Ranked Keyword Search in Cloud Computing: An Innovative Approach?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 6)Publication Date: 2014-06-30
Authors : Nikita Sangwan; Sunita Sangwan;
Page : 24-27
Keywords : Search in cloud; secured search engines; Ranked Keyword Search;
Abstract
Cloud computing refers to a computing hardware machine or group of computing hardware machines commonly referred as a server or servers connected through a communication network such as the Internet, an intranet, a local area network (LAN) or wide area network (WAN). Any individual user who has permission to access the server can use the server's processing power to run an application, store data, or perform any other computing task. Therefore, instead of using a personal computer every-time to run the application, the individual can now run the application from anywhere in the world, as the server provides the processing power to the application and the server is also connected to a network via Internet or other connection platforms to be accessed from anywhere. While searching the data in the cloud the attackers prefer the keyword which is not secured properly. The existing technique resolves the optimization complexities in ranked keyword search and its effective utilization of remotely stored encrypted cloud data. But it limits the further optimizations of the search results by preventing cloud server to interact with cloud users to maintain the integrity of actual owner’s keyword and the data associated with it. The aim is to define a framework which enhances the accuracy of the ranked keyword search by secured machine learning, which does not affect the data integrity
Other Latest Articles
- An Effective Approach on Scheduling Algorithm in Cloud Computing?
- An Efficient Behavior Trust EvaluationSystem for Wireless Sensor Networks.
- A Competitive Assessment on Fly-Ash Bricks and Clay Bricks in Central Gujarat Region of India Using Chi-Square Test(χ2) through SPSS Software.
- Effective Analysis on Remote to User (R2L) Attacks Using Random Forest Algorithm
- Discriminative Pattern Identification using Rule Based Approach.
Last modified: 2014-06-05 15:17:03