Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Dynamic Secret Key Generation for Multi Data User in Cloud Computing

Author : Chethan R 1 Divya D 2 Kavya H 3 Prashanth 4 Vani Saptasagar 5

Date of Publication :6th June 2017

Abstract: CLOUD computing is a subversive technology that is changing the way IT hardware and software are designed and purchased. Cloud computing provides abundant benefits including easy access, decreased costs, quick deployment and flexible resource management, etc. It has become highly popular for data owners to outsource their data to public cloud servers while allowing data users to retrieve this data. For privacy concerns, a secure search over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner; instead, they support multiple owners to share the benefits brought by cloud computing. In this paper, we propose Dynamic Secret key generation for multi user in cloud computing. To enable cloud servers to perform secure search without knowing the actual data of both keywords and trapdoors, we systematically construct a novel secure search protocol. To rank the search results and preserve the privacy of relevance scores between keywords and files, we propose a novel additive order and privacy preserving function family. To prevent the attackers from eavesdropping secret keys and pretending to be legal data users submitting searches, we propose a novel dynamic secret key generation protocol and a new data user authentication protocol

Reference :

    1. Cong Wang, Student Member, IEEE, Ning Cao, Student Member, IEEE, Kui Ren, Senior Member, IEEE, Wenjing Lou, Senior Member, IEEE, “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”, IEEE Transactions on Parallel and Distributed Systems Vol.23 No.8 Year 2012.
    2. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,” in Proc. of ICDCS’10, 2010.
    3. P. Mell and T. Grance, “Draft nist working definition of cloud computing,” Referenced on Jan. 23rd, 2010 online at http:/ csrc. nist.gov/groups/SNS/cloudcomputing/ index. html, 2010.
    4. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, 2010.
    5. C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Trans. Comput., vol. 62, no. 2, pp. 362– 375, Feb. 2013.
    6. M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi. Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. Full version of current paper. Available at IACR Cryptology ePrint Archive, http://eprint.iacr.org.
    7. M. Ajtai and C. Dwork. A public-key cryptosystem with worst-case/average-case equivalence. In 29th ACM STOC. ACM Press, 1997.
    8. Fuzzy keyword search over encrypted data in cloud computing" by T. Balamuralikrishna.
    9. Implementation of Fuzzy keyword search over encrypted data in cloud computing" by D. VASUMATHI.
    10. Fuzzy keyword search over encrypted data in cloud computing", Illinois Institute of Technology, ISSN: 2321- 8134.
    11. Z. Xu, W. Kang, R. Li, K. Yow, and C. Xu, “Efficient multikeyword ranked query on encrypted data in the cloud,” in Proc. IEEE 19th Int. Conf. Parallel Distrib. Syst.,Singapore,Dec. 2012, pp. 244–251.
    12. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword search over encrypted data in cloud computing,” inProc. IEEE INFOCOM, San Diego, CA, USA, Mar. 2010, pp. 1–5.

  1. Peter mell, Timothy Grance, NIST definition of Cloud Computing, NIST special publication 800- 145

    Alexa Huth and James Cebula(2011), “ The basics of cloud xomputing”.

    Semantic web, http://https : // en . wikipedia . org / wiki / Semantic _ Web, accessed 12th june 2015.

    Semantic web stack, http://https: //en .wikipedia. org/ wiki/ Semantic_Web_Stack, accessed 4th april 2016.

    Resource Description Framework, https://en.wikipedia.org/wiki/Resource_Descripti on_Framework, accessed 3rd march 2015.

    RDF 1.1 concepts and abstract syntax , accessed 13 july 2015

    Andreas Eberhart, Peter Haase, Daniel oberle,Valentin Zacharias, Semantic Technologies and Cloud Computing, Foundations for the web of information and services, pp 239-251.

    Hayet Brabra, Achraf Mtibaa, Layth Sliman, Walid Gaaloul, Faiez Gargouri, Semantic web Technologies in cloud Computing,: A Systematic Literature review, IEEE International Conference on Services computing(SCC) 2016

    Malini Siva, A. Poobalan, Semantic web standard in cloud computing, International Journal of soft computing and Engineering,

    Daniel Joseph S, John Martin A, A study on Cloud computing and semantic web for the Elearning Era, International Journal of Innovative research in computer and communication Engineering

    Danish Manzoor, Ashraf Ali, Dr Ateeq ahmad, Cloud and Web Technologies: Technical Improvements and their Implications on EGovernance

    Radha Guha, “ Software engineering on semantic web and cloud computing platform, Semantic Journal.


    1. D. Beeferman and A. Berger, “Agglomerative clustering of a search engine query log,” in Proc. 6th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2015, pp. 407–416.
    2. U. Ozertem, O. Chapelle, P. Donmez, and E. Velipasaoglu, “Learning to suggest: A machine learning framework for ranking query suggestions,” in Proc. 35th Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval, 2014, pp. 25–34.
    3. H. Cao, D. Jiang, J. Pei, Q. He, Z. Liao, E. Chen, and H. Li, “Context-aware query suggestion by mining clickthrough and session data,” in Proc. 14th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2013, pp. 875– 883
    4. N. Craswell and M. Szummer, “Random walks on the click graph,” in Proc. 30th Annu. Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval, 2012, pp. 239–246
    5. Y. Song and L.-W. He, “Optimal rare query suggestion with implicit user feedback,” in Proc. 19th Int. Conf. World Wide Web, 2012, pp. 901–910.
    6. Q. Mei, D. Zhou, and K. Church, “Query suggestion using hitting time,” in Proc. 17th ACM Conf. Inf. Knowl. Manage, 2011, pp. 469–478.
    7. T. Miyanishi and T. Sakai, “Time-aware structured query suggestion,” in Proc. 36th Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval, 2013, pp. 809–812.
    8. A. Anagnostopoulos, L. Becchetti, C. Castillo, and A. Gionis, “An optimization framework for query recommendation,” in Proc. ACM Int. Conf. Web Search Data Mining, 2011, pp. 161–170.
    9. P. Boldi, F. Bonchi, C. Castillo, D. Donato, A. Gionis, and S. Vigna, “The query-flow graph: Model and applications,” in Proc. 17th ACM Conf. Inf. Knowl. Manage. 2012, pp. 609–618.
    10. Y. Song, D. Zhou, and L.-w. He, “Query suggestion by constructing term-transition graphs,” in Proc. 5th ACM Int. Conf. Web Search Data Mining, 2012, pp. 353– 362.

Recent Article