/
International Journal of Emerging Trends  Technology in Computer Science IJETTCS International Journal of Emerging Trends  Technology in Computer Science IJETTCS

International Journal of Emerging Trends Technology in Computer Science IJETTCS - PDF document

tawny-fly
tawny-fly . @tawny-fly
Follow
577 views
Uploaded On 2014-09-30

International Journal of Emerging Trends Technology in Computer Science IJETTCS - PPT Presentation

ijettcsorg Email editorijet tcsorg editorijettcsgmailcom Vol ume 2 Issue 5 September October 2013 ISSN 2278 6856 Volume 2 Issue September October 2013 Page 247 Abstract In this paper we define and solve the effective yet secure ranked keyword search ID: 1713

ijettcsorg Email editorijet tcsorg editorijettcsgmailcom

Share:

Link:

Embed:

Download Presentation from below link

Download Pdf The PPT/PDF document "International Journal of Emerging Trends..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijet tcs.org, editorijettcs@gmail.com Vol ume 2, Issue 5 , September – October 2013 ISSN 2278 - 6856 Volume 2, Issue 5 September – October 2013 Page 247 Abstract: In this paper we define and solve the effective yet secure ranked keyword search over encrypted cloud data. We used order preserving symmetric encryption to protect the cloud data. Even though there are lots of searching techniques available, they are not giving efficient search results. For example the search results returned 40 records and in those 30 r ecords are relevant and the remaining 10 records result contains irrelevant data. This paper mainly focuses on searching methods which will improve the efficiency of searching. We used both keyword search and concept based search methods in order to retrie ve the relevance search criteria. This method will retrieve the documents based on broader conceptual entities, which will improve the efficiency of ranked keyword search. Traditional searchable encryption schemes allow a user to securely search over encry pted data through keywords without first decrypting it, these techniques support only conventional Boolean keyword search, without capturing any relevance of the files in the search result. When directly applied in large collaborative data outsourcing clou d environment, they may suffer from the following two main drawbacks. On the one hand, for each search request, users without pre - knowledge of the encrypted cloud data have to go through every retrieved file in order to find ones most matching their intere st, which demands possibly large amount of post processing overhead On the other hand, invariably sending back all files solely based on presence/absence of the keyword further incurs large unnecessary network traffic, which is absolutely undesirable in t oday’s pay - as - you - use cloud paradigm. Keywords : - RSSE , OPSE ,IAAS,PAAS,SAAS etc 1. Introduction Today, the latest paradigm to emerge is that of Cloud computing which promises reliable services delivered through next - generation data centers that are built on virtualized compute and storage technologies. Consumers will be able to access applications and data from a “Cloud” anywhere in the world on demand. The consumers are assured that the Cloud infrastructure is very robust and will always be available at a ny time. Computing services need to be highly reliable, scalable, and autonomic to support ubiquitous access, dynamic discovery. In particular, consumers indicate the required service level through Quality of Service parameters, which are noted in SLAs est ablished with providers. Of all these paradigms, the recently emerged Cloud computing paradigm appears to be the most promising one to leverage and build on the developments from other paradigms. Fig 1 Cloud Computing architecture Cloud Layers: - 1. Inf rastructure as a Service (IAAS) 2. Platform as a Service (PAAS) 3. Software as a Service (SAAS) Infrastructure - as - a - Service (IAAS): Infrastructure - as - a - Service(IAAS) like Amazon Web Services provides virtual servers with unique IP addresses and blocks of storage on demand. Customers benefit from an API from which they can control their servers. Platform - as - a - Service (PAAS): Platform - as - a - Service(PAAS) is a set of software and development tools hosted on the provider's servers. Developers can create appli cations using the provider's APIs. Google Apps is one of the most famous Platform - as - a - Service providers Software - as - a - Service (SAAS): Software - as - a - Service (SAAS) is the broadest market. In this case the provider allows the customer only to use its applic ations. The software interacts with the user through a user interface. These applications can be anything from web based email, to applications like Twitter . 2. Types of Cloud Efficient Secure Ranked keyword search Algorithms over outsource cloud data Ms Mayura R. Girme 1 , Prof.G.M. Bhandari 2 1,2 Department of Computer Science and Engineering Bhivarabai Sawant Institute of Technology & Research (BSIOTR) International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijet tcs.org, editorijettcs@gmail.com Vol ume 2, Issue 5 , September – October 2013 ISSN 2278 - 6856 Volume 2, Issue 5 September – October 2013 Page 248 Fig 2 Types of Cloud computing Private Cloud : - Private clouds describe offeri ngs that deploy cloud computing on private network. it consists of application or virtual machines in a company's own set of hosts. Public cloud : A Public cloud is one based on the standard cloud computing model, in which a service provider makes resource s, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay - per - usage model . Traditional Keyword Search : - Cloud computing economically enables the paradigm of data service outsourcing. However, to protect data privacy, sensitive cloud data has to be encrypted before outsourced to the commercial public cloud, which makes effective data utilization service a very challenging task. Although traditional searchable encryption tec hniques allow users to securely search over encrypted data through keywords, they support only Boolean search and are not yet sufficient to meet the effective data utilization need that is inherently demanded by large number of users and huge amount of dat a files in cloud. In this paper, we define and solve the problem of secure ranked keyword search over encrypted cloud data. Ranked search greatly enhances system usability by enabling search result relevance ranking instead of sending undifferentiated resu lts, and further ensures the file retrieval accuracy. Specifically, we explore the statistical measure approach, i.e. relevance score, from information retrieval to build a secure searchable index, and develop a one - to - many order - preserving mapping techniq ue to properly protect those sensitive score information. The resulting design is able to facilitate efficient server - side ranking without losing keyword privacy. Thorough analysis shows that our proposed solution enjoys “as - strong - as - possible” security gu arantee compared to previous searchable encryption schemes, while correctly realizing the goal of ranked keyword search. Extensive experimental results demonstrate the efficiency of the proposed solution. Ranked Keyword Search C loud Computing. Ranked searc h greatly enhances system usability by returning the matching files in a ranked order regarding to certain relevance criteria (e.g., keyword frequency), thus making one step closer toward practical deployment of privacy - preserving data hosting services in the context of Cloud Computing. To achieve our design goals on both system security and usability, we propose to bring together the advance of both crypto and IR community to design the ranked searchable symmetric encryption (RSSE) scheme, in the spirit of “as - strong - as - possible” security guarantee. s pecifically, we explore the statistical measure approach from IR and text mining to embed weight information (i.e., relevance score) of each file during the establishment of searchable index before outsourcing the encrypted file collection. As directly outsourcing relevance scores will leak lots of sensitive frequency information against the keyword privacy, we then integrate a recent crypto primitive order - preserving symmetric encryption (OPSE) and properly mo dify it to develop a one - to - many order - preserving mapping technique for our purpose to protect those sensitive weight information, while providing efficient ranked search functionalities. 3. Proposed System Secure Ranked Keyword Search over Cloud Data Deve lopment of a private cloud is very expensive. Storage of sensitive data in public cloud is very risky. To make it possible, unauthorized access is avoided by storing the data in encrypted format. This paper tackles the problems of enabling searchable encry ption system with support of secure ranked search in order to implement the top k retrieval. In this paper, statistical measure approach from IR and text mining to embed weight information of each file during establishment of searchable index before outsou rcing the encrypted file collection is explored. Team frequency : Number of times a particular keyword appears within the file. Inverse document frequency (IDF) : It is calculated as the total number of files by the number of files in particular keyword. Ran king function : It is calculated by using TF*IDF rule. Algorithm for index table generation: Srep1. Read the document F Step2. Segment the document term wise and encrypt with key Step3. Calculate term frequency (TF) and inverse document frequency(IDF) and p ublishing time(PT) Step4. Generate index table(Itable) and files upload to server . Algorithm 1 Ranked Search For all documents Ri do Compare(level1 index of Ri , query index) j = 1 while match do increment j Compare (levelj indices of Ri, query index) en d while rank of Ri = highest level that match with query index end 4. Related work: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijet tcs.org, editorijettcs@gmail.com Vol ume 2, Issue 5 , September – October 2013 ISSN 2278 - 6856 Volume 2, Issue 5 September – October 2013 Page 249 Now - a - days cloud servers get to store large amount of files. Here select and processing the files is the main problem. Whenever large numbers of files are available in clou d server under encryption some problems are generated. Totally all files are not encrypted. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords without first decrypting it, these technique s support only conventional Boolean keyword search, without capturing any relevance of the files in the search result. That’s here there is no sufficient privacy and security in outsourcing. Fig 2 Architecture of cloud Server 1. It can retrieve the re sults with less communication overhead. 2. It can provide the results with effective retrieval accuracy. 3. It can provide effective privacy and security application. In the architecture we have three entities Data owner: Data owner having collection o f data files that he wants to outsource into the cloud server in encrypted format, this will increase effective data utilization. Data user: When the data user wants to search the required files he enters a keyword in a secret form. Cloud server : It is t he place where a pool of data files and different applications can store. Previously user can selects the files in the form of a plain text files. This is ailing under access the files. There is no perfect decryption technique to access the files of repres entation process. Here we introduce encryption based secure keyword searching mechanism. It can provide efficient solution for accessing the data. It is a good usability to display the effective matching details files . These matching files are extracted w ith relevance score. This kind of matching files are retrieved with efficient mechanism. It can provide the results with guaranteed mechanism. All the files are collected with encryption format. All encrypted files are given weight in implementation proces s. These kinds of approaches show the better result in implementation. Design Goal To make possible ranked searchable symmetric encryption for successful employment of outsourced cloud data under the mentioned model. Our system design should achieve the following security and performance assurance. Specifically we have the to reduce the size of index. A list of standard IR techniques can be adopted, including case folding, stemming, and stop words etc. We omit this process of keyword extraction and refine ment and refer readers to for more details Ranked search. In order to rank the documents, a ranking function is required, which assigns relevancy scores to each document matching to a given search query. One of the most widely used metrics in information r e trieval is the term frequency. Term frequency is denied as the number of times a keyword appears in a document. Instead of using term frequency itself, we assign relevancy levels based on the term frequencies of keywords. To enable ranked keyword search fo r effective utilization of outsourced cloud data under the model, our system design should achieve the following security and performance guarantee. a) Ranked key word search : For efficient searching process the process use the mechanism of Topic detectio n and tracking . The search time includes fetching the posting list in the index, decrypting, and rank ordering each entry. b) Security guarantee : For providing the security in the cloud server, this process uses the privilege method . 5. RESULTS AND DISCUSS ION Execution process : a. Owner uploads the file in to the cloud server, and set the privilege to the particular user for easily access data. b. And give the particular permission like write, read or both for providing the security. Here the user’s are sep arated by authorized user and unauthorized user. Authorized user is the owner permitted person and unauthorized user is unpermitted person. c. So authorized user easily access the data from the cloud server by using the ranked efficient keyword search by t he mechanism of TDT4 mechanism. Unauthorized user asks the permission to access the data. d. After the data owner permission, then only the Number of files Per keyword list size (KB) Per list build time (s) 500 6.212 2.50s Efficiency of the ranked keyword search: This type of ranked keyword search enhances the efficient usage of outsourced files by providing Inter cloud communication constantly between data owners and users. So that the cloud server learn nothing from the data uploaded by data owne rs. The search time is not affected while fetching the posting list in the index, decrypting, and rank ordering each entry BENEFITS Ranked keyword search: to explore different mechanisms for designing effective ranked search. a. Provide more security to th e data owner, by means of Inter - cloud communication through e - mail. b. Authentication of both search results and the outsource process enables search engine to be more robust than before in cloud environment International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijet tcs.org, editorijettcs@gmail.com Vol ume 2, Issue 5 , September – October 2013 ISSN 2278 - 6856 Volume 2, Issue 5 September – October 2013 Page 250 c. Privilege method is used for the security. So process has the more security compared to the existing system. Fuzzy Keyword Search This keyword search deeply enhances system usability by returning the matching files when users’ searching inputs accurately match the predefined keywords or the closest possible matching files based on keyword similarity semantics, when exact match fails. Usage of edit distance to quantify keywords similarity and development of a technique for construction of fuzzy keyword sets. Fuzzy eliminates the need for enumerating all the fuzzy keywords and the resulted size of fuzzy keywords sets is extensively conc entrated. Goals of introducing fuzzy keyword search are: I) T o discover new mechanism for constructing storage efficient fuzzy keyword sets II) T o design well - organized and effective fuzzy search scheme based on the constructed fuzzy keyword sets. III) To validate th e security of the planned . Fig 3 Data Retrieval in from the Cloud Server When a user wants to access the data by keyword search mechanism, first he wants to get the authorization. That is the authorized person can only retrieve the data. The authorizatio n is provided by a key which is randomly generated. That key is unique for each user. The user should remember this key throughout the searching process. The user can enter the key words which is the conjunction of single keywords. That is AND, OR, BOTH an d he get a search result which is in a ranked order. In the existing system we are giving a conjunctive keyword for search and retrieve the data. Here an advanced tire - tree is used for storing this conjunction of keywords and searching each separately. The AND, OR, BOTH are also defined. We are using ‘gram based’ method and ‘wild card’ method for ‘fuzzy keyword construction’. In both these methods the conjunction of keyword is implemented, which will produce a highly efficient ranked result. Main modules i n Fuzzy keyword search are: a) Wildcard - based technique : To edit the operations at the same position a wild card based technique is used. We can calculate the edit distance by using substitution, deletion and insertion. b) Gram - based technique : Here the fuzzy set is constructed based on grams. The gram of a string is a substring and it can be used for efficient estimated search. The order of the characters after the primitive operation is always kept the same before the operations. c) Symbol - based tire - t raversed scheme : In this technique, for storing the fuzzy keyword set over a finite symbol set, a multi way tree is constructed. Here we consider a cloud data system consisting of data owner, data user and cloud server. Given her a collection of n Encrypte d data files C = (F1, F2, FN) stored in the cloud server, a predefined set of distinct keywords W = (w1, w2, we), the cloud server provides the search service for the authorized users over the encrypted data C. We assume that the authorization between the data owner and users is appropriately done. An authorized user types in a request to selectively retrieve data files of user’s interest. The cloud server is responsible for mapping the searching request to a set of data files, where each file is indexed by a file ID and linked to a set of keywords. The fuzzy keyword search scheme returns the search results according to the following rules: If the user’s searching input exactly matches the pre - set keyword, the server is estimated to return the files contain ing the keyword; if there are typos and/or format inconsistencies in the searching input, the server will return the closest possible results based on pre - specified similarity semantics. 6. Conclusion: In this paper, we proposed a searching method to improve the efficiency of ranked keyword search Algorithms. We gave introduction about the existing searchable encryption framework, it is very inefficient to achieve efficient ranked search. We proposed a efficient one - to - many order preserving mapping function, which allows the effective RSSE to be designed. In additional to that we proposed combination of concept based and keyword based searching techniques .This kind of techniques has the ability to categorize, and search large collections of unstructured text on a conceptual basis. This kind of searching technique is more reliable and efficient search method that is more likely to produce relevant results than traditional searches. Our experimental relevance score analysis results show that the proposed search methods greatly improve the efficiency of ranked keyword search . REFERENCES [1] C. Wang, N. Cao, K. Ren, and W. Lou, “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data” , Proc. IEEE , Parallel and Distributed Systems, Aug. 201 2. [2] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,” Proc. IEEE 30th Int’l Conf. Distributed Computing Systems (ICDCS ’10), 2010. [3] Vijay A Tathe , Deepavali P Patil “Next Generation Computing on the Internet (GRID)”, published at,"International Journal of Scientific and Research Publications,”ISSN 2250 - 3153 ,Volume 2, Issue 2, February 2012 Edition. [4] P. Naresh , K. Pavan kumar International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 3, March – 2013. [5] Cong Wang, Ning Cao, Kui Ren, Wenjing Lou (august 2012) “Enabling Secure and Efficient International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: editor@ijet tcs.org, editorijettcs@gmail.com Vol ume 2, Issue 5 , September – October 2013 ISSN 2278 - 6856 Volume 2, Issue 5 September – October 2013 Page 251 Ranked Keyword Search o ver Outsourced Cloud Data”, IEEE transactions on parallel and distributed systems, vol. 23, no. 8. [6] S.Saravan an, Arivarasan . ”A n efficient ranked keyword search for effective utilization of outsourced cloud data ”