A Novel Approach For Using Multi-Keyword Ranked Search Scheme Over Encrypted in Secure And Dynamic Cloud Data
Abstract
— cloud computing have revamped the view of modern information technology which is motivating the data owners to outsource their data to the public cloud server like Amazon, Microsoft Azure, Google Drive, etc. With the help of data outsourcing, the organizations can provide reliable data services to their users without any concerns for the data management overhead. . Normally, CSPs (Cloud Service Providers) take care of the data and its privacy, but there are some of the factors because of which the data privacy and user identity may be violated like an apostate employee, etc. In this way, information proprietors ought to scramble their particular touchy information before outsourcing it to people in general cloud server. Since the information is getting encoded before outsourcing which may influence the execution of some essential information getting to operations like seeking of a report, and so on. Searchable encryption is a cryptographic technique to give security. In writing numerous analysts have been chipping away at creating proficient searchable encryption plans. , we display a protected multi-watchword positioned look conspire over scrambled cloud information, which at the same time underpins dynamic overhaul operations like erasure and addition of records. In particular, the vector space display and the broadly utilized TF×IDF model are consolidated as a part of the file development and question era. We build an exceptional tree-based record structure and propose an "Eager Depth-first Search" calculation to give productive multi-catchphrase positioned look.
Â
References
Qin Liuy, Guojun Wangyz, and Jie Wuz, â€Secure and privacy preserving Keyword searching for cloud storage servicesâ€, ELSEVIER Journal of Network and computer Applications, March 2011.
Cong Wang et al., â€Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Dataâ€, IEEE Transactions on parallel and distributed systems, vol. 23, no. 8, August 2012.
International Journal of Computer Applications (0975 – 8887) Volume 126 - No.14, September 2015.
Wenhai Sun et al., "Privacy-Preserving Multikeyword Text Search in the Cloud Supporting Similarity-based Ranking'', the 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou, China, May 2013.
Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue, Member, IEEE Computer Society, and Minglu Li,â€Toward Secure Multikeyword Top k Retrieval over Encrypted Cloud Dataâ€, IEEE Journal of Theoretical and Applied Information Technology 10th August 2014.
Ning Cao et al.,†Privacy-Preserving MultiKeyword Ranked Search over Encrypted Cloud Dataâ€, IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, Jan 2014.
Wenhai Sun et al., "Protecting Your Right: Attributebased Keyword Search with Finegrained Owneren forced Search Authorization in the Cloud", IEEE INFOCOM 2014, Toronto, Canada, April 27-May 2, 2014.
Secure Ranked Keyword Search over Encrypted Cloud Data, IEEE PAPER, 2010.
Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, ‘Public key encryption with keyword search,’ in Proc. of EUROCRYPT, 2004.
C.Wang et al., ‘Secure Ranked Keyword Search Over Encrypted Cloud Data,’ Proc. ICDCS ’10, 2010
Wenjun Lu; Varna, A.L.; Min Wu, ‘Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization,’ Access, IEEE, vol.2, no., pp.125,141, 2014
W. K. Wong, D. W.Cheung, B. Kao, and N. Mamoulis, ‘Secure knn computation on encrypted databases,’ in Proc. of SIGMOD, 2009.
K. Ren, C. Wang, and Q. Wang, ‘Security Challenges for the Public Cloud,’ IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
Zhangjie Fu et al, ‘Multikeyword Ranked Search Supporting Synonym Query over Encrypted Data in Cloud Computing’, IEEE Conference, 2013.
Refbacks
- There are currently no refbacks.
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â