Keyword Search On Encrypted Cloud Data Using GDFS
Keywords:
Cloud Computing, Searchable Encryption, Privacy Preserving, Keyword Search, Ranked Search Anonymization, MRSE.Abstract
Cloud computing in any case, individuals can appreciate full advantage of distributed computing on the off chance that we can address genuine protection and security worries that accompanies putting away delicate individual data. For genuine security, “client character ought to stay avoided cloud specialist organization and to ensure protection of information, information which is delicate is to be encoded before outsourcing. Along these lines, empowering a scrambled cloud information look benefit is of awesome significance. By thinking about the extensive number of information clients, archives in the cloud, it is imperative for the pursuit administration to permit multi catchphrase question and give result likeness positioning to meet the powerful need of information recovery look and not frequently separate the indexed lists”. I initially propose an essential thought for the Multi-keyword ranked search in cloud information in light of secure internal item calculation and effective likeness measure of arrange coordinating, at that point can give two fundamentally enhanced MRSE plans to accomplish different stringent protection prerequisites in two diverse risk models.
References
- N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc.IEEE INFOCOM, pp. 829-837, Apr, 2011.
- Zhihua Xia, Member, IEEE, Xinhui Wang, Xingming Sun, Senior Member, IEEE, and Qian Wang, Member, IEEE, “Secure Ranked Keyword Search over Encrypted Cloud Data”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2016.
- International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 2, February 2014).
- Privacy preserving public auditing for Secure Cloud Storage”, Cong Wang, Sherman S.-M. Chow, Qian Wang, Kui Ren.
- Shiba Sampat Kale et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7093-7096
- Kuchi Ravi Kishore, et al International Journal of Computer and Electronics Research [Volume 4, Issue 2, April 2015]
- Li, S. Yu, N. Cao, and W. Lou. Authorized private keyword search over encrypted data in cloud computing. In Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pages 383–392. IEEE, 2011
- Boldyreva, N. Chenette, Y. Lee, and A. O’Neill. Order-reserving symmetric encryption. In Proceedings of Eurocrypt'09, volume 5479 of LNCS. Springer, 2009.
- Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, “Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data,” Proc. IEEE INFOCOM, 2012.
- Boldyreva, N. Chenette, Y. Lee, and A. O’Neill. Order-preserving symmetric encryption. In Proceedings of Eurocrypt'09, volume 5479 of LNCS. Springer,
- International Journal of Advance Research, IJOAR.org Volume 3, Issue 2, February 2015, Online: ISSN 2320-9194
- C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, ― Privacy Preserving Data Sharing With Anonymous ID Assignment,‖ ACM SIGKDD Expl
- M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, "Above the clouds: A berkeley view of cloud computing", Tech. Rep. USB-EECS-2009–28, University of California, Feb 2009.
- Atanu Majumder, Tanusree Podder, Meenakshi Sharma, Abhishek Majumdar, Nirmalya Kar, "Secure Data Communication and Cryptography Based on Cloud Storage", 2014 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.