Secure and Dynamic Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data Using K-Means Clustering

Authors

  • Tarika P. Jawale  G. S. Mandal's MIT, Aurangabad, Maharashtra, India
  • Prof. R. B. Mapari  G. S. Mandal's MIT, Aurangabad, Maharashtra, India

DOI:

https://doi.org//10.32628/IJSRST196238

Keywords:

K-Means Clustering, KNN, Cloud Computing, Inverse Document Return, EDMRS, Searchable Encryption, Multi-Keyword Ranked Search, Dynamic Update

Abstract

A Secure and Dynamic Multi-keyword graded Search theme over Encrypted Cloud information attributable to the increasing fame of cloud computing, a lot of information homeowners are spurred to source their information to cloud servers for unimaginable accommodation and diminished expense in information management can also perform information dynamic operations on files. On the opposite hand, sensitive information needs to be encrypted before outsourcing for security conditions, that obsoletes information use like keyword-based document retrieval. A protected multi-keyword graded search theme over encrypted cloud information, that all the whereas underpins part update operations like deletion and insertion of documents. Especially, the vector area model and therefore the usually utilised TF_IDF model are consolidated as a neighbourhood of the index development and question generation. A unique tree-based index structure employing a "K-means Clustering" formula to provide practiced multi-keyword graded search. The secure KNN formula is employed to cipher the index and question vectors, so guarantee precise importance score calculation between encrypted index and question vectors. With a selected finish goal to oppose measurable attacks, phantom terms are accessorial to the index vector for glaring search results. Due to the employment of our exceptional tree-based index structure. Keyword: Reduplication, Authorized duplicate check, public auditing, shared data, Cloud computing.

References

  1. B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud,” in IEEE INFOCOM, 2014.
  2.  P. Galle, J. Stardom, and B. Waters, “Secure conjunctive keyword search over encrypted data,” in Applied Cryptography and Network Security. Springer, 2004, pp. 31–45.
  3.  Y. H. Hwang and P. J. Lee, “Public key encryption with conjunctive keyword search and its extension to a multi-user system,” in Proceedings of the First international conference on Pairing-Based Cryptography.
  4.  L. Ballard, S. Karama, and F. Monroe, “Achieving efficient conjunctive keyword searches over encrypted data,” in Proceedings of the 7th international conference on Information and Communications Security.
  5.  D. Bones and B. Waters, “Conjunctive, subset, and range queries on encrypted data,” in Proceedings of the 4th conference on Theory of cryptography. Springer-Vorlage, 2007, pp. 535–554.
  6. B. Zhang and F. Zhang, “An efficient public key encryption with conjunctive-subset keywords search,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 262–267, 2011.
  7. J. Katz, A. Sahai, and B. Waters, “Predicate encryption supporting disjunctions, polynomial equations, and inner products,” in Advances in Cryptology–EUROCRYPT 2008. Springer, 2008, pp. 146–162.
  8. E. Shan, E. Shi, and B. Waters, “Predicate privacy in encryption systems,” in Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography. Springer V erlang, 2009, pp. 457–473.
  9. A. Lawks, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption,” in Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques. Springer-Vorlage, 2010, pp. 62–91.
  10. Ankit Lodha, Clinical Analytics – Transforming Clinical Development through Big Data, Vol-2, Issue-10, 2016
  11. Ankit Lodha, Agile: Open Innovation to Revolutionize Pharmaceutical Strategy, Vol-2, Issue-12, 2016
  12. Ankit Lodha, Analytics: An Intelligent Approach in Clinical Trail Management, Volume 6, Issue 5 , 1000e124

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
Tarika P. Jawale, Prof. R. B. Mapari, " Secure and Dynamic Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data Using K-Means Clustering, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 6, Issue 2, pp.230-235, March-April-2019. Available at doi : https://doi.org/10.32628/IJSRST196238