Professional Documents
Culture Documents
2T.P. SHEKHAR
2
Associate Professor, Department of CSE, Jyothishmathi Institute of Technology & science,
karimnagar, Telangana, India.
Email-: TPSHEKHAR@gmail.com
3Dr M.SUJATHA
3
Associate Professor, Department of CSE, Jyothishmathi Institute of Technology & science,
karimnagar, Telangana, India.
Email-: sujathamadugulacse@gmail.com
ABSTRACT
With the emerging of the cloud computing, secure search over encrypted cloud data has become
a hot research spot. Previous schemes achieve weaker query privacy-preserving ability due to the
query trapdoor generation mechanisms. In these schemes, a data owner usually knows full well
the query contents of data users and a data user can also easily analyze query contents of another
data user. In some application scenarios, the data user may be unwilling to leak their query
privacy to anyone else except himself. it propose a privacy-enhanced search scheme by allowing
the data user to generate random query trapdoor every time. a leverage Bloom filter and bilinear
pairing operation to construct secure index for each data file, which enables the cloud to perform
search without obtaining any useful information. It proves that this fine-grained search scheme
is secure and extensive experiments demonstrate the correctness and practicality of the proposed
result verification scheme.
Data owners encrypt their private data and corresponding ciphertext set Chardware,
upload them to cloud server for enjoying the Cmachine, Csubject, Cprotocal, Cnetwork.
abundant benefits brought by the cloud Obviously, |Cnetwork|max = |Cnetwork| =
computing as well as guaranteeing data 1000. Recall that each verification object is
security. Meanwhile, the secure searchable composed of a Counting Bloom Filter and a
indexes are also constructed to support random elements pad region, if we set the
effective keyword search over encrypted number of hash functions to be l = log 1 2
outsourced data. 0.01 = 7 and the number of counters in
Counting Bloom Filter to be m = 1000
Cloud server: log0.6185 0.01 = 1000 × 9.585 = 9585, then
the false positive is less than 0.01. We
Cloud server can performs search over expand the Counting Bloom Filter from m =
secure indexes according to trapdoors and 9585 to n = 12085, the last 2500 counters
sends the query results to the data user. are regarded as pad region. Thus, the size of
each verification object is about 6KB (12085
VI.CONCLUSION × 4 = 48340 bits).
A query results verification scheme is In addition, we use HMAC-MD5
proposed over the resultant results from the with a 128 bits key to instantiate the pseudo
cloud with encrypted data. Low overhead random hash function prfk(). We implement
short signature scheme is integrated with our verification object signature and
query result verification scheme is authentication scheme based on Java library
proposed for the authenticity of the retrieved of the Pairing-Based Cryptography Library
object. To ensure the correctness of (JPBC) [42] and choose Type A elliptic
retrieved in malicious cloud environment. curve group with 160-bit prime order, which
And to ensure the authenticity of the can achieve 1024-bit discrete log security.
retrieved object. A technique is proposed To implement secure verification object
that improves the scalability of the system. request, we use Pailier Encryption for
request information encryption, the secret
VII RESULT ANALYSIS key is set to be 512 bits. In our experiments,
we use Java language to implement all
Experiment Setup: programs. The client side is an Inter Core i5-
6200U 2.3GHz computer with 4GB RAM
To evaluate the verification object
running windows 7. The cloud environment
construction time and query results
is simulated by using the Dell blade M610
verification time, we generate 5 text file sets
running Linux Centos5.8 OS, which has 4
Fhardware and |Fhardware| = 200, Fmachine
processor cores and supports 8 parallel
and |Fmathine| = 400, Fsubject and
threads.
|Fsubject| = 600, Fprotocal and |Fprotocal| =
800, Fnetwork and |Fnetwork| = 1000,
respectively. For example, Fhardware
denotes a set of text files containing the
keyword hardware with the cardinality 200.
All these text files are randomly picked up
from the real data set RFC (Request For
Comments Database) [41]. We encrypt the 5
file sets using AES to get their