International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

Privacy Preserving Multi-Keyword Graded Search on Encrypted Cloud Data with Integrity Checking

Snehal M. Shewale, Prof. Y. B. Gurav

Many of data owner use the public cloud to outsource their sensitive data and use data as they needed. In traditional method data is stored on local site or local server but it is not feasible for complex and sensitive data. Cloud computing allow data owner to store their data on remote site to reduce burden on local complex data storing. Data owners outsource their data to public cloud for safety and economic savings. When data owner outsource their data, this data is encrypted before it is transferred to the public cloud. In this paper we provide secure and privacy preserving technique for outsourcing data owners sensitive data and retrieve relevance result for search on data. Here we use blowfish encryption algorithm for encryption of data to be outsourced. After the encryption of data it is stored on cloud server for further use. User or cloud service client need different kind of data. Cloud service user requests cloud data by multiple query which is called as Multi ranked search over encrypted data i.e. MRSE. The user queries are transferred to the cloud server. Server searches the relevant content by using the coordinate matching and sends the relevant results to the user. Data received from cloud server is in the encrypted format. Data owner provides access control to the user with key for decryption of data. Message Authentication Code algorithm is used to check and verify integrity of data. In this way this paper describes the technique of providing security to outsource data on cloud and checking the integrity of data.

Keywords: Cloud server, Multi-, Data Owner, Encryption, Integrity, Privacy

Edition: Volume 4 Issue 7, July 2015

Pages: 781 - 784


How to Cite this Article?

Snehal M. Shewale, Prof. Y. B. Gurav, "Privacy Preserving Multi-Keyword Graded Search on Encrypted Cloud Data with Integrity Checking", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156455, Volume 4 Issue 7, July 2015, 781 - 784

34 PDF Views | 30 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud server'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1880 - 1884

A Dynamic Secure Group Sharing in Cloud Computing

Shobha D. Patil, Dr. Sulochana B. Sonkamble

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1577 - 1580

Load Balancing in Cloud Computing using Shortest Job First and Round Robin Approach

Shreya Saini, Amninder Kaur

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this article



Similar Articles with Keyword 'Multi-'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 496 - 497

Naive Buyers Theorem for Heart Disease Prediction System

Indu Kumari, Dinesh Kumar Bahgel

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1126 - 1131

A Colorization Algorithm with Artifacts Suppression on Real Time Video

Sneha P. Mete, Mayur S. Dhait

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1860 - 1864

An Improved Real Time Method for Detection, Blocking and Traceback of Malicious Traffic Over TOR

Rinaj Gafoor, Charlse M Varghese

Share this article



Similar Articles with Keyword 'Data Owner'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1880 - 1884

A Dynamic Secure Group Sharing in Cloud Computing

Shobha D. Patil, Dr. Sulochana B. Sonkamble

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2319 - 2324

Public Integrity Checking for Dynamic Data Sharing among Multi Groups

Athulya Prabhakaran, Nithya VP

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 462 - 464

Enhancing Security of Database Stored in Cloud Environment

Rajeshkannan.R, T. Saranya

Share this article



Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this article



Similar Articles with Keyword 'Integrity'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1681 - 1685

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Pranita Bakka, Dr. Jayashree Agarkhed

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2420 - 2425

Data hiding Using Texture Synthesis with Watermarking

Aruna M P, Maya Mathew

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2619 - 2622

Information Security in Multi-Cloud Environment

Digambar D. Patil, Megha Singh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1678 - 1681

Integrity Attestation and Auto-correction of Services for SaaS Clouds

Amulya Rachna, John Prakash Veigas

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1845 - 1848

A Cloud Storage System for Preserving Privacy and Data Integrity of User

M. S. Tore, S. K. Sonkar

Share this article



Similar Articles with Keyword 'Privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1587 - 1591

Layers of Internet Privacy

Amit Dabas, Ashish Kumar Sharma

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this article
Top