Achieving Efficient Information Retrieval Query over Encrypted Cloud Data

Rachana Mudholkar
2019 International Journal for Research in Applied Science and Engineering Technology  
Cloud computing is an emerging technology which reshapes the advance in information technology. Cloud computing faces two type of issues i.e. privacy efficiency based on the aggregation and distribution layer we provide an extension to the Ostrovsky scheme by OIRQ i.e. (optimized information retrieval query) OIRQ is the technology that provides optimized information query through matrix construct. To further reduce querying cost incurred on the cloud. Query are classified into multiple ranked
more » ... ere higher ranked query can retrieve the higher percentage of matched files. Keywords: Multiple-keyword ranked search, dynamic update, cloud computing, searchable encryption. I. INTRODUCTION Cloud computing as an emerging technology is expected to reshape the information technology processes in the near future. As there are lot of benefits of cloud computing e.g. cost-effectiveness, flexibility and scalability, more and more organizations choose to outsource their data for sharing in the cloud. In a typical cloud usage scenario, an organization subscribes the cloud services and authorizes its staff to share files in the cloud. All the files on cloud are described by a set of keywords, and the staff, as authorized users, can retrieve files of their interests by querying the cloud with certain keywords. In such an environment where keywords are used, how to protect user privacy from the cloud, which is a third party outside the security boundary of the organization, becomes a key problem. Other than this there are various advantages of cloud services, outsourcing sensitive information (such as e-mails, personal health records, company finance data, government documents, etc.) to remote servers brings privacy concerns[1]. The service providers (CSPs) that keeps the data for users may access users' sensitive information without authorization. The approach that is used to protect the data confidentiality is to encrypt the data before outsourcing. This will have a huge impact on cost in terms of data usability. For example, the existing techniques on keyword-based information retrieval, which are widely used on the plaintext data that cannot be directly applied on the encrypted data. Downloading all the data from the cloud data and decrypt locally is obviously impractical However, these methods are not practical due to their high computational overhead for both the cloud sever and user [2]. On the opposite hand there area unit more sensible special-purpose solutions, like searchable encoding (SE) schemes have created specific contributions in terms of potency, practicality and security. Searchable encoding schemes change the consumer to store the encrypted knowledge to the cloud and execute keyword search over cipher text domain. Abundant works are dead underneath totally different threat models to realize varied search practicality, like single keyword search, similarity search, multi-keyword Boolean search, graded search, multikeyword graded searched, multi keyword ranked search achieves more and more attention for its practical applicability. Some dynamic schemes have been executed to support inserting and deleting operations on document collections [3]. These area unit vital works as it's extremely potential that knowledge homeowners ought to update their data on the cloud server few of the dynamic schemes support economical multi-keyword hierarchic search. User privacy may be classified into search privacy and access privacy. Search privacy means the cloud is aware of nothing regarding what the user is checking out, and access privacy means the cloud is aware of nothing regarding that files area unit came to the user. When the files area unit keep within the clear forms, a naive answer to safeguard user privacy is for the user to request all of the files from the cloud; this way, the cloud cannot know which files the user is really interested in. [4] . While this will give the required privacy, the communication price is high. To make private searching applicable in a cloud environment, our previous work designed a cooperate private searching protocol (COPS), where a proxy server, called the aggregation and distribution layer (ADL), is introduced between the users and therefore the cloud. The ADL deployed within a corporation has 2 main functionalities: aggregating user queries and distributing search results.
doi:10.22214/ijraset.2019.3010 fatcat:c44ru77wd5gfxlij5ot5fwdo7u