Skip to main content

Efficient and Empiric Keyword Search Using Cloud

Page 1

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 06 | June 2022 www.irjet.net p ISSN: 2395 0072

Efficient and Empiric Keyword Search Using Cloud

S.S. Swethapriyadarshni1, S.Swathi Priya2 , P.Yuvarani3 , K.Hemapriya4 1

Panimalar Institute of Technology 4Assistant Professor, Dept. of Computer Science Engineering, Panimalar Institute of Technology, Chennai, TamilNadu, India ***

Abstract Cloud is a Centralized Architecture Server, which serves as a platform for every user of the cloud wanted to store data and sensitive information’s in safe secured storage space. The next logical stage in the growth of on demand information technology services and products is cloud computing. Cloud computing will rely on virtualized resources to a considerable extent. Cloud computing allows IT skills to be reused, and it always includes current computing services such as distributed and grid computing. Users can perform a keyword based search over encrypted material with searchable encryption. The majority of currently available searchable encryption systems are based on a single cloud server approach, which has some drawbacks, such as a single point of failure and hostile insiders. The multi cloud server strategy, on the other hand, provides more data availability and security. However, transferring existing keyword search strategies to the multi cloud will result in higher storage and search expenses, with no discernible improvement in data security. In addition, unlike single cloud, a challenge in a multi cloud environment is how to adequately check query integrity when certain cloud servers return inaccurate or incomplete data. We offer an iterative encryption approach to assure file privacy even if numerous cloud services collude with one another to ensure data security.

Key Words: Cloud computing, Cloud Server, Encryption, Decryption, Multicloud, AES

1. INTRODUCTION

Cloudcomputinghasseveralattributes,blockchain,forwardapproach,andcryptosystem basedapproachesareaccustomedto preservingsecurity.Thecloudinfrastructurehasseveralcharacteristicsthey'reremotelyhosted,ubiquitous,andcommodified. Currently,severalfirmsaredeliveringcloudservicesexampleGoogle,Microsoft,etc…Virtualizationisanassociatedegree abstraction of execution of the cloud, so virtual machines are used. To preserve the info, the info is encrypted before outsourcingittothecloud.Cloudsourcingisturningintoagiantdealasaresultofitshighscaleusageandhasinexpensive suppliers.Therearealsoproblemsconcerningthepolicyandaccessthatareovercomebythecloudorganization.Oneofthe mainchallengesofthecloudistheconstantnetthroughoutthestorageofinformation.CloudComputingisthesought after networkaccesssplitpoolorganizedcomputingriches.

1.1 SCOPE OF THE PROJECT

With searchable encryption, users can do a keyword based search across encrypted material. The bulk of searchable encryptionsolutionscurrentlyavailablearebasedonasinglecloudserverarchitecture,whichhasseveraldisadvantagessuch asasinglepointoffailureandhostileinsiders.Theuseofseveralcloudservers,ontheotherhand,increasesdataavailability andsecurity.Transferringexistingkeywordsearchstrategiestothemulticloud,ontheotherhand,willincreasestorageand searchcostswhileprovidingnonoticeableimprovementindatasecurity.OneoftheseservicesisAmazonElasticCompute Cloud(EC2),whichallowsuserstohaveavirtualclusterofcomputersavailableatalltimesthroughtheInternet.OnAWS, virtualcomputershavehardwarecentralprocessingunits(CPUs)andgraphicsprocessingunits(GPUs)forprocessing,aswell aslocal/RAMmemory,harddisk/SSDstorage,achoiceofoperatingsystems,networking,andpre loadedapplicationsoftware suchaswebservers,databases,andcustomerrelationshipmanagement(CRM).Theproject'sgoalistointegratekeyword searchacrossvariouscloudssothatuserscanquicklylocateaspecificfileordata,andtopreventtheinvolvementofthird partiessothatdataissecureandprotected.

1.2 EXISTING SYSTEM

Withoutneedingtolearntheplaintexts,searchableencryptionallowsacloudservertoconductkeywordsearchesonbehalfof datausersoverencrypteddata.Themajorityofcurrentlyavailablesearchableencryptionsystems,ontheotherhand,only supportsingleorconjunctivekeywordsearches,andthefewschemesthatcanperformexpressivekeywordsearchesare computationallyinefficientbecausetheyarebuiltfrombilinearpairingsovercomposite ordergroups.Inexistingsystems,an expressivepublic keysearchableencryptiontechniqueintheprime ordergroupsoutperformsexistingschemessignificantly byallowingkeywordsearchrulestobedefinedinconjunctive,disjunctive,oranymonotonicBooleanformulas.Whenauser

©
| Page112
2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal
’2’3

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Volume: 09 Issue: 06 | June 2022 www.irjet.net p ISSN: 2395 0072

obtainsdatafromaconcernedpersonviatheinternet,unknownorinvalidusersmaygainaccesstothedatastoredonacentral serverordatabase.Itcouldresultindatabeinglostoralteredbyathirdparty.MostexistingPEKSmethods,regardlessof searchauthorisation,focusondataconsumers'richsearchfunctionalities.Theframeworkallowsclientstosendencrypteddata tothecloud,allowsuserstosearchfordocumentsusingdifferentkeywords,andallowsthemtochecktheserver'sresponse.

2. PROPOSED SYSTEM

Encryptingafile,thenmakingncopiesofit,anddistributingthencopiestoncloudserversisastraightforwardfiledistribution solutioninnumerousclouds.Userscanstillretrievethefileevenif(n 1)cloudserversareofflineinthissituation,indicatingthat thisdistributionmechanismishighlyreliable.Thecloudserverismerelyawarethatifitengagesinunethicalbehavior,itwill almostcertainlybediscovered.Thesuggesteddesignreducesstorageoverheadonboththeclientandusersides.Theretrieval timelowersasthenumberofdocumentsincreases,cuttingstoragecostsforbothparties.However,thismethodnecessitatesan excessiveamountofstorageoverhead.Furthermore,becauseeachcloudserverhasaccesstotheentireencryptedfile,webuilda secureandreliablefiledistributionstrategyinvariouscloudstostrikeabetterbalancebetweenstorageoverhead,privacy,and reliability.Wepresentaniterativeencryptionstrategyinspiredbythetwo layerencryptionschemetopreservetheprivacyof datafilesevenifnumerouscloudserversstartacollusionattackatthesametime.Inthissystem,userscanalsoproduceaunique codetogainaccesstoarecordfromanauthorizedindividual.Itwillprovideuserswithasafeaccessmethodaswellasprotect unknownindividualsfromdangerousactivities.

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page113
Output-1:Userloginpage Output 2:Registration page
e
Volume: 09 Issue: 06 | June 2022 www.irjet.net p
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page114 Output-3:KeywordSearchingpage Output 4:Response page Output-5:AWSCloudshell
International Research Journal of Engineering and Technology (IRJET)
ISSN: 2395 0056
ISSN: 2395 0072

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056

Output 6:FetcheddatafromAWSCloudshell

3. CONCLUSIONS

Inthis,weproposeasolidandcertainkeywordsearchconspireindifferentmists,whichpermitstheinformationclientto performcatchphrasesearchinasafe,dependable,andunquestionableway.Tobeginwith,weproposeasolidanddependable documentappropriationconspire,whichguaranteessecuritythroughiterativeencryptionanddependabilitybypresentingRS deletioncodeinnovation.Second,weplanaBloomchanneltreefilestructureandextendittoamulticloudclimate.Third,we execute a viable trustworthiness confirmation calculation that can rapidly check the respectability of inquiry results and recognizeperniciouscloudservers.Atlonglast,wedosecurityinvestigationandexploratoryassessmenttocheckthesecurity andviabilityofourplan.Forthefuturework,first,wewillinvestigatea quickerandmoreeffectiverecorddissemination conspire that permits clients to bear lower reproduction costs. Second, we will stretch out the protected hunt plan to accomplishfluffyquestion,positioninginquiry,andmultiwatchwordquestion.

REFERENCES

[1].YunhongZhou,ShihuiZheng,andLichengWang,"Privacy PreservingandEfficientPublicKeyEncryptionwithKeyword Search BasedCP ABEinCloud",13October2020.

[2]. Qingji Zheng Shouhuai Xu Giuseppe Ateniese, "VABKS: Verifiable Attribute based Keyword Search over Outsourced EncryptedData",theUniversityofTexasatSanAntonio,USASapienzaUniversityofRome,ItalyandJohnsHopkinsUniversity, USA.

[3].Mrs.ZabihaKhan,AssistantProfessor,Dept.ofCSE,GhousiaCollegeofEngineering,Karnataka,India,Ms.KamalaKumari, B.K,RumanaIffath,SaimaAhmed,ZaibaTabassumUGStudentsGhousiaCollegeofEngineering,Ramanagaram,"Reviewof Attribute basedKeywordSearchAuthorizationinCloud",www.ijert.orgNConPCS 2017ConferenceProceedingsSpecialIssue 2017.

[4]. XINRUIGE,JIA YU, CHENGYUHU,HANLIN ZHANG, ANDRONGHAO, 1.College ofComputer Scienceand Technology, QingdaoUniversity,Qingdao266071,China,"EnablingEfficientVerifiableFuzzyKeywordSearchOverEncryptedDatainCloud Computing",dateofcurrentversionSeptember7,2018.

[5].Lincei,ChungenXu,LeiXiaolingYu,andCongZuo,"VerifiableIdentity BasedEncryptionwithKeywordSearchforIoTfrom Lattice",Accepted:24February2021.

[6].ShangpingWang,JianYe,YalingZhang,China,"Akeywordsearchableattribute basedencryptionschemewithattribute updateforcloudstorage"May24,2018.

Volume: 09 Issue: 06 | June 2022 www.irjet.net p ISSN: 2395 0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal |

Page115

[7].RuiZhang,RuiXue,TingYuyz,andLingLiux,"PVSAE:APublicVerifiableSearchableEncryptionServiceFrameworkfor OutsourcedEncryptedData",Qatar,Email:tyu@qf.org.qaCollegeofComputing,GeorgiaInstituteofTechnology,Atlanta,GA, USA,Email:lingliu@cc.gatech.edu.

[8]. A Shiny, Jayanth Das, M Venkat Aravind, C A Anirudh Srivatsaa, M Rahul, "Cloud Server Misbehavior Detection Using RankedKeywordSearchResultsVerification",InternationalJournalofEngineeringandAdvancedTechnology(IJEAT)ISSN: 2249 8958,Volume 8Issue 4,April2019.

[9].R.SaiVenkataSivaKumar,T.P.Anithaashri,"EnhancementOfCloudDataSearchUsingSymmetric KeyBasedVerification", Chennai,anithaashritp.sse@saveetha.com,EuropeanJournalofMolecular&ClinicalMedicineISSN2515 8260Volume07, Issue08,2020.

[10].DeviThiyagarajan,R.Ganesan,"USERVERIFIABLEMULTIPLEKEYWORDSEARCHSCHEMEUSINGTHEMERKLETREE FOROUTSOURCEDDATAINTHECLOUD",InternationalJournalofTechnology(2017)4:591 600ISSN2086 9614,(Received: November2015/Revised:February2017/Accepted:July2017).

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p ISSN: 2395 0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal |

Page116

Turn static files into dynamic content formats.

Create a flipbook