SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 112
Efficient and Empiric Keyword Search Using Cloud
S.S. Swethapriyadarshni1, S.Swathi Priya2, P.Yuvarani3, K.Hemapriya4
1’2’3Panimalar Institute of Technology
4Assistant Professor, Dept. of Computer Science Engineering, Panimalar Institute of Technology, Chennai,
TamilNadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud is a Centralized Architecture Server, which serves as a platformforeveryuserofthecloudwanted tostoredata
and sensitive information’s in safe secured storage space. The next logical stage in the growth of on-demand information
technology services and products is cloud computing. Cloud computing will rely on virtualized resources to a considerable extent.
Cloud computing allows IT skills to be reused, and it always includes current computing services such as distributed and grid
computing. Users can perform a keyword-based search over encrypted material with searchable encryption. The majority of
currently available searchable encryption systems arebasedonasinglecloudserverapproach, whichhassome drawbacks, such as
a single point of failure and hostile insiders. The multi cloud server strategy, ontheother hand, providesmoredataavailabilityand
security. However, transferring existing keyword search strategies to the multi cloud will result in higher storage and search
expenses, with no discernible improvement in data security. In addition, unlike single cloud, a challenge in a multi cloud
environment is how to adequately check query integrity when certain cloudserversreturninaccurateorincompletedata. Weoffer
an iterative encryption approach to assure file privacy even if numerous cloud services collude with one another to ensure data
security.
Key Words: Cloud computing, Cloud Server, Encryption, Decryption, Multicloud, AES
1. INTRODUCTION
Cloud computing has several attributes, blockchain,forwardapproach,andcryptosystem-basedapproachesareaccustomedto
preserving security. The cloud infrastructurehasseveral characteristicsthey'reremotelyhosted,ubiquitous,andcommodified.
Currently, several firms are delivering cloud services example Google, Microsoft, etc… Virtualization is an associate degree
abstraction of execution of the cloud, so virtual machines are used. To preserve the info, the info is encrypted before
outsourcing it to the cloud. Cloud sourcing is turning into a giant deal as a result of its high scale usage and has inexpensive
suppliers. There are also problems concerning the policy and access that are overcome by the cloud organization. One of the
main challenges of the cloud is the constant net throughout the storage of information. Cloud Computing is the sought-after
network access split pool organized computing riches.
1.1 SCOPE OF THE PROJECT
With searchable encryption, users can do a keyword-based search across encrypted material. The bulk of searchable
encryption solutions currently available are based on a single cloud server architecture, whichhasseveral disadvantagessuch
as a single point of failure and hostile insiders. The use of several cloud servers, on the other hand, increases data availability
and security. Transferring existing keyword search strategies to the multicloud, on the other hand, will increase storage and
search costs while providing no noticeable improvement in data security. One of these services is Amazon Elastic Compute
Cloud (EC2), which allows users to have a virtual cluster of computers available at all times through the Internet. On AWS,
virtual computers have hardware central processing units (CPUs) and graphics processingunits(GPUs)forprocessing,aswell
as local/RAM memory, hard disk/SSD storage, a choice of operating systems, networking,andpre-loadedapplicationsoftware
such as web servers, databases, and customer relationship management (CRM). The project's goal is to integrate keyword
search across various clouds so that users can quickly locate a specific file or data, and to prevent the involvement of third
parties so that data is secure and protected.
1.2 EXISTING SYSTEM
Without needing to learn the plaintexts, searchable encryption allows a cloud server toconductkeywordsearches onbehalfof
data users over encrypted data. The majority of currently available searchable encryption systems, on the other hand, only
support single or conjunctive keyword searches, and the few schemes that can perform expressive keyword searches are
computationally inefficient because they are built from bilinear pairings over composite-order groups. In existingsystems,an
expressive public-key searchable encryption technique in the prime-order groups outperforms existingschemessignificantly
by allowing keyword search rules to be defined in conjunctive, disjunctive, or any monotonic Boolean formulas. When a user
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 113
obtains data from a concerned person via the internet, unknown or invalidusersmaygainaccesstothedata stored ona central
server or database. It could result in data being lost or altered by a third party. Most existing PEKS methods, regardless of
search authorisation, focus on data consumers'richsearchfunctionalities.Theframework allowsclientstosendencrypteddata
to the cloud, allows users to search for documents using different keywords, and allows them to check the server's response.
2. PROPOSED SYSTEM
Encrypting a file, then making n copies of it, and distributing the n copies to n cloud servers is astraightforward filedistribution
solution in numerous clouds. Userscan still retrieve the fileeven if (n-1)cloudserversareofflineinthissituation,indicatingthat
this distribution mechanism is highly reliable. The cloud server is merely aware that if it engages in unethical behavior, it will
almost certainly be discovered. The suggested design reduces storage overhead on both the client and user sides. The retrieval
timelowers as the number of documents increases, cuttingstorage costs forboth parties. However,thismethodnecessitatesan
excessive amount of storageoverhead. Furthermore,becauseeachcloudserverhasaccesstotheentireencryptedfile,webuilda
secureand reliable file distribution strategy in various clouds to strike a better balance between storageoverhead,privacy,and
reliability. We present an iterative encryption strategy inspired by the two-layer encryption scheme to preserve the privacy of
data files even if numerous cloud serversstart a collusionattackatthesametime.Inthissystem,userscanalsoproducea unique
code to gain access to a record from an authorized individual. It will provide users with a safe access method as well as protect
unknown individuals from dangerous activities.
Output-1: User login page
Output-2: Registration page
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 114
Output-3: Keyword Searching page
Output-4: Response page
Output-5: AWS Cloud shell
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 115
Output-6: Fetched data from AWS Cloud shell
3. CONCLUSIONS
In this, we propose a solid and certain keyword search conspire in different mists, which permits the information client to
perform catchphrase search in a safe, dependable, and unquestionable way. To begin with, we proposea solidanddependable
document appropriation conspire, which guarantees security throughiterativeencryptionanddependability bypresentingRS
deletion code innovation. Second, we plan a Bloom channel tree file structure and extend it to a multi cloud climate. Third, we
execute a viable trustworthiness confirmation calculation that can rapidly check the respectability of inquiry results and
recognize pernicious cloud servers. At long last, we do security investigation and exploratoryassessmenttocheck thesecurity
and viability of our plan. For the future work, first, we will investigate a quicker and more effective record dissemination
conspire that permits clients to bear lower reproduction costs. Second, we will stretch out the protected hunt plan to
accomplish fluffy question, positioning inquiry, and multi watchword question.
REFERENCES
[1]. Yunhong Zhou, Shihui Zheng, and Licheng Wang, "Privacy-Preserving and Efficient Public Key Encryption with Keyword
Search-Based CP-ABE in Cloud", 13 October 2020.
[2]. Qingji Zheng Shouhuai Xu Giuseppe Ateniese, "VABKS: Verifiable Attribute-based Keyword Search over Outsourced
Encrypted Data", the University of Texas at San Antonio, USA Sapienza University of Rome, ItalyandJohnsHopkins University,
USA.
[3]. Mrs. Zabiha Khan, Assistant Professor, Dept. of CSE, Ghousia College of Engineering, Karnataka, India, Ms. Kamala Kumari,
B. K, Rumana Iffath, Saima Ahmed, Zaiba Tabassum UG Students Ghousia College of Engineering, Ramanagaram, "Review of
Attribute-based Keyword Search AuthorizationinCloud",www.ijert.orgNConPCS -2017ConferenceProceedingsSpecial Issue
- 2017.
[4]. XINRUI GE, JIA YU, CHENGYU HU, HANLIN ZHANG, AND RONG HAO, 1. College of Computer Science and Technology,
Qingdao University, Qingdao 266071, China,"EnablingEfficientVerifiableFuzzyKeywordSearchOverEncryptedData inCloud
Computing", date of current version September 7, 2018.
[5]. Lincei, Chungen Xu, Lei Xiaoling Yu, and Cong Zuo, "VerifiableIdentity-BasedEncryption withKeyword SearchforIoTfrom
Lattice", Accepted: 24 February 2021.
[6]. Shangping Wang, Jian Ye, Yaling Zhang, China, "A keyword searchable attribute-based encryption scheme with attribute
update for cloud storage" May 24, 2018.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 116
[7]. Rui Zhang, Rui Xue, Ting Yuyz, and Ling Liux, "PVSAE: A Public Verifiable Searchable Encryption Service Framework for
Outsourced Encrypted Data", Qatar, Email: tyu@qf.org.qa College of Computing, Georgia Institute of Technology, Atlanta, GA,
USA, Email: lingliu@cc.gatech.edu.
[8]. A Shiny, Jayanth Das, M Venkat Aravind, C A Anirudh Srivatsaa, M Rahul, "Cloud Server Misbehavior Detection Using
Ranked Keyword Search Results Verification", International Journal of Engineering and Advanced Technology (IJEAT) ISSN:
2249 – 8958, Volume-8 Issue-4, April 2019.
[9]. R. SaiVenkata Siva Kumar, T.P.Anithaashri, "Enhancement Of Cloud Data Search Using Symmetric-KeyBasedVerification",
Chennai, anithaashritp.sse@saveetha.com, European Journal of Molecular & Clinical Medicine ISSN 2515-8260 Volume 07,
Issue 08, 2020.
[10]. Devi Thiyagarajan, R. Ganesan, "USER VERIFIABLE MULTIPLE KEYWORD SEARCH SCHEME USING THE MERKLE TREE
FOR OUTSOURCED DATA IN THE CLOUD", International Journal of Technology(2017) 4:591-600ISSN 2086-9614, (Received:
November 2015 / Revised: February 2017 / Accepted: July 2017).

More Related Content

PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PDF
C017421624
PDF
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
PDF
IRJET- Secure Cloud Data Using Attribute Based Encryption
PDF
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PDF
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
PDF
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
C017421624
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography

Similar to Efficient and Empiric Keyword Search Using Cloud (20)

PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
PDF
Secure Data Sharing In an Untrusted Cloud
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
PDF
Enhanced security framework to ensure data security in cloud using security b...
PDF
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
PDF
Enhanced security framework to ensure data security
PDF
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
PDF
Towards Achieving Efficient and Secure Way to Share the Data
PDF
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
PDF
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
PDF
H1803035056
PDF
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
PDF
Accessing secured data in cloud computing environment
PDF
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
PDF
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
PDF
Guaranteed Availability of Cloud Data with Efficient Cost
PDF
C04932125
PDF
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
PDF
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Secure Data Sharing In an Untrusted Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Enhanced security framework to ensure data security in cloud using security b...
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
Enhanced security framework to ensure data security
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Towards Achieving Efficient and Secure Way to Share the Data
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
H1803035056
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Accessing secured data in cloud computing environment
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
Guaranteed Availability of Cloud Data with Efficient Cost
C04932125
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Geodesy 1.pptx...............................................
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
PPT on Performance Review to get promotions
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
R24 SURVEYING LAB MANUAL for civil enggi
Automation-in-Manufacturing-Chapter-Introduction.pdf
573137875-Attendance-Management-System-original
Internet of Things (IOT) - A guide to understanding
Geodesy 1.pptx...............................................
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT on Performance Review to get promotions
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
III.4.1.2_The_Space_Environment.p pdffdf
Categorization of Factors Affecting Classification Algorithms Selection
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Foundation to blockchain - A guide to Blockchain Tech
Fundamentals of Mechanical Engineering.pptx
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
UNIT 4 Total Quality Management .pptx
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Safety Seminar civil to be ensured for safe working.
R24 SURVEYING LAB MANUAL for civil enggi

Efficient and Empiric Keyword Search Using Cloud

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 112 Efficient and Empiric Keyword Search Using Cloud S.S. Swethapriyadarshni1, S.Swathi Priya2, P.Yuvarani3, K.Hemapriya4 1’2’3Panimalar Institute of Technology 4Assistant Professor, Dept. of Computer Science Engineering, Panimalar Institute of Technology, Chennai, TamilNadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud is a Centralized Architecture Server, which serves as a platformforeveryuserofthecloudwanted tostoredata and sensitive information’s in safe secured storage space. The next logical stage in the growth of on-demand information technology services and products is cloud computing. Cloud computing will rely on virtualized resources to a considerable extent. Cloud computing allows IT skills to be reused, and it always includes current computing services such as distributed and grid computing. Users can perform a keyword-based search over encrypted material with searchable encryption. The majority of currently available searchable encryption systems arebasedonasinglecloudserverapproach, whichhassome drawbacks, such as a single point of failure and hostile insiders. The multi cloud server strategy, ontheother hand, providesmoredataavailabilityand security. However, transferring existing keyword search strategies to the multi cloud will result in higher storage and search expenses, with no discernible improvement in data security. In addition, unlike single cloud, a challenge in a multi cloud environment is how to adequately check query integrity when certain cloudserversreturninaccurateorincompletedata. Weoffer an iterative encryption approach to assure file privacy even if numerous cloud services collude with one another to ensure data security. Key Words: Cloud computing, Cloud Server, Encryption, Decryption, Multicloud, AES 1. INTRODUCTION Cloud computing has several attributes, blockchain,forwardapproach,andcryptosystem-basedapproachesareaccustomedto preserving security. The cloud infrastructurehasseveral characteristicsthey'reremotelyhosted,ubiquitous,andcommodified. Currently, several firms are delivering cloud services example Google, Microsoft, etc… Virtualization is an associate degree abstraction of execution of the cloud, so virtual machines are used. To preserve the info, the info is encrypted before outsourcing it to the cloud. Cloud sourcing is turning into a giant deal as a result of its high scale usage and has inexpensive suppliers. There are also problems concerning the policy and access that are overcome by the cloud organization. One of the main challenges of the cloud is the constant net throughout the storage of information. Cloud Computing is the sought-after network access split pool organized computing riches. 1.1 SCOPE OF THE PROJECT With searchable encryption, users can do a keyword-based search across encrypted material. The bulk of searchable encryption solutions currently available are based on a single cloud server architecture, whichhasseveral disadvantagessuch as a single point of failure and hostile insiders. The use of several cloud servers, on the other hand, increases data availability and security. Transferring existing keyword search strategies to the multicloud, on the other hand, will increase storage and search costs while providing no noticeable improvement in data security. One of these services is Amazon Elastic Compute Cloud (EC2), which allows users to have a virtual cluster of computers available at all times through the Internet. On AWS, virtual computers have hardware central processing units (CPUs) and graphics processingunits(GPUs)forprocessing,aswell as local/RAM memory, hard disk/SSD storage, a choice of operating systems, networking,andpre-loadedapplicationsoftware such as web servers, databases, and customer relationship management (CRM). The project's goal is to integrate keyword search across various clouds so that users can quickly locate a specific file or data, and to prevent the involvement of third parties so that data is secure and protected. 1.2 EXISTING SYSTEM Without needing to learn the plaintexts, searchable encryption allows a cloud server toconductkeywordsearches onbehalfof data users over encrypted data. The majority of currently available searchable encryption systems, on the other hand, only support single or conjunctive keyword searches, and the few schemes that can perform expressive keyword searches are computationally inefficient because they are built from bilinear pairings over composite-order groups. In existingsystems,an expressive public-key searchable encryption technique in the prime-order groups outperforms existingschemessignificantly by allowing keyword search rules to be defined in conjunctive, disjunctive, or any monotonic Boolean formulas. When a user
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 113 obtains data from a concerned person via the internet, unknown or invalidusersmaygainaccesstothedata stored ona central server or database. It could result in data being lost or altered by a third party. Most existing PEKS methods, regardless of search authorisation, focus on data consumers'richsearchfunctionalities.Theframework allowsclientstosendencrypteddata to the cloud, allows users to search for documents using different keywords, and allows them to check the server's response. 2. PROPOSED SYSTEM Encrypting a file, then making n copies of it, and distributing the n copies to n cloud servers is astraightforward filedistribution solution in numerous clouds. Userscan still retrieve the fileeven if (n-1)cloudserversareofflineinthissituation,indicatingthat this distribution mechanism is highly reliable. The cloud server is merely aware that if it engages in unethical behavior, it will almost certainly be discovered. The suggested design reduces storage overhead on both the client and user sides. The retrieval timelowers as the number of documents increases, cuttingstorage costs forboth parties. However,thismethodnecessitatesan excessive amount of storageoverhead. Furthermore,becauseeachcloudserverhasaccesstotheentireencryptedfile,webuilda secureand reliable file distribution strategy in various clouds to strike a better balance between storageoverhead,privacy,and reliability. We present an iterative encryption strategy inspired by the two-layer encryption scheme to preserve the privacy of data files even if numerous cloud serversstart a collusionattackatthesametime.Inthissystem,userscanalsoproducea unique code to gain access to a record from an authorized individual. It will provide users with a safe access method as well as protect unknown individuals from dangerous activities. Output-1: User login page Output-2: Registration page
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 114 Output-3: Keyword Searching page Output-4: Response page Output-5: AWS Cloud shell
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 115 Output-6: Fetched data from AWS Cloud shell 3. CONCLUSIONS In this, we propose a solid and certain keyword search conspire in different mists, which permits the information client to perform catchphrase search in a safe, dependable, and unquestionable way. To begin with, we proposea solidanddependable document appropriation conspire, which guarantees security throughiterativeencryptionanddependability bypresentingRS deletion code innovation. Second, we plan a Bloom channel tree file structure and extend it to a multi cloud climate. Third, we execute a viable trustworthiness confirmation calculation that can rapidly check the respectability of inquiry results and recognize pernicious cloud servers. At long last, we do security investigation and exploratoryassessmenttocheck thesecurity and viability of our plan. For the future work, first, we will investigate a quicker and more effective record dissemination conspire that permits clients to bear lower reproduction costs. Second, we will stretch out the protected hunt plan to accomplish fluffy question, positioning inquiry, and multi watchword question. REFERENCES [1]. Yunhong Zhou, Shihui Zheng, and Licheng Wang, "Privacy-Preserving and Efficient Public Key Encryption with Keyword Search-Based CP-ABE in Cloud", 13 October 2020. [2]. Qingji Zheng Shouhuai Xu Giuseppe Ateniese, "VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data", the University of Texas at San Antonio, USA Sapienza University of Rome, ItalyandJohnsHopkins University, USA. [3]. Mrs. Zabiha Khan, Assistant Professor, Dept. of CSE, Ghousia College of Engineering, Karnataka, India, Ms. Kamala Kumari, B. K, Rumana Iffath, Saima Ahmed, Zaiba Tabassum UG Students Ghousia College of Engineering, Ramanagaram, "Review of Attribute-based Keyword Search AuthorizationinCloud",www.ijert.orgNConPCS -2017ConferenceProceedingsSpecial Issue - 2017. [4]. XINRUI GE, JIA YU, CHENGYU HU, HANLIN ZHANG, AND RONG HAO, 1. College of Computer Science and Technology, Qingdao University, Qingdao 266071, China,"EnablingEfficientVerifiableFuzzyKeywordSearchOverEncryptedData inCloud Computing", date of current version September 7, 2018. [5]. Lincei, Chungen Xu, Lei Xiaoling Yu, and Cong Zuo, "VerifiableIdentity-BasedEncryption withKeyword SearchforIoTfrom Lattice", Accepted: 24 February 2021. [6]. Shangping Wang, Jian Ye, Yaling Zhang, China, "A keyword searchable attribute-based encryption scheme with attribute update for cloud storage" May 24, 2018.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 116 [7]. Rui Zhang, Rui Xue, Ting Yuyz, and Ling Liux, "PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data", Qatar, Email: [email protected] College of Computing, Georgia Institute of Technology, Atlanta, GA, USA, Email: [email protected]. [8]. A Shiny, Jayanth Das, M Venkat Aravind, C A Anirudh Srivatsaa, M Rahul, "Cloud Server Misbehavior Detection Using Ranked Keyword Search Results Verification", International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-8 Issue-4, April 2019. [9]. R. SaiVenkata Siva Kumar, T.P.Anithaashri, "Enhancement Of Cloud Data Search Using Symmetric-KeyBasedVerification", Chennai, [email protected], European Journal of Molecular & Clinical Medicine ISSN 2515-8260 Volume 07, Issue 08, 2020. [10]. Devi Thiyagarajan, R. Ganesan, "USER VERIFIABLE MULTIPLE KEYWORD SEARCH SCHEME USING THE MERKLE TREE FOR OUTSOURCED DATA IN THE CLOUD", International Journal of Technology(2017) 4:591-600ISSN 2086-9614, (Received: November 2015 / Revised: February 2017 / Accepted: July 2017).