International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 120 | Views: 203

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Rating: 7 / 10

Privacy Preserving Multi-Keyword Graded Search on Encrypted Cloud Data with Integrity Checking

Snehal M. Shewale | Prof. Y. B. Gurav

Abstract: Many of data owner use the public cloud to outsource their sensitive data and use data as they needed. In traditional method data is stored on local site or local server but it is not feasible for complex and sensitive data. Cloud computing allow data owner to store their data on remote site to reduce burden on local complex data storing. Data owners outsource their data to public cloud for safety and economic savings. When data owner outsource their data, this data is encrypted before it is transferred to the public cloud. In this paper we provide secure and privacy preserving technique for outsourcing data owners sensitive data and retrieve relevance result for search on data. Here we use blowfish encryption algorithm for encryption of data to be outsourced. After the encryption of data it is stored on cloud server for further use. User or cloud service client need different kind of data. Cloud service user requests cloud data by multiple query which is called as Multi ranked search over encrypted data i. e. MRSE. The user queries are transferred to the cloud server. Server searches the relevant content by using the coordinate matching and sends the relevant results to the user. Data received from cloud server is in the encrypted format. Data owner provides access control to the user with key for decryption of data. Message Authentication Code algorithm is used to check and verify integrity of data. In this way this paper describes the technique of providing security to outsource data on cloud and checking the integrity of data.

Keywords: Cloud server, Multi-, Data Owner, Encryption, Integrity, Privacy

Edition: Volume 4 Issue 7, July 2015,

Pages: 781 - 784

How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link

Verification Code will appear in 2 Seconds ... Wait