PRIVACY PRESERVING SEARCH OVER ENCRYPTED DATA ON CLOUD

Authors

  • Rajendra Hiray JSPM Rajarshi Shahu College of Engineering Tathawade, Pune
  • Kedar Jangam JSPM Rajarshi Shahu College of Engineering Tathawade, Pune
  • Ajinkya Ingle JSPM Rajarshi Shahu College of Engineering Tathawade, Pune
  • Ravina Dhage JSPM Rajarshi Shahu College of Engineering Tathawade, Pune
  • Prof. R.T.Umbare JSPM Rajarshi Shahu College of Engineering Tathawade, Pune

Keywords:

Cloud data sharing, CP-ABE, Key management, Security, efficiency

Abstract

Cloud computing provides individuals and enterprises Brobdingnagian computing power and scalable storage
capacities to support a variety of big information applications in domains like health care and scientific analysis, therefore
extra and extra information owners unit involved to to supply their information on cloud servers for wonderful convenience
in information management and mining. However, information sets like health records in electronic documents usually
contain sensitive information, that brings relating to privacy issues if the documents unit free shared to partly untrusted
third-parties in cloud. a wise and wide used technique for information privacy preservation is to inscribe information before
outsourcing to the cloud servers, that however reduces information utility and makes several ancient information analytic
operators like keyword-based top-k document retrieval obsolete. throughout this paper, we tend to tend to analyze the multikeyword top-k search downside for enormous cryptography against privacy breaches, associated decide to verify Associate
in Nursing efficient and secure answer to the present disadvantage. Specifically, for the privacy concern of question
information, we tend to tend to construct a special tree-based index structure and magnificence a random traversal formula,
that makes even the same question to produce whole completely different visiting ways that on the index, and may also
maintain the accuracy of queries unchanged beneath stronger privacy. For up the question efficiency, we tend to tend to tend
to propose a gaggle multi-keyword top-k search theme supported set up of partition where a gaggle of tree-based indexes
unit created for all documents. Finally, we tend to tend to combine these ways that on into Associate in Nursing efficient and
secure approach to handle our projected top-k similarity search. thorough experimental results on real-life information sets
demonstrate that our projected approach can significantly improve the potential of defensive the privacy breaches, the
quality and also the time efficiency of question method over the progressive ways that.

Published

2018-05-25

How to Cite

PRIVACY PRESERVING SEARCH OVER ENCRYPTED DATA ON CLOUD. (2018). International Journal of Advance Engineering and Research Development (IJAERD), 5(5), 746-751. https://ijaerd.org/index.php/IJAERD/article/view/3592

Similar Articles

1-10 of 2778

You may also start an advanced similarity search for this article.