Privacy Preserving Data Search Using Third Party in Cloud Computing
Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.4, No. 51)Publication Date: 2015-10-10
Authors : Ruturaj Desai; Nitin R. Talhar;
Page : 48-50
Keywords : Keywords: Cloud Computing; Encryption; Multi-Keyword search; Coordinate Matching; Trusted Third Party;
Abstract
Abstract Cloud Computing is new and most importing computing technology. Because of different advantages of cloud computing, many data owners and organizations are outsourcing there data management systems to public cloud to achieve higher flexibility and to reduce cost. The most important issues i cloud computing are privacy and security. Data privacy can be protected by encrypting sensitive data locally before outsourcing that data. But the data utilization based on single keyword search is prevented because of data encryption. Thus, enabling an encrypted cloud data search service is very important. Consider, large number of data users and files in cloud, it is important for the search service to allow multi-keyword query and provide results. Retrieving of all files having queried keywords will not be affordable in pay as per use cloud paradigm. In this paper, we proposed new scheme to solve the problem of multi-keyword search over encrypted data and data sharing using trusted third party in cloud computing. We establish a set of strict privacy requirements for such a secure cloud data utilization system to become a reality. We are using different cryptographic method like AES,Base64 and BlowFish for file encryption. We are using the effective principle of coordinate matching, i.e., as many matches as possible, to capture the similarity between search query and the data file. We propose the system using the trusted third party which will allow user to share data stored on cloud without compromising data privacy. Through analysis investigating privacy and efficiency guarantee of proposed scheme is given and experiments further show proposed scheme indeed introduce low overhead on computation and communication
Other Latest Articles
- Text Mining ? A Requisite for Developing Business Intelligence
- A Optimized Analysis of Different Edge Detection methods in Image Restoration with Neuro-Fuzzy Technique
- Feature Extraction of Build-up area using Morphological Image Processing
- Evaluating m-learning in Saudi Arabian higher education: a case study
- A survey of open source workflow Management system
Last modified: 2015-10-10 14:44:07