Abstract—With the increasing adoption of
cloud computing, a growing number of users outsource their datasets to cloud.
To preserve the privacy, the datasets are usually encrypted before outsourcing.
However, the common practice of encryption makes the effective utilization of
the data difficult. For example, it is difficult to search the given keywords
in encrypted datasets. Many schemes are proposed to make encrypted data
searchable based on keywords. However, keyword-based search schemes ignore the
semantic representation information of users retrieval, and cannot completely
meet with users search intention. Therefore, how to design a content-based
search scheme and make semantic searc h more effective and context-aware is a
difficult challenge. In this paper, we propose ECSED, a novel semantic search
scheme based on the concept hierarchy and the semantic relationship between
concepts in the encrypted datasets. ECSED uses two cloud servers. One is used
to store the outsourced datasets and return the ranked results to data users.
The other one is used to compute the similarity scores between the documents
and the query and send the scores to the first server. To further improve the
search efficiency, we utilize a tree-based index structure to organize all the
document index vectors. We employ the multikeyword ranked search over encrypted
cloud data as our basic frame to propose two secure schemes. The experiment
results based on the real world datasets show that the scheme is more efficient
than previous schemes. We also prove that our schemes are secure under the
known ciphertext model and the known background model.
CONCLUSIONS
In this paper, to address the problem of semantic retrieval,
we propose effective schemes based on concept hierarchy. Our solutions use two
cloud servers for encrypted retrieval and make contributions both on search
accuracy and Any Query Call Us: 9566355386
efficiency. To improve
accuracy, we extend the concept hierarchy to expand the search conditions. In
addition, a tree-based index structure is constructed to organize all the
document index vectors, which are built based on the concept hierarchy for the
aspect of search efficiency. The security analysis shows that the proposed
scheme is secure in the threat models. Experiments on real world dataset
illustrate that our scheme is efficient.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV
2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44
Mb.
• Monitor : 15 VGA
Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : -
Windows XP/7.
• Coding Language :
JAVA/J2EE
• Data Base : MYSQL
REFERENCES
[1] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M.
Lindner, ―A break in the clouds: towards a cloud definition,‖ ACM
SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50–55, 2009. Any
Query Call Us: 9566355386
[2] C.Wang, N. Cao, K.
Ren, andW. Lou, ―Enabling secure and efficient ranked keyword search over
outsourced cloud data,‖ IEEE TPDS, vol. 23, no. 8, pp. 1467–1479, 2012.
[3] D. Song, D.Wagner, and A. Perrig,
―Practical techniques for searches on encrypted data,‖ in Proc. of
S&P, 2000.