IJRIT International Journal of Research in Information Technology, Volume 3, Issue 3, March 2015, Pg. 214-218

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Multi-Keyword Rating Ranked and Semantic Based Search over Cloud Search Services B.Malini1, L.Priya2 Final year, Information Technology, Karpaga vinayaga college of Engineering and Technology, Kanchipuram Dt., Tamil Nadu. Final year, Information Technology, Karpaga vinayaga college of Engineering and Technology, Kanchipuram Dt., Tamil Nadu.

ABSTRACT: Consumer-centric cloud computing paradigm has emerged as the development of smart electronic devices combined with the emerging cloud computing technologies. Rating, Multikeyword, ranked, semantic search are delivered to the consumers with the premise that an effective and efficient cloud search service is achieved. For consumers, they want to find the most relevant products or data, which is highly desirable in the “pay-as-you use” cloud computing paradigm. As sensitive data such as photo albums, emails, personal health records, financial records, etc are encrypted before outsourcing to cloud, traditional keyword search techniques are useless. Through this variety of services we can find the most relavant information easily. KEY WORDS -Cloud computing, consumer-centric cloud, rating search, keyword search, ranked search.

1. INTRODUCTION In recent years, many consumer electronic devices (e.g. Smartphone, iphone) with support of high speed computing combined with the emerging cloud computing paradigm provide a variety of service to the consumers. sensitive data are encrypted before outsourcing to the cloud. However, encrypted data make the traditional data utilization services based on plaintext keyword search useless. The simple and awkward method of downloading all the data and decrypting locally is obviously impractical, because the authorized cloud consumers must hope to search their interested data rather than all the data. Hence, it is an especially important thing to explore an effective search service over encrypted outsourced data. To meet the challenge of effective search system, this paper proposes a practically efficient and flexible searchable scheme which supports rating multi-keyword ranked search and synonym- based search. To address rating multi-keyword search and result ranking, Vector Space Model (VSM) is used to build document index, that is to say, each document is expressed as a vector where each dimension value is the Term Frequency (TF) weight of its corresponding keyword.

2. RELATED WORKS P.A. Cabarcos, F.A. Mendoza, R.S. Guerrero, A.M. Lopez, and D. Diaz- Sanchez, “SuSSo:proposed that[1], In this context, many services, such as music or video streaming, are delivered to the clients using Cloud-based providers.The great variety of consumer electronic devices with support of wireless communications combined with the emerging Cloud Computing paradigm is paving the way to real anytime/anywhere computing. D. Diaz-Sanchez, F. Almenarez, A. Marin, D. Proserpio, and P.A. Cabarcos:proposed that[2], Cloud computing allows accessing B.Malini, IJRIT-214

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 3, March 2015, Pg. 214-218

resources across Internet transparently: requiring no expertise in, or control over the underlying infrastructure , we propose Media Cloud, a middleware for Set-top boxes for classifying, searching, and delivering media inside home network and across the cloud that interoperates with UPnP and DLNA. S. G. Lee, D. Lee, and S. Lee[3]proposed that, It has become difficult and time consuming to find an interesting channel and program via the remote control or channel guide map. S. Kamara, and K. Lauter[4],proposed that We propose a novel scheme to reduce the consumption of the re-encryption process. This scheme is built on a series of cryptographic algorithms. The original data is split into several slices and these slices are published to the cloud storage. After a revocation occurs, we reencrypt only one slice instead of the whole data. S. Grzon kowski, and P. M. Corcoran[5] ,proposed that A user centric approach to authentication for home networks is proposed. This approach enables the sharing of personalized content and more sophisticated network-based services over a conventional TCP/IP infrastructure. R. Sanchez, F. Almenares, P. Arias, D. Diaz-Sanchez, and A. Marin,[6], proposed that . As a direct consequence, dynamic federated identity management with privacy improvements has arisen as an indispensable mechanism to enable the global scalability and usability that are required for the successful implantation of Cloud technologies. With these requirements in mind, we present an IdM architecture based on privacy and reputation extensions compliance with the SAMLv2/ID-FF standards. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou[7],proposed that Fuzzy keyword search aims at accommodating various typos and representation inconsistencies in different user searching input for acceptable system usability and overall user searching experience, while protecting keyword privacy. We describe the challenges that are not yet met by existing searchable encryption techniques and discuss the research directions and possible technical approaches for these new search functionalities to become a reality

3. PROPOSED SYSTEM Existing search approaches cannot accommodate such requirements like rating search, ranked search, multi-keywords search, semantics-based search etc. The rating is a classification according to order or grade. Rating is a classification or ranking of some or something based on their quality, standard or performance. The ranked search enables cloud customers to find the most relevant information quickly. Ranked search can also reduce network traffic as the cloud server sends back only the most relevant data. Multi-keyword search is also very important to improve search result accuracy as single keyword search often return coarse search results. To meet the challenge of effective search system, this paper proposes a practically efficient and flexible searchable scheme which supports both multi-keyword ranked rating search and synonym-based search. To address multi-keyword search and result ranking, Vector Space Model (VSM) (says database,) is used to build document index, that is to say, each document is expressed as a vector where each dimension value is the Term Frequency (TF) weight of its corresponding keyword. The contributions of this paper are summarized as follows: For the first time, a semanticsbased multi-keyword ranked rating search technology over encrypted cloud data which supports synonym queries is proposed. The search results can be achieved when authorized cloud customers input the synonyms of the predefined keywords, not the exact or fuzzy matching keywords, due to the possible synonym substitution and/or her lack of exact knowledge about the data. Extensive experiments on the real-world dataset further show the effectiveness and efficiency of proposed solution.

B.Malini, IJRIT-215

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 3, March 2015, Pg. 214-218

5. MODULES 5.1 Cloud Authorization 5.2 Content Encryption and Indexing 5.3 Effective Cloud Search over Processed Query 5.1 Cloud Authorization: In this Module, the owner will register his/her details to the cloud server provider. Then the registered data owner will upload his/her data’s to Cloud service provider. Upload can be done as private or public. Private files will be uploaded in the data owner private folder and Public files will be uploaded to common public folder. Private files will be accessed only to his/her search but the public files will be accessed to all the data users who accessing that cloud service provider. Here the files will be upload as it normal file without any encryption. Data owner will sometimes act as data user. 5.2 Content Encryption and Indexing: In this Module, data owner will create the index file from the source file which should be uploaded in the cloud service. And then source file will be encrypted with the encrypting algorithm and the encrypted file will be uploaded to the cloud service provider along with its index file. Encryption key is only known to data owner. To create index file we use Text miming Process. The Text mining process analyses the text word by word and also picks up the literal meaning behind the group of words that constitute the sentence. The Words are analyzed in Word Net ape so that the related terms can be found for use in the index file. All the communication to cloud server will be done through web service 5.3 Effective Cloud Search over Processed Query: In this Module, data owner or data user will try give query to the cloud server. The query also will be processed to find the related terms and then it will be searched in the index files. If the terms is present in more than one file, then will search results will be show according to its rank frequency. To which file, frequency is more that file will be listed first. User also will able to give rank to that particular file which will be updated in the cloud server database. Next time that according to frequency and user rank files will be listed to user. If the user selects the particular file then the Encrypted content for the particular file will be provided to the user. Then user has to decrypt that file to access using key which is used for Encryption.

6. CONCLUSION This paper, for the first time, proposes an effective approach to solve the problem of synonym-based multi- keyword ranked rating search over encrypted cloud data. The main contributions are summarized in different aspects: synonym-based search , similarity ranked search and rating search. The search results can be achieved when authorized cloud customers input the synonyms of the predefined keywords, not the exact or fuzzy matching keywords, due to the possible synonym substitution and/or her lack of exact knowledge about the data. The vector space model is adopted combined with cosine measure, which is popular in information retrieval field, to evaluate the similarity between search request and document. Finally, the performance of the proposed schemes is analyzed in detail, including search efficiency and search accuracy, by the experiment on real-world dataset. The results show that the proposed solution is very efficient and effective in supporting synonym-based searching. The next work is to research semantics-based search approaches over encrypted cloud data that support syntactic transformation, anaphora resolution and other natural language processing technology. The aim is that cloud consumers can search the most relevant products or data by using the designed system and also by using the rating search we can find the most relavant information quickly.

B.Malini, IJRIT-217

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 3, March 2015, Pg. 214-218

7. REFERENCE [1] P.A. Cabarcos, F.A. Mendoza, R.S. Guerrero, A.M. Lopez, and D. Diaz- Sanchez, “SuSSo: seamless and ubiquitous single sign-on for cloud service continuity across devices,” IEEE Trans. Consumer Electron.,vol. 58, no. 4, pp. 1425-1433, 2012. [2] D. Diaz-Sanchez, F. Almenarez, A. Marin, D. Proserpio, and P.A. Cabarcos, “Media cloud: an open cloud computing middleware for content management,” IEEE Trans. Consumer Electron., vol. 57, no. 2, pp. 970-978, 2011. [3] S. G. Lee, D. Lee, and S. Lee, “Personalized DTV program recommendation system under a cloud computing environment,” IEEE Trans. Consumer Electron., vol. 56, no. 2, pp. 1034-1042, 2010. [4] S. Kamara, and K. Lauter, “Cryptographic cloud storage,” FC 2010 Workshops, LNCS 6054, PP. 136-149, Jan. 2010. [5] S. Grzonkowski, and P. M. Corcoran, “Sharing cloud services: user authentication for social enhancement of home networking,” IEEE Trans. Consumer Electron, vol. 57, no. 3, pp. 1424-1432, 2011. [6] R. Sanchez, F. Almenares, P. Arias, D. Diaz-Sanchez, and A. Marin, “Enhancing privacy and dynamic federation in IdM for consumer cloud computing,” IEEE Trans. Consumer Electron., vol. 58, no. 1, pp. 95-103, 2012. [7] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword search over encrypted data in cloud computing,” Proceedings of IEEE INFOCOM’10 Mini-Conference, San Diego, CA, USA, pp. 1-5, Mar. 2010. [8] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encrypted cloud data,” Proceedings of IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 253-262, 2010. [9] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi- keyword ranked search over encrypted cloud data,” Proceedings of IEEE INFOCOM 2011, pp. 829-837, 2011. [10] Q. Chai, and G. Gong, “Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers,” Proceedings of IEEE International Conference on Communications (ICC’12), pp. 917-922, 2012. [11] W. Sun, B. Wang, N. Cao, M. Li, W. Lou, and Y. T. Hou, “Privacy- preserving multi-keyword text search in the cloud supporting similarity- based ranking,” ASIACCS 2013, Hangzhou, China, May 2013, pp . 71-82, 2013.

B.Malini, IJRIT-218

Multi-Keyword Rating Ranked and Semantic Based ...

consequence, dynamic federated identity management with privacy improvements has arisen as an indispensable mechanism to enable the global scalability and usability that are required for the successful implantation of Cloud technologies. With these requirements in mind, we present an IdM architecture based on ...

179KB Sizes 0 Downloads 205 Views

Recommend Documents

Mixin-based Inheritance - Semantic Scholar
Department of Computer Science ... enforces a degree of behavioral consistency between a ... reference, within the object instance being defined. The.

Czech-Sign Speech Corpus for Semantic based ... - Semantic Scholar
Marsahll, I., Safar, E., “Sign Language Generation using HPSG”, In Proceedings of the 9th International Conference on Theoretical and Methodological Issues in.

Pattern-based approaches to semantic relation ... - Semantic Scholar
assessment of semantic information that can be automatically extracted from machine readable dictionaries (MRDs). In fact, a large body of research has been ...

Amalgam-based Reuse for Multiagent Case-based ... - Semantic Scholar
configuration of an office for having good working conditions. Naturally ..... Computer. Desk, Tower. & Monitor. Cabinet. Armchair. Coach & Laptop. Bookcase.

Czech-Sign Speech Corpus for Semantic based ... - Semantic Scholar
Automatic sign language translation can use domain information to focus on ... stance, the SPEECH-ACT dimension values REQUEST-INFO and PRESENT-.

Dual Momentum Model | Ranked by Sector - SETTRADE.COM
Apr 11, 2017 - 60 PTT. ENERG. SWITCH. Neutral. Bearish. -0.25%. 0.51%. 0.00%. 2.07%. 11.61%. 32.21%. -0.3266. 0.3085. -0.5608. 0.3343. 0.2154. 0.5647.

Dual Momentum Model | Ranked by Sector - SETTRADE.COM
Apr 10, 2017 - 60 PTT. ENERG. SWITCH. Neutral. Bearish. 0.77%. 0.77%. 1.28%. 3.13%. 16.86%. 37.15%. 0.7171. 0.4258. -0.2287. 0.4275. 0.1426. 0.6920.

Towards Robust Indexing for Ranked Queries ∗
Department of Computer Science. University of Illinois at Urbana-Champaign. Urbana, IL ... Database system should be able to process the ranked queries.

Amalgam-based Reuse for Multiagent Case-based ... - Semantic Scholar
A way to compute such combinations is through amalgams [10], a formal ..... Dresser. Computer. Desk, Tower. & Monitor. Cabinet. Armchair. Coach & Laptop.

Yeast-based functional genomics and proteomics ... - Semantic Scholar
... cellular milieu. 1University of Toronto, Toronto, ON, Canada and 2Dualsystems Biotech Inc., Zurich, Switzerland ...... AD. Y. HIS3. HIS3. HIS3. Figure 7. Small molecule yeast two-hybrid screening. .... co-express the modifying enzyme along.

Shape Indexing and Semantic Image Retrieval Based on Ontological ...
Retrieval Engine by NEC USA Inc.) provides image retrieval in Web by ...... The design and implementation of the Redland RDF application framework, Proc.

Yeast-based functional genomics and proteomics ... - Semantic Scholar
... the cellular milieu. 1University of Toronto, Toronto, ON, Canada and 2Dualsystems Biotech Inc., Zurich, Switzerland ...... 160 College Street. Toronto, ON, M5S ...

Person Identification based on Palm and Hand ... - Semantic Scholar
using Pieas hand database is 96.4%. 1. ... The images in this database are captured using a simple .... Each feature is normalized before matching score to.

Shape Indexing and Semantic Image Retrieval Based on Ontological ...
Center retrieves images, graphics and video data from online collections using color, .... ular class of image collection, and w(i,j) is semantic weight associated with a class of images to which .... Mn is defined by means of two coordinates (x;y).

Contour Graph Based Human Tracking and Action ... - Semantic Scholar
Nov 28, 2008 - problems in computer vision and pattern recognition. Actually, there exist ..... first construct a graph on which matching message is transferred. This graph ..... 5231D the fifth group, back diving, 1.5 somersaults, 0.5 twists, free.

Agent Based Modelling and Simulation of the ... - Semantic Scholar
Generally, analytic treatment does not yield a complex system's ... based solutions is performed by comparing its perfomance with other approaches to the same ...

Dynamics Based Control and Continual Planning - Semantic Scholar
time-line. It is hoped that analytical tools will assist (PO)MDPs to become more ... Although the analytical properties of the system description allow control the-.

Agent Based Modelling and Simulation of the ... - Semantic Scholar
guage. Independently of the programming language, ImmSim has a very rigid ... C-ImmSim and the correspondent parallel variant, ParImm, are versions of Imm-.

Graph-based Proximity with Importance and ... - Semantic Scholar
As each edge embeds certain semantic relationship, through these ...... Intl. Conf. on Web Services. Intl. Conf. on Web ... J. Web Engineering. J. Web Semantics.

Person Identification based on Palm and Hand ... - Semantic Scholar
amount of variance among the images and the last dimension of this subspace ... A covariance matrix is created by multiplying the data matrix with its transpose.

RecoMap: An Interactive and Adaptive Map-Based ... - Semantic Scholar
School of Computer Science and Informatics. Belfield, Dublin 4 .... value at every interaction, representing the degree of inter- est expressed toward the item i ...

Dynamics Based Control and Continual Planning - Semantic Scholar
us to create a great variety of visual effects applied and utilised by Computer. 2This is, in fact, .... to what degree the system is controllable, that is, what kind of behaviours it is possible to ...... Computer Science, University of California a