Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Efficient Central Keyword Based Search Method over Encrypted Data in Cloud

Author : A.Ramya 1 D.Udhaya chandrika 2 S.Sureka 3 R.Vinothini 4

Date of Publication :22nd March 2018

Abstract: Keyword based search is a important aspect, when searching the data in cloud. Keywords may have a certain grammatical relationship among them which reflect the importance of keywords from the user’s perspective intuitively. Proposed system has relationship among query keywords into consideration and designs a keyword weighting algorithm to show the importance of distinction of the keywords. Key word weighting algorithm accurately and efficiently localizes the central keyword that the user is interested in. We can choose the central keyword (not all keywords) of the query to extend. When a user inputs some query keywords, our scheme can effectively and accurately locate and extend the semantics of the central keyword. The returned results should be relevant to both the multiple keywords that the user inputs and the extension keyword. To calculate the relevance scores between keywords and files, we use the widely used TF-IDF rule, where TF (term frequency) denotes the frequency of a given keyword in a document and IDF (inverse document frequency) represents the importance of a keyword. When the data owner updates the dataset, the TFIDF values are also changed. To enable updating, we make a few changes in the trapdoor and index generation by inserting the IDF values into the query vector and the TF values into the index vector, respectively

Reference :

    1. S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, “Securing sift: Privacypreserving outsourcing computation of feature extractions over encrypted image data,” IEEE Trans. on Image Processing, vol. 25, no. 7, pp. 3411–3425, 2016
    2. Z. Fu, J. Shu, X. Sun, and N. Linge, “Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data,” IEEE Transactions on Consumer Electronics, vol. 60, no. 4, pp. 762– 770, 2014. [
    3. W. K. Wong, D. W.-l. Cheung, B. Kao, and N. Mamoulis, “Secure knn computation on encrypted databases,” in Proceedings of the 2009 ACM SIGMOD International Conference on Management of data. ACM, 2009, pp. 139–152.
    4. http://nlp.stanford.edu/software/lex-parser.shtml.
    5. http://nlp.stanford.edu:8080/parser/.
    6. G. A. Miller, R. Beckwith, C. Fellbaum, D. Gross, and K. J. Miller, “Introduction to wordnet: An on-line lexical database,” International journal of lexicography, vol. 3, no. 4, pp. 235–244, 1990.
    7.  I. H. Witten, A. Moffat, and T. C. Bell, Managing gigabytes: compressing and indexing documents and images. Morgan Kaufmann, 1999.
    8. J. Zobel and A. Moffat, “Exploring the similarity space,” in ACM SIGIR Forum, vol. 32, no. 1. ACM, 1998, pp. 18–34.

Recent Article