Semantic based multi lexical ranking technique for an effective search in protected cloud

With the hasty popularity of cloud computing data possessor are stimulated to move their intricate data from local repository to commercially available open cloud. We need to search and retrieve all the files which are semantically linked to the query in addition to the precise identical file in a secured manner. But for protecting sensitive information like military information, personal health documents etc, these documents have to be shielded before moving to cloud; which prevents conventional search methodologies using plain text keyword search. It is essential to use multi k-words in searching and retrieve the documents based on their significance order of k-word by considering the ever rising number of data possessor and documents in cloud. Meanwhile existing approaches only support fuzzy keyword based search but not semantic based search. There are works based on multi keyword ranked search using synonymous queries but not based on semantics. For securing the data in the cloud, we use (Advanced Encryption Standard) AES algorithm to encrypt the data and (Reverse Advanced Encryption Standard) RAES to decrypt the same. We use secured (k-Nearest Neighbour) KNN algorithm to achieve secured search. In order to provide semantic based search we include a tool called wordnet where we perform semantic based analysis of the files and then include secured KNN over the documents and rank them according to their order of relevance primarily using the term and inverse document frequency.

[1]  Zhenyu Yang,et al.  LT codes-based secure and reliable cloud storage service , 2012, 2012 Proceedings IEEE INFOCOM.

[2]  J. Albert Mayan,et al.  STRUCTURAL SOFTWARE TESTING: HYBRID ALGORITHM FOR OPTIMAL TEST SEQUENCE SELECTION DURING REGRESSION TESTING , 2015 .

[3]  V. L. Jyothi,et al.  Context-based Classification of XML Documents in Feature Clustering , 2014 .

[4]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[5]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[6]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .

[7]  Cong Wang,et al.  Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.

[8]  Ming Li,et al.  Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.

[9]  J. Albert Mayan,et al.  Development of a Functionality Testing Tool for Windows Phones , 2015 .

[10]  Xingming Sun,et al.  Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query , 2014, IEEE Transactions on Consumer Electronics.

[11]  Ian H. Witten,et al.  Compressing and indexing documents and images , 1999 .

[12]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[13]  Cong Wang,et al.  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.