ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.5, No. 4)

Publication Date:

Authors : ;

Page : 450-453

Keywords : Cloud Storage; Data Owner; Data User; Data leak; Network Security; Privacy; Collection Intersection.;

Source : Downloadexternal Find it from : Google Scholarexternal


Cloud computing is most widely used as the next generation architecture of IT enterprises, that provide convenient remote access to data storage and application services. This cloud storage can potentially bring great economical savings for data owners and users, but due to wide concerns of data owners that their private data may be exposed or handled by cloud providers. Hence end-to-end encryption techniques and fuzzy fingerprint technique have been used as solutions for secure cloud data storage. In this project we use searchable encryption techniques, which allows encrypted data to be searched by users without leaking information about the data itself and user’s queries. We build a secure searchable index, and develop a one to many order preserving mapping technique to protect those sensitive score information. The resulting design is able to facilitate efficient server side ranking without losing keyword privacy. Hence to avoid loose and loss of data, we use privacy preserving data-leak detection (DLD) solution to solve the issue where sensitive data digests is used in detection. The advantage of this method is that it enables the data owner to safely delegate the detection operation to a semi honest provider without revealing the sensitive data to the provider.In this project, we identify the challenges towards achieving privacy in searchable outsourced cloud data services and we use the DLD solution which helps to detect the leak data. This technique helps us to save securely our sensitive data in cloud storage and retrieve this data while we required without leaking our private data through Information Security and Secure Search over Encrypted Data in Cloud Storage Services.

Last modified: 2016-04-19 12:41:34