International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017
p-ISSN: 2395-0072
www.irjet.net
Efficient Privacy Preserving Clustering Based Multi Keyword Search Shital Agrawal 1, Prof. Bharati Dixit2 1,2Department of Information Engineering, MIT College of Engineering. ---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Recently, cloud computing become more popular,
defeat the issue of security of outsource information, information encryption is one of the best solutions.
data owners shows their interest or prefer the cloud for storing their personal data, by storing data into the cloud save the economical funds and gives the great flexibility. As providing security to the data is the challenging task for the researchers, for protecting the data sensitive data have to be encoded before outsourcing the data. To accomplish the privacy preserving effective search over encoded cloud information this paper presents the hierarchical clustering approach. Alongside this precise and proficient search over outsourced information, security is additionally considered with user revocation approach. Another more imperative component of this framework is data duplication checking with SHA1 hashing strategy. This strategy will not permit the data owner to store the duplicate data at cloud server. By using the data duplication technique memory overload is reduce on cloud. In this framework for clustering process EM clustering is used, and finally compare the EM clustering algorithm with K-means clustering algorithm. Experimental results demonstrate that the framework has numerous advantages like efficient and effective memory and time utilization, efficient and secure search over encrypted data, secure data storage and data duplication checking.
The encryption system may have reinforced the data security of cloud data; in any case it has additionally corrupted the proficiency of the data on the grounds that the encryption will decreases the search capacity of the data. Especially in the cloud computing environment, it is illogical for the customer to download and decrypt the entire encoded data from the remote cloud server before a search happens. Along these lines, an proficient plan that backings search over encrypted information in cloud computing turns out to be extremely noteworthy before much organization can exploit the cloud storage [8][9]. Consistently, accessible encryption strategies have been made to give the capacity to explicitly recovering the encrypted reports through a keyword search. Typically, these systems manufacture a protected index structure and outsource it nearby the encoded records to the remote server. Approved customers show their requests as secret trapdoors that are coordinated legitimately with the stored index data. The server uses the got trapdoor to discover the put away file, and gets the coordinating encoded files [10].
Key Words: Cloud computing, cipher text search,
Numerous analysts have created many cipher content search framework by utilizing the cryptography strategies. These procedures have demonstrated provable security, however as they requests enormous operations and huge complexity in time. Henceforth already composed systems are not valuable for huge data where size of the data is huge likewise it needs online data processing. Because of the visually impaired encryption, important property has been covered in the customary techniques. Along these lines, proposing a technique which can keep up and use this relationship to speed the search phase is desirable
ranked search, multi-keyword search, hierarchical clustering, big data, security.
1. INTRODUCTION Now a days cloud computing becomes more interesting methodology in different applications like academics and the industries. Cloud computing has a number of features, for example resource management, economical cost and simple and quick deployment. Due to the tremendous economic advantages cloud computing, most of the organization deployed their cloud centers. Such cloud centers are Elastic Compute Cloud of Amazon, the App Engine of Google, the Azure of Microsoft, and Blue Cloud of IBM. Despite the fact that data is sometime sensitive information, for example, personal records, financial records pass record and so on., because once the data is outsourced, owner can not directly control the data. It is accessible online at some point. The Cloud Service provider (CSP) can keep up the security of such sensitive data by utilizing a few methods like fire ware, virtualization, and Intrusion Detection System (IDS). For this situation, CSP increases full control over such information. But there is no guarantee or full trust on the representative of CSP [1][10]. They can leak or alter the information. That is they can uncover the sensitive data of data owners. So to
© 2017, IRJET
|
Impact Factor value: 5.181
Proposed system includes following points:
|
Propose a clustering method to solve problem of maintaining the close relationship between different plain documents over an encrypted domain.
Proposed the MRSE-HCI architecture to speed up server side searching phase.
Design a search strategy to improve the rank privacy.
ISO 9001:2008 Certified Journal
| Page 2000