EnDAS. Efficient Encrypted Data Search as a Mobile Cloud Service

Authors

  • CH. Haritha  M.Tech Scholar, Department of CSE, Vignana Bharathi Institute of Technology Aushapur (V), Ghatkesar (M), R.R, Telangana, India
  • P. Praveen Kumar  Assistant Professor, Department of CSE, Vignana Bharathi Institute of Technology Aushapur (V), Ghatkesar (M), R.R., Telangana, India

Keywords:

Encrypted Data Search, Trapdoor Mapping Table, Mobile Cloud Service, Cloud Server

Abstract

Record amassing in the cloud system is rapidly grabbing notoriety all through the world. In any case, it stances peril to buyers unless the data is encoded for security. Mixed data should be sufficiently open and retrievable with no security spills, particularly for the flexible client. Yet late research has handled various security issues, the plan can't be associated on phones particularly under the convenient cloud condition. This is an immediate aftereffect of the inconveniences obliged by remote structures, for example, inertia affectability, poor openness, and low transmission rates. This prompts a long intrigue time and additional system activity costs while utilizing standard demand outlines. This examination keeps an eye on these issues by proposing a viable Encrypted Data Search (EnDAS) scheme as an adaptable cloud advantage. This inventive arrangement uses a lightweight trapdoor (encoded catchphrase) weight strategy, which propels the data correspondence process by diminishing the trapdoor's size for action capability. In this examination, we in like manner propose two streamlining procedures for report look for, called the Trapdoor Mapping Table (TMT) module and Ranked Serial Binary Search (RSBS) count, to speed the interest time. Results show that EnDAS diminishes look time by and also orchestrate development.

References

  1. D. Huang, "Mobile cloud computing," IEEE COMSOC Multimedia Commun. Tech. Committee (MMTC) E-Letter, vol. 6, no. 10, pp. 27- 31, 2011.
  2. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multi-keyword ranked search over encrypted cloud data," in Proc. Int. Conf. Comput. Commun. (INFOCOM), Apr. 2011, pp. 829-837.
  3. C. Wang, N. Cao, K. Ren, and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Systems, vol. 23, no. 8, pp. 1467-1479, 2012.
  4. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE Int. Conf. Distrib. Comput. Syst. (ICDCS), Jun. 2010, pp. 253-262.
  5. C. Gentry and S. Halevi, "Implementing gentrys fullyhomomorphic encryption scheme," in Advances in Cryptology- EUROCRYPT 2011, 2011, pp. 129-148.
  6. C. O rencik and E. Savas¸, "Efficient and secure ranked multikeyword search on encrypted cloud data," in Proc. Joint EDBT/ICDT Workshops, Mar. 2012, pp. 186-195.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
CH. Haritha, P. Praveen Kumar, " EnDAS. Efficient Encrypted Data Search as a Mobile Cloud Service, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.247-253, January-February-2018.