Keyword Search On Encrypted Cloud Data Using GDFS

Authors

  • G. Deepika  PG Scholar (M.TECH), Department of Computer Science and Engineering, VNR Vignan Jyothi Institute of Engineering and Technology, Hyderabad, India
  •   Assistant Professor, Department of Computer Science and Engineering, VNR Vignan Jyothi Institute of Engineering and Technology, Hyderabad, India
  • N. V. Sailaja  

Keywords:

Cloud Computing, Searchable Encryption, Privacy Preserving, Keyword Search, Ranked Search Anonymization, MRSE.

Abstract

Cloud computing in any case, individuals can appreciate full advantage of distributed computing on the off chance that we can address genuine protection and security worries that accompanies putting away delicate individual data. For genuine security, “client character ought to stay avoided cloud specialist organization and to ensure protection of information, information which is delicate is to be encoded before outsourcing. Along these lines, empowering a scrambled cloud information look benefit is of awesome significance. By thinking about the extensive number of information clients, archives in the cloud, it is imperative for the pursuit administration to permit multi catchphrase question and give result likeness positioning to meet the powerful need of information recovery look and not frequently separate the indexed lists”. I initially propose an essential thought for the Multi-keyword ranked search in cloud information in light of secure internal item calculation and effective likeness measure of arrange coordinating, at that point can give two fundamentally enhanced MRSE plans to accomplish different stringent protection prerequisites in two diverse risk models.

References

  1. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc.IEEE INFOCOM, pp. 829-837, Apr, 2011.
  2. Zhihua Xia, Member, IEEE, Xinhui Wang, Xingming Sun, Senior Member, IEEE, and Qian Wang, Member, IEEE, “Secure Ranked Keyword Search over Encrypted Cloud Data”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2016.
  3. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 2, February 2014).
  4. Privacy preserving public auditing for Secure Cloud Storage”, Cong Wang, Sherman S.-M. Chow, Qian Wang, Kui Ren.
  5. Shiba Sampat Kale et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7093-7096
  6. Kuchi Ravi Kishore, et al International Journal of Computer and Electronics Research [Volume 4, Issue 2, April 2015]
  7. Li, S. Yu, N. Cao, and W. Lou. Authorized private keyword search over encrypted data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pages 383–392. IEEE, 2011
  8. Boldyreva, N. Chenette, Y. Lee, and A. O’Neill. Order-reserving symmetric encryption. In Proceedings of Eurocrypt'09, volume 5479 of LNCS. Springer, 2009.
  9. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, “Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data,” Proc. IEEE INFOCOM, 2012.
  10. Boldyreva, N. Chenette, Y. Lee, and A. O’Neill. Order-preserving symmetric encryption. In Proceedings of Eurocrypt'09, volume 5479 of LNCS. Springer,
  11. International Journal of Advance Research, IJOAR.org Volume 3, Issue 2, February 2015, Online: ISSN 2320-9194
  12. C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, ― Privacy Preserving Data Sharing With Anonymous ID Assignment,‖ ACM SIGKDD Expl
  13. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, "Above the clouds: A berkeley view of cloud computing", Tech. Rep. USB-EECS-2009–28, University of California, Feb 2009.
  14. Atanu Majumder, Tanusree Podder, Meenakshi Sharma, Abhishek Majumdar, Nirmalya Kar, "Secure Data Communication and Cryptography Based on Cloud Storage", 2014 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
G. Deepika,, N. V. Sailaja, " Keyword Search On Encrypted Cloud Data Using GDFS, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.821-826, January-February-2018.