SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 112
Efficient and Empiric Keyword Search Using Cloud
S.S. Swethapriyadarshni1, S.Swathi Priya2, P.Yuvarani3, K.Hemapriya4
1’2’3Panimalar Institute of Technology
4Assistant Professor, Dept. of Computer Science Engineering, Panimalar Institute of Technology, Chennai,
TamilNadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud is a Centralized Architecture Server, which serves as a platformforeveryuserofthecloudwanted tostoredata
and sensitive information’s in safe secured storage space. The next logical stage in the growth of on-demand information
technology services and products is cloud computing. Cloud computing will rely on virtualized resources to a considerable extent.
Cloud computing allows IT skills to be reused, and it always includes current computing services such as distributed and grid
computing. Users can perform a keyword-based search over encrypted material with searchable encryption. The majority of
currently available searchable encryption systems arebasedonasinglecloudserverapproach, whichhassome drawbacks, such as
a single point of failure and hostile insiders. The multi cloud server strategy, ontheother hand, providesmoredataavailabilityand
security. However, transferring existing keyword search strategies to the multi cloud will result in higher storage and search
expenses, with no discernible improvement in data security. In addition, unlike single cloud, a challenge in a multi cloud
environment is how to adequately check query integrity when certain cloudserversreturninaccurateorincompletedata. Weoffer
an iterative encryption approach to assure file privacy even if numerous cloud services collude with one another to ensure data
security.
Key Words: Cloud computing, Cloud Server, Encryption, Decryption, Multicloud, AES
1. INTRODUCTION
Cloud computing has several attributes, blockchain,forwardapproach,andcryptosystem-basedapproachesareaccustomedto
preserving security. The cloud infrastructurehasseveral characteristicsthey'reremotelyhosted,ubiquitous,andcommodified.
Currently, several firms are delivering cloud services example Google, Microsoft, etc… Virtualization is an associate degree
abstraction of execution of the cloud, so virtual machines are used. To preserve the info, the info is encrypted before
outsourcing it to the cloud. Cloud sourcing is turning into a giant deal as a result of its high scale usage and has inexpensive
suppliers. There are also problems concerning the policy and access that are overcome by the cloud organization. One of the
main challenges of the cloud is the constant net throughout the storage of information. Cloud Computing is the sought-after
network access split pool organized computing riches.
1.1 SCOPE OF THE PROJECT
With searchable encryption, users can do a keyword-based search across encrypted material. The bulk of searchable
encryption solutions currently available are based on a single cloud server architecture, whichhasseveral disadvantagessuch
as a single point of failure and hostile insiders. The use of several cloud servers, on the other hand, increases data availability
and security. Transferring existing keyword search strategies to the multicloud, on the other hand, will increase storage and
search costs while providing no noticeable improvement in data security. One of these services is Amazon Elastic Compute
Cloud (EC2), which allows users to have a virtual cluster of computers available at all times through the Internet. On AWS,
virtual computers have hardware central processing units (CPUs) and graphics processingunits(GPUs)forprocessing,aswell
as local/RAM memory, hard disk/SSD storage, a choice of operating systems, networking,andpre-loadedapplicationsoftware
such as web servers, databases, and customer relationship management (CRM). The project's goal is to integrate keyword
search across various clouds so that users can quickly locate a specific file or data, and to prevent the involvement of third
parties so that data is secure and protected.
1.2 EXISTING SYSTEM
Without needing to learn the plaintexts, searchable encryption allows a cloud server toconductkeywordsearches onbehalfof
data users over encrypted data. The majority of currently available searchable encryption systems, on the other hand, only
support single or conjunctive keyword searches, and the few schemes that can perform expressive keyword searches are
computationally inefficient because they are built from bilinear pairings over composite-order groups. In existingsystems,an
expressive public-key searchable encryption technique in the prime-order groups outperforms existingschemessignificantly
by allowing keyword search rules to be defined in conjunctive, disjunctive, or any monotonic Boolean formulas. When a user
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 113
obtains data from a concerned person via the internet, unknown or invalidusersmaygainaccesstothedata stored ona central
server or database. It could result in data being lost or altered by a third party. Most existing PEKS methods, regardless of
search authorisation, focus on data consumers'richsearchfunctionalities.Theframework allowsclientstosendencrypteddata
to the cloud, allows users to search for documents using different keywords, and allows them to check the server's response.
2. PROPOSED SYSTEM
Encrypting a file, then making n copies of it, and distributing the n copies to n cloud servers is astraightforward filedistribution
solution in numerous clouds. Userscan still retrieve the fileeven if (n-1)cloudserversareofflineinthissituation,indicatingthat
this distribution mechanism is highly reliable. The cloud server is merely aware that if it engages in unethical behavior, it will
almost certainly be discovered. The suggested design reduces storage overhead on both the client and user sides. The retrieval
timelowers as the number of documents increases, cuttingstorage costs forboth parties. However,thismethodnecessitatesan
excessive amount of storageoverhead. Furthermore,becauseeachcloudserverhasaccesstotheentireencryptedfile,webuilda
secureand reliable file distribution strategy in various clouds to strike a better balance between storageoverhead,privacy,and
reliability. We present an iterative encryption strategy inspired by the two-layer encryption scheme to preserve the privacy of
data files even if numerous cloud serversstart a collusionattackatthesametime.Inthissystem,userscanalsoproducea unique
code to gain access to a record from an authorized individual. It will provide users with a safe access method as well as protect
unknown individuals from dangerous activities.
Output-1: User login page
Output-2: Registration page
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 114
Output-3: Keyword Searching page
Output-4: Response page
Output-5: AWS Cloud shell
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 115
Output-6: Fetched data from AWS Cloud shell
3. CONCLUSIONS
In this, we propose a solid and certain keyword search conspire in different mists, which permits the information client to
perform catchphrase search in a safe, dependable, and unquestionable way. To begin with, we proposea solidanddependable
document appropriation conspire, which guarantees security throughiterativeencryptionanddependability bypresentingRS
deletion code innovation. Second, we plan a Bloom channel tree file structure and extend it to a multi cloud climate. Third, we
execute a viable trustworthiness confirmation calculation that can rapidly check the respectability of inquiry results and
recognize pernicious cloud servers. At long last, we do security investigation and exploratoryassessmenttocheck thesecurity
and viability of our plan. For the future work, first, we will investigate a quicker and more effective record dissemination
conspire that permits clients to bear lower reproduction costs. Second, we will stretch out the protected hunt plan to
accomplish fluffy question, positioning inquiry, and multi watchword question.
REFERENCES
[1]. Yunhong Zhou, Shihui Zheng, and Licheng Wang, "Privacy-Preserving and Efficient Public Key Encryption with Keyword
Search-Based CP-ABE in Cloud", 13 October 2020.
[2]. Qingji Zheng Shouhuai Xu Giuseppe Ateniese, "VABKS: Verifiable Attribute-based Keyword Search over Outsourced
Encrypted Data", the University of Texas at San Antonio, USA Sapienza University of Rome, ItalyandJohnsHopkins University,
USA.
[3]. Mrs. Zabiha Khan, Assistant Professor, Dept. of CSE, Ghousia College of Engineering, Karnataka, India, Ms. Kamala Kumari,
B. K, Rumana Iffath, Saima Ahmed, Zaiba Tabassum UG Students Ghousia College of Engineering, Ramanagaram, "Review of
Attribute-based Keyword Search AuthorizationinCloud",www.ijert.orgNConPCS -2017ConferenceProceedingsSpecial Issue
- 2017.
[4]. XINRUI GE, JIA YU, CHENGYU HU, HANLIN ZHANG, AND RONG HAO, 1. College of Computer Science and Technology,
Qingdao University, Qingdao 266071, China,"EnablingEfficientVerifiableFuzzyKeywordSearchOverEncryptedData inCloud
Computing", date of current version September 7, 2018.
[5]. Lincei, Chungen Xu, Lei Xiaoling Yu, and Cong Zuo, "VerifiableIdentity-BasedEncryption withKeyword SearchforIoTfrom
Lattice", Accepted: 24 February 2021.
[6]. Shangping Wang, Jian Ye, Yaling Zhang, China, "A keyword searchable attribute-based encryption scheme with attribute
update for cloud storage" May 24, 2018.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 116
[7]. Rui Zhang, Rui Xue, Ting Yuyz, and Ling Liux, "PVSAE: A Public Verifiable Searchable Encryption Service Framework for
Outsourced Encrypted Data", Qatar, Email: tyu@qf.org.qa College of Computing, Georgia Institute of Technology, Atlanta, GA,
USA, Email: lingliu@cc.gatech.edu.
[8]. A Shiny, Jayanth Das, M Venkat Aravind, C A Anirudh Srivatsaa, M Rahul, "Cloud Server Misbehavior Detection Using
Ranked Keyword Search Results Verification", International Journal of Engineering and Advanced Technology (IJEAT) ISSN:
2249 – 8958, Volume-8 Issue-4, April 2019.
[9]. R. SaiVenkata Siva Kumar, T.P.Anithaashri, "Enhancement Of Cloud Data Search Using Symmetric-KeyBasedVerification",
Chennai, anithaashritp.sse@saveetha.com, European Journal of Molecular & Clinical Medicine ISSN 2515-8260 Volume 07,
Issue 08, 2020.
[10]. Devi Thiyagarajan, R. Ganesan, "USER VERIFIABLE MULTIPLE KEYWORD SEARCH SCHEME USING THE MERKLE TREE
FOR OUTSOURCED DATA IN THE CLOUD", International Journal of Technology(2017) 4:591-600ISSN 2086-9614, (Received:
November 2015 / Revised: February 2017 / Accepted: July 2017).
Ad

More Related Content

Similar to Efficient and Empiric Keyword Search Using Cloud (20)

Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
 
H1803035056
H1803035056H1803035056
H1803035056
IOSR Journals
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
IJNSA Journal
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
IRJET Journal
 
C04932125
C04932125C04932125
C04932125
IOSR-JEN
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
IJNSA Journal
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
IRJET Journal
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
 

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Ad

Recently uploaded (20)

01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic AlgorithmDesign Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Journal of Soft Computing in Civil Engineering
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
Reflections on Morality, Philosophy, and History
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
01.คุณลักษณะเฉพาะของอุปกรณ์_pagenumber.pdf
PawachMetharattanara
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Ad

Efficient and Empiric Keyword Search Using Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 112 Efficient and Empiric Keyword Search Using Cloud S.S. Swethapriyadarshni1, S.Swathi Priya2, P.Yuvarani3, K.Hemapriya4 1’2’3Panimalar Institute of Technology 4Assistant Professor, Dept. of Computer Science Engineering, Panimalar Institute of Technology, Chennai, TamilNadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud is a Centralized Architecture Server, which serves as a platformforeveryuserofthecloudwanted tostoredata and sensitive information’s in safe secured storage space. The next logical stage in the growth of on-demand information technology services and products is cloud computing. Cloud computing will rely on virtualized resources to a considerable extent. Cloud computing allows IT skills to be reused, and it always includes current computing services such as distributed and grid computing. Users can perform a keyword-based search over encrypted material with searchable encryption. The majority of currently available searchable encryption systems arebasedonasinglecloudserverapproach, whichhassome drawbacks, such as a single point of failure and hostile insiders. The multi cloud server strategy, ontheother hand, providesmoredataavailabilityand security. However, transferring existing keyword search strategies to the multi cloud will result in higher storage and search expenses, with no discernible improvement in data security. In addition, unlike single cloud, a challenge in a multi cloud environment is how to adequately check query integrity when certain cloudserversreturninaccurateorincompletedata. Weoffer an iterative encryption approach to assure file privacy even if numerous cloud services collude with one another to ensure data security. Key Words: Cloud computing, Cloud Server, Encryption, Decryption, Multicloud, AES 1. INTRODUCTION Cloud computing has several attributes, blockchain,forwardapproach,andcryptosystem-basedapproachesareaccustomedto preserving security. The cloud infrastructurehasseveral characteristicsthey'reremotelyhosted,ubiquitous,andcommodified. Currently, several firms are delivering cloud services example Google, Microsoft, etc… Virtualization is an associate degree abstraction of execution of the cloud, so virtual machines are used. To preserve the info, the info is encrypted before outsourcing it to the cloud. Cloud sourcing is turning into a giant deal as a result of its high scale usage and has inexpensive suppliers. There are also problems concerning the policy and access that are overcome by the cloud organization. One of the main challenges of the cloud is the constant net throughout the storage of information. Cloud Computing is the sought-after network access split pool organized computing riches. 1.1 SCOPE OF THE PROJECT With searchable encryption, users can do a keyword-based search across encrypted material. The bulk of searchable encryption solutions currently available are based on a single cloud server architecture, whichhasseveral disadvantagessuch as a single point of failure and hostile insiders. The use of several cloud servers, on the other hand, increases data availability and security. Transferring existing keyword search strategies to the multicloud, on the other hand, will increase storage and search costs while providing no noticeable improvement in data security. One of these services is Amazon Elastic Compute Cloud (EC2), which allows users to have a virtual cluster of computers available at all times through the Internet. On AWS, virtual computers have hardware central processing units (CPUs) and graphics processingunits(GPUs)forprocessing,aswell as local/RAM memory, hard disk/SSD storage, a choice of operating systems, networking,andpre-loadedapplicationsoftware such as web servers, databases, and customer relationship management (CRM). The project's goal is to integrate keyword search across various clouds so that users can quickly locate a specific file or data, and to prevent the involvement of third parties so that data is secure and protected. 1.2 EXISTING SYSTEM Without needing to learn the plaintexts, searchable encryption allows a cloud server toconductkeywordsearches onbehalfof data users over encrypted data. The majority of currently available searchable encryption systems, on the other hand, only support single or conjunctive keyword searches, and the few schemes that can perform expressive keyword searches are computationally inefficient because they are built from bilinear pairings over composite-order groups. In existingsystems,an expressive public-key searchable encryption technique in the prime-order groups outperforms existingschemessignificantly by allowing keyword search rules to be defined in conjunctive, disjunctive, or any monotonic Boolean formulas. When a user
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 113 obtains data from a concerned person via the internet, unknown or invalidusersmaygainaccesstothedata stored ona central server or database. It could result in data being lost or altered by a third party. Most existing PEKS methods, regardless of search authorisation, focus on data consumers'richsearchfunctionalities.Theframework allowsclientstosendencrypteddata to the cloud, allows users to search for documents using different keywords, and allows them to check the server's response. 2. PROPOSED SYSTEM Encrypting a file, then making n copies of it, and distributing the n copies to n cloud servers is astraightforward filedistribution solution in numerous clouds. Userscan still retrieve the fileeven if (n-1)cloudserversareofflineinthissituation,indicatingthat this distribution mechanism is highly reliable. The cloud server is merely aware that if it engages in unethical behavior, it will almost certainly be discovered. The suggested design reduces storage overhead on both the client and user sides. The retrieval timelowers as the number of documents increases, cuttingstorage costs forboth parties. However,thismethodnecessitatesan excessive amount of storageoverhead. Furthermore,becauseeachcloudserverhasaccesstotheentireencryptedfile,webuilda secureand reliable file distribution strategy in various clouds to strike a better balance between storageoverhead,privacy,and reliability. We present an iterative encryption strategy inspired by the two-layer encryption scheme to preserve the privacy of data files even if numerous cloud serversstart a collusionattackatthesametime.Inthissystem,userscanalsoproducea unique code to gain access to a record from an authorized individual. It will provide users with a safe access method as well as protect unknown individuals from dangerous activities. Output-1: User login page Output-2: Registration page
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 114 Output-3: Keyword Searching page Output-4: Response page Output-5: AWS Cloud shell
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 115 Output-6: Fetched data from AWS Cloud shell 3. CONCLUSIONS In this, we propose a solid and certain keyword search conspire in different mists, which permits the information client to perform catchphrase search in a safe, dependable, and unquestionable way. To begin with, we proposea solidanddependable document appropriation conspire, which guarantees security throughiterativeencryptionanddependability bypresentingRS deletion code innovation. Second, we plan a Bloom channel tree file structure and extend it to a multi cloud climate. Third, we execute a viable trustworthiness confirmation calculation that can rapidly check the respectability of inquiry results and recognize pernicious cloud servers. At long last, we do security investigation and exploratoryassessmenttocheck thesecurity and viability of our plan. For the future work, first, we will investigate a quicker and more effective record dissemination conspire that permits clients to bear lower reproduction costs. Second, we will stretch out the protected hunt plan to accomplish fluffy question, positioning inquiry, and multi watchword question. REFERENCES [1]. Yunhong Zhou, Shihui Zheng, and Licheng Wang, "Privacy-Preserving and Efficient Public Key Encryption with Keyword Search-Based CP-ABE in Cloud", 13 October 2020. [2]. Qingji Zheng Shouhuai Xu Giuseppe Ateniese, "VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data", the University of Texas at San Antonio, USA Sapienza University of Rome, ItalyandJohnsHopkins University, USA. [3]. Mrs. Zabiha Khan, Assistant Professor, Dept. of CSE, Ghousia College of Engineering, Karnataka, India, Ms. Kamala Kumari, B. K, Rumana Iffath, Saima Ahmed, Zaiba Tabassum UG Students Ghousia College of Engineering, Ramanagaram, "Review of Attribute-based Keyword Search AuthorizationinCloud",www.ijert.orgNConPCS -2017ConferenceProceedingsSpecial Issue - 2017. [4]. XINRUI GE, JIA YU, CHENGYU HU, HANLIN ZHANG, AND RONG HAO, 1. College of Computer Science and Technology, Qingdao University, Qingdao 266071, China,"EnablingEfficientVerifiableFuzzyKeywordSearchOverEncryptedData inCloud Computing", date of current version September 7, 2018. [5]. Lincei, Chungen Xu, Lei Xiaoling Yu, and Cong Zuo, "VerifiableIdentity-BasedEncryption withKeyword SearchforIoTfrom Lattice", Accepted: 24 February 2021. [6]. Shangping Wang, Jian Ye, Yaling Zhang, China, "A keyword searchable attribute-based encryption scheme with attribute update for cloud storage" May 24, 2018.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 116 [7]. Rui Zhang, Rui Xue, Ting Yuyz, and Ling Liux, "PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data", Qatar, Email: tyu@qf.org.qa College of Computing, Georgia Institute of Technology, Atlanta, GA, USA, Email: lingliu@cc.gatech.edu. [8]. A Shiny, Jayanth Das, M Venkat Aravind, C A Anirudh Srivatsaa, M Rahul, "Cloud Server Misbehavior Detection Using Ranked Keyword Search Results Verification", International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-8 Issue-4, April 2019. [9]. R. SaiVenkata Siva Kumar, T.P.Anithaashri, "Enhancement Of Cloud Data Search Using Symmetric-KeyBasedVerification", Chennai, anithaashritp.sse@saveetha.com, European Journal of Molecular & Clinical Medicine ISSN 2515-8260 Volume 07, Issue 08, 2020. [10]. Devi Thiyagarajan, R. Ganesan, "USER VERIFIABLE MULTIPLE KEYWORD SEARCH SCHEME USING THE MERKLE TREE FOR OUTSOURCED DATA IN THE CLOUD", International Journal of Technology(2017) 4:591-600ISSN 2086-9614, (Received: November 2015 / Revised: February 2017 / Accepted: July 2017).
  翻译: