With the advent of cloud computing, data
owners are motivated to outsource their complex data
management systems from local sites to the commercial
public cloud for great flexibility and economic savings. But
for protecting data privacy, sensitive data have to be
encrypted before outsourcing, which obsoletes traditional
data utilization based on plaintext keyword search. Thus,
enabling an encrypted cloud data search service is of
paramount importance. Considering the large number of
data users and documents in the cloud, it is necessary to
allow multiple keywords in the search request and return
documents in the order of their relevance to these keywords.
Related works on searchable encryption focus on single
keyword search or Boolean keyword search, and rarely sort
the search results.
Narendra Joshi : was born in Nasik,
Maharashtra on 1
st
March 1979.He Received
B.Tech Degree (Computer Technology) from
Mumbai University in 2004.Recently I am
completed M.E. (CSE) from Dr. Babasaheb
Ambedkar Marathwada University,
Aurangabad.
The previous work [1] mainly focused on providing
privacy to the data on cloud in which using multikeyword
ranked search was provided over encrypted cloud
data using efficient similarity measure of co-ordinate
matching. The previous work [4] also proposed a basic
idea of MRSE using secure inner product computation.
There was a need to provide more real privacy which this
paper presents. In this system, stringent privacy is
provided by assigning the cloud user a unique ID. This
user ID is kept hidden from the cloud service provider as
well as the third party user in order to protect the user’s
data on cloud from the CSP and the third party user.
Thus, by hiding the user’s identity, the confidentiality of
user’s data is maintained.
[1] Ankatha Samuyelu Raja Vasanthi ,” Secured
Multikeyword Ranked Search over Encrypted Cloud
Data”, 2012.
[2] Y.-C. Chang and M. Mitzenmacher, “Privacy Preserving
Keyword Searches on Remote Encrypted Data,” Proc.
Third Int’l Conf. Applied Cryptography and Network
Security, 2005.
[3] S. Kamara and K. Lauter, “Cryptographic Cloud
Storage,” Proc. 14th Int’l Conf. Financial Cryptograpy
and Data Security, Jan. 2010.
[4] Y. Prasanna, Ramesh . ”Efficient and Secure Multi-
Keyword Search on Encrypted Cloud Data”, 2012.
[5] Jain Wang, Yan Zhao , Shuo Jaing, and Jaijin Le,
”Providing Privacy Preserving in Cloud
Computing”,2010.