SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 262
Empower syntactic exploration based on conceptual graph using
Searchable symmetric encryption
Sridharan .K 1, Shakthi.R 2, Revanth.R 3, Naveen.S 4, Shyam balaji.T 5
1Associate Professor, 2345Students of B.Tech .Information technology,
Panimalar engineering college, Chennai, Tamilnadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - At present, explorable encipher is a hot topic in
the field of cloud computing. The existing attainments are
mainly concentrated on keyword-based search schemes, and
almost all of them depend on predefined keywords extricated
in the phases of index erection and query. However, keyword-
based search schemes ignore the cognitive grammar
representation information of users’ repossession and cannot
completely match users’ search purpose. Therefore, how to
design a content-based search scheme and make cognitive
grammar search more effective and context-aware is a
difficult challenge. In this System, for the first time, we define
and solve the problems of cognitive grammar search based on
conceptual graphs(CGs) over enciphered redistributeddatain
clouding computing (SSCG).We firstly employ the efficient
measure of ”sentence scoring” in text depictionandStopwords
and stemming technique used to extract the most important
and simplified topic sentences from documents. We then
convert these simplified sentences into CGs. To perform
measurable calculation of CGs, we design a new method that
can map CGs to vectors. NER Algorithm is implemented for
conceptual graph search, so that the algorithm used to
systemize documents into five categories. Next, we executed
TF/IDF algorithm to calculate the term frequency. Based on
the term frequency, it produces the result to user. Then we
have executed the HMAC Algorithm to find the resemblance
between the documents. So the duplicate files will be
separated.
Key Words: Searchable encryption, cloud computing,
smart semantic search, conceptualgraphs,hmac,Named
entity recognition.
1. INTRODUCTION
NOWADAYS, a large number of data owners decide to store
their individual data in the cloud which can help them attain
the on-demand high-quality applications andservices.Italso
reduces the cost of data management and storage facility
spending. Due to the scalability and high efficiency of cloud
servers, the way for public data access is much more
scalable, low-cost and stable, especially for the small
enterprises. However, data owners are puzzled by the
privacy of data and existing schemes prefer to using data
encryption to solve the problem of informationleakage.How
to realize an efficient searchable encryption scheme is a
challenging and essential problem. Many existing recent
schemes are keyword-based search including single
keyword and multi-keywordsetc. These schemesallowdata
users to retrieve interested files and return related
documents in the encrypted form. However, due to
connatural localization of keywords as document
eigenvectors, the returned results are always imprecise and
unable to satisfy intention of users. That means keywordsas
a document feature are inadequate data which carry
relatively little semantic information. And some existing
schemeshope to explore the relationshipsamong keywords
to expand the retrieval results. However, when extracting
keywords from documents, the relationships among
keywords are out of consideration which leads to the
limitation of these schemes. So exploring a new knowledge
representation with more semantic information compared
with keywords to realize searchable encryption is a
challenging and essential task. To solve the problem, we
introduce Conceptual Graph (CG) as a knowledge
representation tool In this System. CG is a structure for
knowledge representation based on first logic. They are
natural, simple and fine-grained semanticrepresentationsto
depict texts. A CG is a finite, connected and bipartite graph.
2. PROPOSED SYSTEM
For the first time, we define the problem of semantic search
based on conceptual graphsover encryptedoutsourceddata,
and provide an effective method to perform a secure ranked
search. Additionally, we define and present a round system
of semantic search based on conceptual graphs over
encrypted outsourced data.
Rather than employing traditional keywords as our
knowledge representation tool, we use conceptualgraphsto
realize real semantic search in encryptedform.Weproposea
new practical and processing method of mapping CGs to
vectors that makes quantitative calculation of CGs possible.
Extensive experimental results demonstrate the
effectiveness and efficiency of the proposed solution. We
proposed Named Entity recognition algorithm is used to
classify the files into attributes like organization, location,
date, person name etc.
Next, we implemented TF/IDF algorithm to calculate the
term frequency. Based on the term frequency, it produces
the result to user. Then we have implemented the HMAC
Algorithm to find the similarity between the documents. So
the duplicate files will be separated.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 263
2.1 MODULE DESCRIPTION:
1. Data Owner
Data owner needs to login first and can upload the file to
cloud and can view his own file. User Request for file
download can be activated by data owner and sends key to
the User. The data owner is responsible for collecting
documents, building document index and outsourcing them
in an encrypted format to the cloud server.
2. Data User
User needs to register before login by giving his/her own
details. After Login, user sends request to the data ownerfor
search. He/She can search in two ways
i)Normal Search
In Normal search, user can search by file name.
ii)Fine Search
In Fine search, User can search by the content inside the
file like he/she can search by any words which is present
in the file.
iii) Conceptual search
Here User can search by the attributes like organization,
location, date, person name, etc. The File which is uploaded
by the data owner is to classify the files into attributes like
organisation, location, date, person name etc.
If user wants to download the file, he/she has to get
authorization from the data owner. The data user needs to
get the authorization from the data owner before accessing
to the data. By using the attributes also User can search and
download the required file.
3. Cloud Server
In this Module, The cloud can view both the data user and
data owner informations. The Data which is uploaded bythe
data owner can be stored in the cloud.
3. ALGORITHM
3.1 STOP WORDS REMOVAL
A dictionary based approach is been utilized to
remove stopword from document. A generic stopword list
containing 75 stopwords created using hybrid approach is
used. The algorithm is implemented as below given steps.
The target text is tokenized and individual words are stored
in array. A single stop word is read from stopword list. The
stop word is compared to target text in form of array using
sequential search technique. If it matches , the wordinarray
is removed , and the comparison is continued till length of
array. After removal of stopword completely, another
stopword is read from stopword list and again algorithm
runs continuously until all the stopwords are compared.
Resultant text devoid of stopwords is displayed, also
required statistics like stopword removed, no. of
stopwords removed from target text, total count of
words in target text, count of words in resultant text,
individual stop word count found in target text is
displayed.
3.2 NAMED ENTITY RECOGNITION
Named-entity recognition (NER) (also known as entity
identification, entity chunking and entity extraction) is a
subtask of information extraction that seeks to locate and
classify named entities in text into pre-defined categories
such as the names of persons, organizations, locations,
expressions of times, quantities, monetary values,
percentages, etc.
ALGORITHM:
For i=1 to n do //n:number of molecules
W[i] =4; //Start by the value of width equal to four
a=Size[i]mod W [i];//size of molecule [i]
if(a=0)then
h[i] = size [i] div w[i];
Call function verify (h[i],w[i]);
end if;
else
h[i] = (Size [i] div w[i]) + 1;
goto verify (h[i],w[i]);
write module M[i](h[i]; w[i]);
Call function KNER
Return the list of all NER
Place the module [i] in the first adequate NER start from the
left to right
If placement is found then Module accepted
End if;
Else
Module Rejected
end for;
3.3 TERM DOCUMENT FREQUENCY
First, the document frequency of each term in N and T is
calculated accordingly. In the case of term set N, the
document frequency of each term n is equal tothenumberof
files (from dates d1 to d2) in which n has been selected as a
keyword; it is represented asdf(n). The documentfrequency
of each term t in set T is calculated in a similar fashion.
3.4 DES ALGORITHM
DES key length and brute-force attacks. The DataEncryption
Standard is a block cipher, meaning a cryptographic key and
algorithm are applied to a block of data simultaneously
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 264
rather than one bit at a time. To encrypt a plaintext message,
DES groups it into 64-bit blocks
3.5 HMAC ALGORITHM
In cryptography, a keyed-hash message authentication code
(HMAC) is a specific type of message authentication code
(MAC) involving a cryptographic hash function and a secret
cryptographic key. It may be used to simultaneously verify
both the data integrity and the authentication of a message,
as with any MAC. Any cryptographic hash function, such as
MD5 or SHA-1, may be used in the calculation of an HMAC;
the resulting MAC algorithm is termed HMAC-X, where X is
the hash function used (e.g. HMAC-MD5 or HMAC-SHA1).
The cryptographic strength of the HMAC depends upon the
cryptographic strength of the underlying hash function, the
size of its hash output, and the size and quality of the key.
ALGORITHM
Function hmac
Inputs
Key : Bytes array of bytes
message : Bytes array of bytes to be hashed
hash : Function the hash function to use (e.g. SHA-1)
blockSize: Integer the block size of the underlying hash
function (e.g. 64 bytes for SHA-1)
outputSize: Integer the output size of the underlying hash
function (e.g. 20 bytes for SHA-1)
Keys longer than blockSize are shortened by hashing them
if (length(key) > blockSize) then
key ← hash(key) //Key becomes outputSize bytes long
Keys shorter than blockSize are padded to blockSize by
padding with zeros on the right
if (length(key) < blockSize) then
key ← Pad(key, blockSize) //pad key with zeros to make it
blockSize bytes long
o_key_pad = key xor [0x5c * blockSize] //Outer paddedkey
i_key_pad = key xor [0x36 * blockSize] //Inner padded key
return hash(o_key_pad ∥ hash(i_key_pad ∥ message))
//Where ∥ is concatenation
5. ARCHITECTURE:
Fig -1: The architecture of ranked search over encrypted
cloud data.
We summarize our system model showed in Fig. 1 which
includes three entities: data owner, data user and cloud
server.
1) Data Owner:
Data owner owns n data files F = {F1, F2,...,Fn}that he
encrypts his source documents before they are outsourced
to the cloud server. Also, he must guarantee that these
documents can be searched effectively. In this System, the
data owner encrypts their documents set and generates
searchable indexes before outsourcing data to the cloud
server. Besides this, the pre-process work such as the
construction of CG, the transformation of CGintovectorsand
the update operation of documentsshould behandledahead
of time. The data user also should make a securedistribution
of the key information of trapdoor generation and provide
authorization for authorized data users.
2) Data Users
Data usersshould obtain a warrant from data owner to have
access to documents. Data users should submit a simple
sentence to generate a trapdoor and take back the
documents which meet his requirement from the cloud
server.
3) Cloud Server
Cloud server receives the store request from the data owner
and execute the operation of storing the encrypted
documents and searchable indexes. When the data users
send the trapdoor to the cloud server, the cloud server
makes a computation of relevance scores and returns top-k
related documentsto the data users. The cloud server isalso
responsible for executing the command of updating
documents and searchable indexes.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 265
6. CONCLUSIONS
In this System, compared with the previous study, we
propose two more secure and efficient schemes to solve the
problem of privacy-preserving smart semantic searchbased
on conceptual graphs over encrypted outsourced data.
Considering various semantic representationtools,weselect
Conceptual Graphs as our semantic carrier because of its
excellent ability of expression and extension.Toimprovethe
accuracy of retrieval, we use Tregex simplify the key
sentence and make it more generalizable. We transfer CG
into its linear form with some modification creatively which
makes quantitative calculation on CG and fuzzy retrieval in
semantic level possible. We use different methods to
generate indexes and construct two different schemes with
two enhanced schemes respectively against two threat
models by introducing the frame of MRSE. We implement
our scheme on the real data set to prove itseffectivenessand
efficiency. For the further work, we will explore the
possibility of semantic search over encrypted cloud data
with natural language processing technology.
7. ACKNOWLEDGEMENT
A project of this magnitude and nature requires kind co-
operation and support from many, for successful
completion . We wish to express our sincere thanks to all
those who were involved in the completion of this project.
8. REFERENCES
[1] S.Miranda-Jimnez, A.Gelbukh, and G.Sidorov,
”Summarizing conceptual graphs for automatic
summarization task,” Conceptual Structures for STEM
Research and Education,Springer Berlin Heidelberg,pp.245-
253,2013.
[2] R.Ferreira, L.de Souza Cabral, and R.D.Lins, ”Assessing
sentence scoring techniques for extractive text
summarization,” Expert systems with
applications,vol.40,no.14,pp.5755-5764,2013.
[3] M.Liu, R.Calvo, and A.Aditomo, ”Using wikipedia and
conceptual graph structures to generate questions for
academic writing support,” Learning Technologies,IEEE
Transactions on,vol.5,no.3,pp.251- 263,2012.
[4] M.Heilman, and N.A.Smith, ”Extracting simplified
statements for factual question generation ,” Proceedings of
QG2010: The Third Workshop on Question
Generation,pp.11-20,2010.
[5]D.X.Song,D.Wagner,andA.Perrig,”Practicaltechniquesforse
arches on encrypted data,” Proceedings of Security and
Privacy,2000 IEEE Symposium on,pp.44-55,2000.
[6] Y.-C.Chang and M.Mitzenmacher, ”Privacy preserving
keyword searches on remote encrypted data,” Proceedings
of ACNS,pp.391421,2005.
[7] R.Curtmola, J.A.Garay, S.Kamara, and R.Ostrovsky,
”Searchable symmetric encryption:improveddefinitionsand
efficient constructions,” Proceedings of ACM CCS,pp.79-
88,2006.
[8] C.Wang, N.Cao, and J.Li, ”Secure ranked keyword search
over encrypted cloud data,” Proceedings of Distributed
Computing Systems (ICDCS),2010 IEEE 30th International
Conference on,pp.253-262,2010.
[9] N.Cao, C.Wang, and M.Li, ”Privacy-preserving multi-
keyword ranked search over encrypted cloud data,” Parallel
and Distributed Systems,IEEE Transactions
on,vol.25,no.1,pp.222-233,2014.
[10] W.Sun, B.Wang, and N.Cao, ”Privacy-preserving multi-
keyword text search in the cloudsupportingsimilarity-based
ranking,” Proceedingsof the 8th ACM SIGSAC symposiumon
Information,computer and communications security,pp.71-
82,2013.
[11] R.Li, Z.Xu, and W.Kang, ”Efficient multi-keywordranked
query over encrypted data in cloud computing,” Future
Generation Computer Systems,vol.30,pp.179-190,2014.
[12] Z.Fu, X.Sun, and Q.Liu, ” Achieving EfficientCloudSearch
Services: Multi-keyword Ranked Search over Encrypted
Cloud Data Supporting Parallel Computing,” IEICE
Transactions on Communications, vol.98,no.1,pp.190-
200,2015.
[13] Z.Xia, X.Wang, and X.Sun, ”A Secure and Dynamic
Multikeyword Ranked Search Scheme over EncryptedCloud
Data,”Parallel and DistributedSystems,IEEETransactionson,
vo.27,no.2,pp.340-352,2015.
[14] Z.Fu, J.Shu, and X.Sun, ”Semantic keyword search based
on trie over encrypted cloud data,” Proceedings of the 2nd
international workshop onSecurityincloudcomputing,ACM,
pp.59-62,2014.
[15] J.F.Sowa, ”Conceptual structures: information
processing in mind and machine,” 1983.

More Related Content

What's hot

A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the TrapdoorsA Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the TrapdoorsIRJET Journal
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataIRJET Journal
 
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...IRJET Journal
 
Query Processing with k-Anonymity
Query Processing with k-AnonymityQuery Processing with k-Anonymity
Query Processing with k-AnonymityWaqas Tariq
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search IRJET Journal
 
K anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseK anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseLeMeniz Infotech
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET Journal
 
Privacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymityPrivacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymityHiroshi Nakagawa
 
IRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLPIRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLPIRJET Journal
 
IRJET- Review on Information Retrieval for Desktop Search Engine
IRJET-  	  Review on Information Retrieval for Desktop Search EngineIRJET-  	  Review on Information Retrieval for Desktop Search Engine
IRJET- Review on Information Retrieval for Desktop Search EngineIRJET Journal
 
Conformer-Kernel with Query Term Independence @ TREC 2020 Deep Learning Track
Conformer-Kernel with Query Term Independence @ TREC 2020 Deep Learning TrackConformer-Kernel with Query Term Independence @ TREC 2020 Deep Learning Track
Conformer-Kernel with Query Term Independence @ TREC 2020 Deep Learning TrackBhaskar Mitra
 
Ieeepro techno solutions ieee java project - vabks verifiable attribute-base...
Ieeepro techno solutions  ieee java project - vabks verifiable attribute-base...Ieeepro techno solutions  ieee java project - vabks verifiable attribute-base...
Ieeepro techno solutions ieee java project - vabks verifiable attribute-base...hemanthbbc
 
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...IRJET Journal
 
IRJET- Information Retrieval & Text Analytics using Artificial Intelligence
IRJET- Information Retrieval & Text Analytics using Artificial IntelligenceIRJET- Information Retrieval & Text Analytics using Artificial Intelligence
IRJET- Information Retrieval & Text Analytics using Artificial IntelligenceIRJET Journal
 
Document Classification Using Expectation Maximization with Semi Supervised L...
Document Classification Using Expectation Maximization with Semi Supervised L...Document Classification Using Expectation Maximization with Semi Supervised L...
Document Classification Using Expectation Maximization with Semi Supervised L...ijsc
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET Journal
 

What's hot (19)

A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the TrapdoorsA Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
A Novel Additive Order Protocol in Cloud Storage and Avoiding the Trapdoors
 
Efficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted DataEfficient Similarity Search Over Encrypted Data
Efficient Similarity Search Over Encrypted Data
 
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
 
Query Processing with k-Anonymity
Query Processing with k-AnonymityQuery Processing with k-Anonymity
Query Processing with k-Anonymity
 
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search        Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
 
K anonymity for crowdsourcing database
K anonymity for crowdsourcing databaseK anonymity for crowdsourcing database
K anonymity for crowdsourcing database
 
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
IRJET- Top-K Query Processing using Top Order Preserving Encryption (TOPE)
 
Privacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymityPrivacy Protectin Models and Defamation caused by k-anonymity
Privacy Protectin Models and Defamation caused by k-anonymity
 
IRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLPIRJET - Event Notifier on Scraped Mails using NLP
IRJET - Event Notifier on Scraped Mails using NLP
 
Ju3517011704
Ju3517011704Ju3517011704
Ju3517011704
 
EXECUTION OF ASSOCIATION RULE MINING WITH DATA GRIDS IN WEKA 3.8
EXECUTION OF ASSOCIATION RULE MINING WITH DATA GRIDS IN WEKA 3.8EXECUTION OF ASSOCIATION RULE MINING WITH DATA GRIDS IN WEKA 3.8
EXECUTION OF ASSOCIATION RULE MINING WITH DATA GRIDS IN WEKA 3.8
 
IRJET- Review on Information Retrieval for Desktop Search Engine
IRJET-  	  Review on Information Retrieval for Desktop Search EngineIRJET-  	  Review on Information Retrieval for Desktop Search Engine
IRJET- Review on Information Retrieval for Desktop Search Engine
 
Private datawarehouse queries
Private datawarehouse queriesPrivate datawarehouse queries
Private datawarehouse queries
 
Conformer-Kernel with Query Term Independence @ TREC 2020 Deep Learning Track
Conformer-Kernel with Query Term Independence @ TREC 2020 Deep Learning TrackConformer-Kernel with Query Term Independence @ TREC 2020 Deep Learning Track
Conformer-Kernel with Query Term Independence @ TREC 2020 Deep Learning Track
 
Ieeepro techno solutions ieee java project - vabks verifiable attribute-base...
Ieeepro techno solutions  ieee java project - vabks verifiable attribute-base...Ieeepro techno solutions  ieee java project - vabks verifiable attribute-base...
Ieeepro techno solutions ieee java project - vabks verifiable attribute-base...
 
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
A Robust Keywords Based Document Retrieval by Utilizing Advanced Encryption S...
 
IRJET- Information Retrieval & Text Analytics using Artificial Intelligence
IRJET- Information Retrieval & Text Analytics using Artificial IntelligenceIRJET- Information Retrieval & Text Analytics using Artificial Intelligence
IRJET- Information Retrieval & Text Analytics using Artificial Intelligence
 
Document Classification Using Expectation Maximization with Semi Supervised L...
Document Classification Using Expectation Maximization with Semi Supervised L...Document Classification Using Expectation Maximization with Semi Supervised L...
Document Classification Using Expectation Maximization with Semi Supervised L...
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
 

Similar to Semantic search over encrypted data using conceptual graphs

Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeIRJET Journal
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...IRJET Journal
 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankednexgentech15
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...IRJET Journal
 
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
Secure Syntactic key Ranked Search over Encrypted Cloud in DataSecure Syntactic key Ranked Search over Encrypted Cloud in Data
Secure Syntactic key Ranked Search over Encrypted Cloud in DataIJERA Editor
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...1crore projects
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...1crore projects
 
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET Journal
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPAM Publications
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET Journal
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEEMEMTECHSTUDENTPROJECTS
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataCloudTechnologies
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search overIEEEFINALSEMSTUDENTPROJECTS
 

Similar to Semantic search over encrypted data using conceptual graphs (20)

Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
Implementation and Review Paper of Secure and Dynamic Multi Keyword Search in...
 
A secure and dynamic multi keyword ranked
A secure and dynamic multi keyword rankedA secure and dynamic multi keyword ranked
A secure and dynamic multi keyword ranked
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
 
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
Secure Syntactic key Ranked Search over Encrypted Cloud in DataSecure Syntactic key Ranked Search over Encrypted Cloud in Data
Secure Syntactic key Ranked Search over Encrypted Cloud in Data
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search overIEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
 
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataPrivacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Semantic search over encrypted data using conceptual graphs

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 262 Empower syntactic exploration based on conceptual graph using Searchable symmetric encryption Sridharan .K 1, Shakthi.R 2, Revanth.R 3, Naveen.S 4, Shyam balaji.T 5 1Associate Professor, 2345Students of B.Tech .Information technology, Panimalar engineering college, Chennai, Tamilnadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - At present, explorable encipher is a hot topic in the field of cloud computing. The existing attainments are mainly concentrated on keyword-based search schemes, and almost all of them depend on predefined keywords extricated in the phases of index erection and query. However, keyword- based search schemes ignore the cognitive grammar representation information of users’ repossession and cannot completely match users’ search purpose. Therefore, how to design a content-based search scheme and make cognitive grammar search more effective and context-aware is a difficult challenge. In this System, for the first time, we define and solve the problems of cognitive grammar search based on conceptual graphs(CGs) over enciphered redistributeddatain clouding computing (SSCG).We firstly employ the efficient measure of ”sentence scoring” in text depictionandStopwords and stemming technique used to extract the most important and simplified topic sentences from documents. We then convert these simplified sentences into CGs. To perform measurable calculation of CGs, we design a new method that can map CGs to vectors. NER Algorithm is implemented for conceptual graph search, so that the algorithm used to systemize documents into five categories. Next, we executed TF/IDF algorithm to calculate the term frequency. Based on the term frequency, it produces the result to user. Then we have executed the HMAC Algorithm to find the resemblance between the documents. So the duplicate files will be separated. Key Words: Searchable encryption, cloud computing, smart semantic search, conceptualgraphs,hmac,Named entity recognition. 1. INTRODUCTION NOWADAYS, a large number of data owners decide to store their individual data in the cloud which can help them attain the on-demand high-quality applications andservices.Italso reduces the cost of data management and storage facility spending. Due to the scalability and high efficiency of cloud servers, the way for public data access is much more scalable, low-cost and stable, especially for the small enterprises. However, data owners are puzzled by the privacy of data and existing schemes prefer to using data encryption to solve the problem of informationleakage.How to realize an efficient searchable encryption scheme is a challenging and essential problem. Many existing recent schemes are keyword-based search including single keyword and multi-keywordsetc. These schemesallowdata users to retrieve interested files and return related documents in the encrypted form. However, due to connatural localization of keywords as document eigenvectors, the returned results are always imprecise and unable to satisfy intention of users. That means keywordsas a document feature are inadequate data which carry relatively little semantic information. And some existing schemeshope to explore the relationshipsamong keywords to expand the retrieval results. However, when extracting keywords from documents, the relationships among keywords are out of consideration which leads to the limitation of these schemes. So exploring a new knowledge representation with more semantic information compared with keywords to realize searchable encryption is a challenging and essential task. To solve the problem, we introduce Conceptual Graph (CG) as a knowledge representation tool In this System. CG is a structure for knowledge representation based on first logic. They are natural, simple and fine-grained semanticrepresentationsto depict texts. A CG is a finite, connected and bipartite graph. 2. PROPOSED SYSTEM For the first time, we define the problem of semantic search based on conceptual graphsover encryptedoutsourceddata, and provide an effective method to perform a secure ranked search. Additionally, we define and present a round system of semantic search based on conceptual graphs over encrypted outsourced data. Rather than employing traditional keywords as our knowledge representation tool, we use conceptualgraphsto realize real semantic search in encryptedform.Weproposea new practical and processing method of mapping CGs to vectors that makes quantitative calculation of CGs possible. Extensive experimental results demonstrate the effectiveness and efficiency of the proposed solution. We proposed Named Entity recognition algorithm is used to classify the files into attributes like organization, location, date, person name etc. Next, we implemented TF/IDF algorithm to calculate the term frequency. Based on the term frequency, it produces the result to user. Then we have implemented the HMAC Algorithm to find the similarity between the documents. So the duplicate files will be separated.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 263 2.1 MODULE DESCRIPTION: 1. Data Owner Data owner needs to login first and can upload the file to cloud and can view his own file. User Request for file download can be activated by data owner and sends key to the User. The data owner is responsible for collecting documents, building document index and outsourcing them in an encrypted format to the cloud server. 2. Data User User needs to register before login by giving his/her own details. After Login, user sends request to the data ownerfor search. He/She can search in two ways i)Normal Search In Normal search, user can search by file name. ii)Fine Search In Fine search, User can search by the content inside the file like he/she can search by any words which is present in the file. iii) Conceptual search Here User can search by the attributes like organization, location, date, person name, etc. The File which is uploaded by the data owner is to classify the files into attributes like organisation, location, date, person name etc. If user wants to download the file, he/she has to get authorization from the data owner. The data user needs to get the authorization from the data owner before accessing to the data. By using the attributes also User can search and download the required file. 3. Cloud Server In this Module, The cloud can view both the data user and data owner informations. The Data which is uploaded bythe data owner can be stored in the cloud. 3. ALGORITHM 3.1 STOP WORDS REMOVAL A dictionary based approach is been utilized to remove stopword from document. A generic stopword list containing 75 stopwords created using hybrid approach is used. The algorithm is implemented as below given steps. The target text is tokenized and individual words are stored in array. A single stop word is read from stopword list. The stop word is compared to target text in form of array using sequential search technique. If it matches , the wordinarray is removed , and the comparison is continued till length of array. After removal of stopword completely, another stopword is read from stopword list and again algorithm runs continuously until all the stopwords are compared. Resultant text devoid of stopwords is displayed, also required statistics like stopword removed, no. of stopwords removed from target text, total count of words in target text, count of words in resultant text, individual stop word count found in target text is displayed. 3.2 NAMED ENTITY RECOGNITION Named-entity recognition (NER) (also known as entity identification, entity chunking and entity extraction) is a subtask of information extraction that seeks to locate and classify named entities in text into pre-defined categories such as the names of persons, organizations, locations, expressions of times, quantities, monetary values, percentages, etc. ALGORITHM: For i=1 to n do //n:number of molecules W[i] =4; //Start by the value of width equal to four a=Size[i]mod W [i];//size of molecule [i] if(a=0)then h[i] = size [i] div w[i]; Call function verify (h[i],w[i]); end if; else h[i] = (Size [i] div w[i]) + 1; goto verify (h[i],w[i]); write module M[i](h[i]; w[i]); Call function KNER Return the list of all NER Place the module [i] in the first adequate NER start from the left to right If placement is found then Module accepted End if; Else Module Rejected end for; 3.3 TERM DOCUMENT FREQUENCY First, the document frequency of each term in N and T is calculated accordingly. In the case of term set N, the document frequency of each term n is equal tothenumberof files (from dates d1 to d2) in which n has been selected as a keyword; it is represented asdf(n). The documentfrequency of each term t in set T is calculated in a similar fashion. 3.4 DES ALGORITHM DES key length and brute-force attacks. The DataEncryption Standard is a block cipher, meaning a cryptographic key and algorithm are applied to a block of data simultaneously
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 264 rather than one bit at a time. To encrypt a plaintext message, DES groups it into 64-bit blocks 3.5 HMAC ALGORITHM In cryptography, a keyed-hash message authentication code (HMAC) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. It may be used to simultaneously verify both the data integrity and the authentication of a message, as with any MAC. Any cryptographic hash function, such as MD5 or SHA-1, may be used in the calculation of an HMAC; the resulting MAC algorithm is termed HMAC-X, where X is the hash function used (e.g. HMAC-MD5 or HMAC-SHA1). The cryptographic strength of the HMAC depends upon the cryptographic strength of the underlying hash function, the size of its hash output, and the size and quality of the key. ALGORITHM Function hmac Inputs Key : Bytes array of bytes message : Bytes array of bytes to be hashed hash : Function the hash function to use (e.g. SHA-1) blockSize: Integer the block size of the underlying hash function (e.g. 64 bytes for SHA-1) outputSize: Integer the output size of the underlying hash function (e.g. 20 bytes for SHA-1) Keys longer than blockSize are shortened by hashing them if (length(key) > blockSize) then key ← hash(key) //Key becomes outputSize bytes long Keys shorter than blockSize are padded to blockSize by padding with zeros on the right if (length(key) < blockSize) then key ← Pad(key, blockSize) //pad key with zeros to make it blockSize bytes long o_key_pad = key xor [0x5c * blockSize] //Outer paddedkey i_key_pad = key xor [0x36 * blockSize] //Inner padded key return hash(o_key_pad ∥ hash(i_key_pad ∥ message)) //Where ∥ is concatenation 5. ARCHITECTURE: Fig -1: The architecture of ranked search over encrypted cloud data. We summarize our system model showed in Fig. 1 which includes three entities: data owner, data user and cloud server. 1) Data Owner: Data owner owns n data files F = {F1, F2,...,Fn}that he encrypts his source documents before they are outsourced to the cloud server. Also, he must guarantee that these documents can be searched effectively. In this System, the data owner encrypts their documents set and generates searchable indexes before outsourcing data to the cloud server. Besides this, the pre-process work such as the construction of CG, the transformation of CGintovectorsand the update operation of documentsshould behandledahead of time. The data user also should make a securedistribution of the key information of trapdoor generation and provide authorization for authorized data users. 2) Data Users Data usersshould obtain a warrant from data owner to have access to documents. Data users should submit a simple sentence to generate a trapdoor and take back the documents which meet his requirement from the cloud server. 3) Cloud Server Cloud server receives the store request from the data owner and execute the operation of storing the encrypted documents and searchable indexes. When the data users send the trapdoor to the cloud server, the cloud server makes a computation of relevance scores and returns top-k related documentsto the data users. The cloud server isalso responsible for executing the command of updating documents and searchable indexes.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 265 6. CONCLUSIONS In this System, compared with the previous study, we propose two more secure and efficient schemes to solve the problem of privacy-preserving smart semantic searchbased on conceptual graphs over encrypted outsourced data. Considering various semantic representationtools,weselect Conceptual Graphs as our semantic carrier because of its excellent ability of expression and extension.Toimprovethe accuracy of retrieval, we use Tregex simplify the key sentence and make it more generalizable. We transfer CG into its linear form with some modification creatively which makes quantitative calculation on CG and fuzzy retrieval in semantic level possible. We use different methods to generate indexes and construct two different schemes with two enhanced schemes respectively against two threat models by introducing the frame of MRSE. We implement our scheme on the real data set to prove itseffectivenessand efficiency. For the further work, we will explore the possibility of semantic search over encrypted cloud data with natural language processing technology. 7. ACKNOWLEDGEMENT A project of this magnitude and nature requires kind co- operation and support from many, for successful completion . We wish to express our sincere thanks to all those who were involved in the completion of this project. 8. REFERENCES [1] S.Miranda-Jimnez, A.Gelbukh, and G.Sidorov, ”Summarizing conceptual graphs for automatic summarization task,” Conceptual Structures for STEM Research and Education,Springer Berlin Heidelberg,pp.245- 253,2013. [2] R.Ferreira, L.de Souza Cabral, and R.D.Lins, ”Assessing sentence scoring techniques for extractive text summarization,” Expert systems with applications,vol.40,no.14,pp.5755-5764,2013. [3] M.Liu, R.Calvo, and A.Aditomo, ”Using wikipedia and conceptual graph structures to generate questions for academic writing support,” Learning Technologies,IEEE Transactions on,vol.5,no.3,pp.251- 263,2012. [4] M.Heilman, and N.A.Smith, ”Extracting simplified statements for factual question generation ,” Proceedings of QG2010: The Third Workshop on Question Generation,pp.11-20,2010. [5]D.X.Song,D.Wagner,andA.Perrig,”Practicaltechniquesforse arches on encrypted data,” Proceedings of Security and Privacy,2000 IEEE Symposium on,pp.44-55,2000. [6] Y.-C.Chang and M.Mitzenmacher, ”Privacy preserving keyword searches on remote encrypted data,” Proceedings of ACNS,pp.391421,2005. [7] R.Curtmola, J.A.Garay, S.Kamara, and R.Ostrovsky, ”Searchable symmetric encryption:improveddefinitionsand efficient constructions,” Proceedings of ACM CCS,pp.79- 88,2006. [8] C.Wang, N.Cao, and J.Li, ”Secure ranked keyword search over encrypted cloud data,” Proceedings of Distributed Computing Systems (ICDCS),2010 IEEE 30th International Conference on,pp.253-262,2010. [9] N.Cao, C.Wang, and M.Li, ”Privacy-preserving multi- keyword ranked search over encrypted cloud data,” Parallel and Distributed Systems,IEEE Transactions on,vol.25,no.1,pp.222-233,2014. [10] W.Sun, B.Wang, and N.Cao, ”Privacy-preserving multi- keyword text search in the cloudsupportingsimilarity-based ranking,” Proceedingsof the 8th ACM SIGSAC symposiumon Information,computer and communications security,pp.71- 82,2013. [11] R.Li, Z.Xu, and W.Kang, ”Efficient multi-keywordranked query over encrypted data in cloud computing,” Future Generation Computer Systems,vol.30,pp.179-190,2014. [12] Z.Fu, X.Sun, and Q.Liu, ” Achieving EfficientCloudSearch Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing,” IEICE Transactions on Communications, vol.98,no.1,pp.190- 200,2015. [13] Z.Xia, X.Wang, and X.Sun, ”A Secure and Dynamic Multikeyword Ranked Search Scheme over EncryptedCloud Data,”Parallel and DistributedSystems,IEEETransactionson, vo.27,no.2,pp.340-352,2015. [14] Z.Fu, J.Shu, and X.Sun, ”Semantic keyword search based on trie over encrypted cloud data,” Proceedings of the 2nd international workshop onSecurityincloudcomputing,ACM, pp.59-62,2014. [15] J.F.Sowa, ”Conceptual structures: information processing in mind and machine,” 1983.