Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along with Deduplication Tec

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 04 Issue: 07 | July -2017

p-ISSN: 2395-0072

www.irjet.net

Ranking Efficient Attribute based keyword searching over encrypted data along with deduplication technique Dr.Swapnaja.A. Ubale1, Smita.V. Barkade2, Dr.Sulbha.S.Apte3 Head of Department of Computer Engineering (II shift), Zeal college of engineering and research,Narhe,Pune 2 Post Graduate student of Department of Computer Engineering, zeal college of engineering and research,Narhe,Pune 3 Department of Computer Engineering, Walchand Institute of Technology, Solapur ---------------------------------------------------------------------***--------------------------------------------------------------------1

Abstract - With the advancements in computer technology

the major difference is in keys used for encryption and decryption will be same or different.

storage space have evolved day by day. And due to this you can store data anywhere and of whatever size. This kind of storage can be termed as cloud storage. As anything but important information such as personal details, banking details, health records of people, security information will be stored on cloud. Such information if revealed to every one might be misused. So such data should be encrypted and thus will be saved from cybercrimes, theft, and money laundering in online banking. But this encryption won’t make the data as searchable. So the proposed system implements how the data can be encrypted and will give access to authorized users. And as the data storage will be huge on cloud, ranking will be used for increase searching efficiency. At the same time to save storage space of cloud deduplication technique is implemented. User revocation makes the system more robust

Assume that Google encrypted all the data and end user is not able to make use of that data. This makes the usability of data as zero. To address this issue we have implemented Attribute based encryption to give only access to authorized people. Elliptic cryptography curve algorithm used of encryption. To increase searching efficiency over the large cloud data ranking is implemented. And to avoid storage of similar data on cloud deduplication is also implemented. By using attributes of user which will be unique when compared to others such as username, encryption of data will be done. When user will request for data file first check will be done whether this is authorized user or not. If this is authorized user, then check will be done whether this particular user have the access to that data.so this ensures authorization at fine grained level. User revocation plays important role, which stops searching by unauthorized user. Attribute based encryption falls in public key cryptography. And having its own advantages such as duplication of key won’t happen in this. Uses different key for encryption and different for decryption.

Key Words: Cloud, ECC, Ranking, Deduplication Attribute based encryption, Attribute based keyword search

1. INTRODUCTION Computer science has always made inventions in making human life better and luxurious. So the cloud computing has played a vital role in that. Cloud allows you to store your data with such ease as you are actually storing your data in air cloud. It is as simple as create the account and store data on it. There are many cloud servers such as Amazon, IBM. As anyone can use and store data on cloud creates the security issues for the data. To secure the data, measures can be used such as allowing only authorized users to search the data and encrypt the stored data. This will secure the data in two ways. First it gives access to only authorized people, means the risk of misuse of data will be reduced greatly. And second as the data is not plaintext, many hackers won’t be able to get what are the actual contents of the data.

When the data is stored on cloud first check will be done to check duplication of data. If the new data is not already present on cloud, data will be stored. If it’s already present storage won’t be done again. At the end when the result is to be retrieved it will be done with ranking to increase user satisfaction for search. Because the data stored on cloud is huge and searching on it will take time. Goals of Our proposed system are 1. Attribute based encryption. 2. Providing security to data. 3. Increasing efficiency of the system. 4. Improving search experience 5. Making storage efficient system. 6. User revocation

There are many existing schemes on how to do searchable encryption which will make the data available to end user when required. Encryption can be divided on the basis of keys.This falls into two categories symmetric encryption and asymmetric encryption or public key cryptography. In this

© 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

| Page 2286


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.