IJARCCE ISSN (Online) 2278-1021 ISSN (Print) 2319-5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 7, Issue 10, October 2018 Copyright to IJARCCE DOI 10.17148/IJARCCE.2018.7106 24 A Survey on Identity-Based Authenticated and Efficient Traceable Search System Shital Khandare 1 , Prof.H.A.Hingoliwala 2 Student, Department of Computer Engineering, JSPM College, Hadapsar, Pune 1 Associate Professor, Department of Computer Engineering, JSPM College, Hadapsar, Pune 2 Abstract: Secure search over encrypted remote data is crucial in cloud computing to ensure the data privacy and usability. To prevent unauthorized data access and usage, fine-grained access control is important in multi-user system. Whereas, authorized user may intentionally leak the secret key for financial benefit. So, tracing and revoking such malicious user who abuses secret key needs to be solved. The key escrow free mechanism can be used which will effectively prevent the Key Generation Centre (KGC) from unscrupulously searching and decrypting all encrypted files of users. The decryption process involve here only requires ultra-lightweight computation, which is a desirable feature for energy-limited devices. If we figure out malicious user we can efficiently revoke that user. Again if we have, flexible multiple keywords subset search pattern, which will also not affect the order of search result. Keywords: Authorized Searchable Encryption, Traceability, Multiple Keywords Subset Search I. INTRODUCTION Now a days, with the development of new computing paradigm, cloud computing becomes the most notable one, which provides convenient, on-demand services from a shared pool of configurable computing resources. Therefore, an increasing number of companies and individuals prefer to outsource their data storage to cloud server. Despite the tremendous economic and technical advantages, unpredictable security and privacy concerns become the most prominent problem that hinders the widespread adoption of data storage in public cloud infrastructure. Encryption is a basic method to protect data privacy in remote storage. However, how to effectively execute keyword search for plaintext becomes difficult for encrypted data due to the unreadability of ciphertext. Searchable encryption mechanism enables keyword search over encrypted data. For the file sharing system, such as multi-owner multiuser scenario, fine-grained search authorization is a desirable function for the data owners to share their private data with other authorized user. However, most of the available systems [7], [8] require the user to perform a large amount of complex bilinear pairing operations. These overwhelmed computations become a heavy burden for user‟s terminal, which is especially serious for energy constrained devices. The outsourced decryption method allows user to recover the message with ultra-lightweight decryption. However, the cloud server might return wrong half- decrypted information as a result of malicious attack or system malfunction. Thus, it is an important issue to guarantee the correctness of outsourced decryption in public key encryption with keyword search (PEKS) system. The authorized entities may illegally leak their secret key to a third party for profits. Suppose that a patient someday suddenly finds out that a secret key corresponding his electronic medical data is sold on e-Bay. Such despicable behaviour seriously threatens the patient‟s data privacy. Even worse, if the private electronic health data that contain serious health disease is abused by the insurance company or the patient‟s employment corporation, the patient would be declined to renew the medical insurance or labour contracts. The intentional secret key leakage seriously undermines the foundation of authorized access control and data privacy protection. Thus, it is extremely urgent to identify the malicious user or even prove it in a court of justice. In attribute based access control system, the secret key of user is associated with a set of attributes rather than individual‟s identity. As the search and decryption authority can be shared by a set of users who own the same set of attributes, it is hard to trace the original key owner. Providing traceability to a fine-grained search authorization system is critical and not considered in previous searchable encryption systems. II. RELATED WORK In this paper, out of the blue we characterize and take care of the issue of successful yet secure positioned catchphrase look over scrambled cloud information. Positioned seek incredibly improves framework convenience by restoring the coordinating records in a positioned request with respect to certain importance criteria (e.g., watchword recurrence), in this way making one step nearer towards down to earth arrangement of protection safeguarding information facilitating administrations in Cloud Computing. Supports efficient ranked keyword search for achieving effective utilization of remotely stored encrypted data in Cloud Computing [1].