Cloud computing has generated a lot of interest within the analysis community in the recent years for its several benefits, however has conjointly raise security and privacy concerns. The storage and access of confidential documents are known in concert of the central issues within the space. In explicit, many researchers investigated solutions to search over encrypted documents stored on remote cloud servers.While many schemes are projected to perform conjunctive keyword search, less attention has been noted on more specialized searching techniques.
In this paper, we present a phrase search technique based on Bloom filters that is significantly faster than existing solutions, with similar or better storage and communication cost. Our technique uses a series of n-gram filters to support the practicality A style approach supported associate applications target false positive rate is additionally delinate. Keywords : Cloud computing, Data storage, Bloom filters, Cloud storage server.
Cloud computing may be a computing paradigm, where a large pool of systems are connected in private or public networks, to provide dynamically scalable infrastructure for application, data and file storage.
With the arrival of this technology, the cost of computation, application hosting, content storage and delivery is reduced significantly. Cloud computing[2] is a practical approach to experience direct cost benefits and it has the potential to transform a data center from a capital-intensive set up to a variable priced environment. The idea of cloud computing relies on a awfully basic principal of reusability . The distinction [3] that cloud computing brings compared to ancient ideas of grid computing, distributed computing, utility computing, or autonomic computing is to broaden horizons across structure boundaries.
This technique is used to improve storage and to remove repetitive data. These features enable cloud computing to be relatively static and simple in functionality.
In [1], D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, Publickey encryption with keyword search, in In proceedings of Eurocryption
There are square measure variety of searchable coding schemes that permit secure conjunctive keyword searches over encrypted knowledge, however all of them assume that the position of the keywords is understood.
In [2], B. Waters, D. Balfanz, G. Durfee, and D. K. Smetters, Buildingan encrypted and searchable audit log, in Network and Distributed System Security
It describe an approach for constructing searchable encrypted audit logs which can be combined with any number of existing approaches for creating tamper-resistant logs.
In[3],Boneh et al.s work on an encrypted keyword search scheme based on public key encryption was amongst the most cited in the space. The proposed solution uses identity based encryption and variant using doublelinear mapping.
In[4], An another application was programmed regarding searching through the encrypted audit logs, where only the relevant logs are retrieved. The theme may also include authorizing investigators to search for audit records.
In [5], Song et al also introduced the approach and considered Boneh et al and proposed problastic key search technique through stream cipher.
Many of the first works targeted on single keyword searches. Recently, researchers have proposed solutions on conjunctive keyword search,[12] which involves multiple keywords.Other interesting problems, such as the ranking of search results and searching with keywords that might contain errors termed fuzzy keyword search, have also been considered.
The ability to search for phrases was also recently investigated. Some of the existing system has examined the security of the proposed solutions and, where flaws were found, solutions were proposed The cloud can read any data it desired, providing no privacy to its users. The storage of personal keys and encrypted knowledge by the cloud supplier [3][4] is additionally problematic in case of information breach. By recognizing the almost exponential distribution of keywords, the entries in the keyword location tables are split into pairs to achieve normalization without the high cost of storing unused random data.
However, the utilization of encrypted indexes and also have to compelled to perform client-side coding and secret writing[1] should still be computationally high in sure applications. Its space-efficiency[9] comes at the value of requiring a brute force location verification throughput phrase search. Since all potential locations[8] of the keywords must be verified, the amount of computation required grows proportionally to the file size. As a result, the theme exhibits a high time interval.
In this paper, we present a phrase search scheme which achieves a much faster response time than existing solutions. The scheme is also scalable, where documents can easily be removed and added to the corpus. We also describe modifications to the scheme to lower storage cost at a small cost in response time and to defend against cloud providers with statistical knowledge on stored data.
Although phrase searches are processed independently using our technique, they are typically a specialized function in a keyword search scheme, where the primary function is to provide conjunctive keyword searches. Therefore, we describe both the basic conjunctive keyword search algorithm and the basic phrase search algorithm along with design techniques.
The system aims at providing the fast search of the files in the cloud storage. The files that are been stored in the cloud will be encrypted and cannot be accessed as we wish. So the files are been under the cloud storage for the security .Since the cloud has accessibility only to the owner ,who stores and uploads the files. The user who uses the system dont have the accessablity to the encrypted files. Thus the system is done in the way such that if user is in need of any files from cloud storage, the user may request for the particular file to the owner of the cloud storage. Then the request will be processed by the owner and the approval for the requisition will be done by the owner to process the request and will be sent to the user via a encrypted code so that the user could access the asked file for his need.
In this module which provides the login page for the admin who access and control the network that is provided by the cloud service provider.
Where, it contain the user name (admin) and the password, so that the admin can login and manage it in the cloud service provider.
In this module ,the files are uploaded in format of file name, keywords. To avoid the single key word search we use three key words uploaded in format of file name, keywords to fetch the file.The file are stored in the encrypted format.
Search module, in which you can search the file that you want. The search request is send as query that finds the data from the cloud and shows your approximate search, you can send request to the file so that particular data owner either accept/decline request as their wish.
This module completely shows the accurate data stored in the cloud storage .This helps to search files which are needed
In a keyword search scheme, Bloom filters can be used to test whether a keyword is associated with a docu-ment. Many existing phrase search schemes [10], [11] use a keyword-to-document index and a location/chain index to map keywords to documents and match phrases. We de-scribe an alternative approach using Bloom filters to support this functionality with an emphasis on response time. Our scheme can be summarized as the use of multiple n-gram Bloom filters, BDni , to provide conjunctive keyword search and phrase search.
Cloud computing enables users to store their data in remote storage location. But data security is the major threat in cloud computing. Due to this many organizations are not willing to move into cloud environment. Thus this phrase search scheme which achieves a much faster response time than existing solutions. The scheme is also scalable, where documents can easily be removed and added to the corpus. We also describe modifications to the scheme to lower storage cost at a small cost in response time and to defend against cloud providers with statistical knowledge on stored data.
Although phrase searches are processed independently using our technique, they are typically a specialized function in a keyword search scheme, where the primary function is to provide conjunctive keyword searches. Therefore, we describe both the basic conjunctive keyword search algorithm and the basic phrase search algorithm along with design techniques.
Encrypted Cloud Storage Search. (2019, Nov 30). Retrieved from https://paperap.com/encrypted-cloud-storage-search/