
A Novel Approach for Data Security in Cloud Environment
PDF
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
PDF
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
PPT
File transfer with multiple security mechanism
PDF
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
DOCX
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
PDF
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
PDF
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
PDF
O01761103112
PPTX
Tees an efficient search scheme over
PDF
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
DOCX
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
PDF
The Champion Supervisor
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Retrieving Secure Data from Cloud Using OTP
Privacy preserving multi-keyword ranked search over encrypted cloud data
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
A Novel Approach for Data Security in Cloud Environment
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
Hybrid Encryption Algorithms for Medical Data Storage Security in Cloud Database
File transfer with multiple security mechanism
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
O01761103112
Tees an efficient search scheme over
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
The Champion Supervisor
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...

Recently uploaded (20)

PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Lesson notes of climatology university.
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Cell Structure & Organelles in detailed.
PDF
Complications of Minimal Access Surgery at WLH
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
master seminar digital applications in india
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Lesson notes of climatology university.
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Renaissance Architecture: A Journey from Faith to Humanism
Microbial diseases, their pathogenesis and prophylaxis
FourierSeries-QuestionsWithAnswers(Part-A).pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
VCE English Exam - Section C Student Revision Booklet
Cell Structure & Organelles in detailed.
Complications of Minimal Access Surgery at WLH
Module 4: Burden of Disease Tutorial Slides S2 2025
PPH.pptx obstetrics and gynecology in nursing
Supply Chain Operations Speaking Notes -ICLT Program
O7-L3 Supply Chain Operations - ICLT Program
master seminar digital applications in india
102 student loan defaulters named and shamed – Is someone you know on the list?
human mycosis Human fungal infections are called human mycosis..pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Anesthesia in Laparoscopic Surgery in India
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...

Towards secure multi keyword top-k retrieval over encrypted cloud data

  • 1. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data ABSTRACT: Cloud computing has emerging as a promising pattern for data outsourcing and high quality data services. However, concerns of sensitive information on cloud potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable symmetric encryption (SSE) allows retrieval of encrypted data over cloud. In this paper, we focus on addressing data privacy issues using searchable symmetric encryption (SSE). For the first time, we formulate the privacy issue from the aspect of similarity relevance and scheme robustness. We observe that server-side ranking based on order-preserving encryption (OPE) inevitably leaks data privacy. To eliminate the leakage, we propose a two-round searchable encryption (TRSE) scheme that supports top-k multi-keyword retrieval. In TRSE, we employ a vector space model and homomorphic encryption. The vector space model helps to provide sufficient search accuracy, and the homomorphic encryption enables users to involve in the ranking while the majority of computing work is done on the server side by operations only on ciphertext. As a result, information leakage can be eliminated and data security is ensured. Thorough security and performance
  • 2. analysis show that the proposed scheme guarantees high security and practical efficiency. EXISTING SYSTEM: Besides, in order to improve feasibility and save on the expense in the cloud paradigm, it is preferred to get the retrieval result with the most relevant files that match users’ interest instead of all the files, which indicates that the files should be ranked in the order of relevance by users’ interest and only the files with the highest relevances are sent back to users. A series of searchable symmetric encryption schemes have been proposed to enable search on ciphertext. Traditional SSE schemes enable users to securely retrieve the ciphertext, but these schemes support only Boolean keyword search, i.e., whether a keyword exists in a file or not, without considering the difference of relevance with the queried keyword of these files in the result. Preventing the cloud from involving in ranking and entrusting all the work to the user is a natural way to avoid information leakage. However, the limited computational power on the user side and the high computational overhead precludes information security.
  • 3. DISADVANTAGES OF EXISTING SYSTEM: To improve security without sacrificing efficiency, schemes presented in show that they support top-k single keyword retrieval under various scenarios. Authors of made attempts to solve the problem of top-k multi-keyword over encrypted cloud data. These schemes, however, suffer from two problems - Boolean representation and how to strike a balance between security and efficiency. In the former, files are ranked only by the number of retrieved keywords, which impairs search accuracy. In the latter, security is implicitly compromised to tradeoff for efficiency, which is particularly undesirable in security-oriented applications. PROPOSED SYSTEM: In this paper, we introduce the concepts of similarity relevance and scheme robustness to formulate the privacy issue in searchable encryption schemes, and then solve the insecurity problem by proposing a two-round searchable encryption (TRSE) scheme. Novel technologies in the cryptography community and information retrieval community are employed, including homomorphic encryption and vector space model. In the proposed scheme, the majority of
  • 4. computing work is done on the cloud while the user takes part in ranking, which guarantees top k multi-keyword retrieval over encrypted cloud data with high security and practical efficiency. ADVANTAGES OF PROPOSED SYSTEM:  We propose the concepts of similarity relevance and scheme robustness. We thus perform the first attempt to formulate the privacy issue in searchable encryption, and we show server side ranking based on order-preserving encryption (OPE) inevitably violates data privacy  We propose a two-round searchable encryption (TRSE) scheme, which fulfills the secure multi-keyword top-k retrieval over encrypted cloud data. Specifically, for the first time we employ relevance score to support multi- keyword top-k retrieval.  Thorough analysis on security demonstrates the proposed scheme guarantees high data privacy. Furthermore, performance analysis and experimental results show that our scheme is efficient for practical utilization.
  • 7. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Monitor : 15 inch VGA Colour. Mouse : Logitech Mouse. Ram : 512 MB
  • 8. Keyboard : Standard Keyboard SOFTWARE REQUIREMENTS: Operating System : Windows XP. Coding Language : ASP.NET, C#.Net. Database : SQL Server 2005 REFERENCE: Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue and Minglu Li “Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data” - IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING, 2013