TOWARDS SECURE PROCESSING PRIVATE QUERIES OVER ENCRYPTED CLOUD DATA?Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 2)
Publication Date: 2014-02-28
Authors : Sumathi Sivaraj S. Yasotha;
Page : 580-585
Keywords : Network; keyword search; Information; encryption;
Cloud Computing becomes prevailing, sensitive data area unit being progressively centralized into the cloud. For the protection of information privacy, sensitive knowledge needs to be encrypted before outsourcing, that makes effective knowledge utilization a awfully difficult task. Though ancient searchable cryptography schemes enable users to firmly search over encrypted knowledge through keywords, these techniques support solely mathematician search, while not capturing any connection of information files. This approach suffers from 2 main drawbacks once directly applied within the context of Cloud Computing. On the one hand, users, United Nations agency don't essentially have pre-knowledge of the encrypted cloud knowledge, ought to post method each retrieved move into order to search out ones most matching their interest; On the opposite hand, invariably retrieving all files containing the queried keyword any incurs gratuitous network traffic, that is completely undesirable in today’s pay-as-you-use cloud paradigm. during this paper, for the primary time we have a tendency to outline and solve the matter of effective nevertheless secure graded keyword search over encrypted cloud knowledge. In our planned Model, we have a tendency to exhibit the Querying method over the cloud computing infrastructure mistreatment Secured & Encrypted knowledge access and Ranking over the results would profit the user for the convalescing Results.
Other Latest Articles
- Solution to Data Sharing for Confidentiality between Service Provider and the Data Owner?
- EduPad- “A Tablet Based Educational System for Improving Adult Literacy in Rural India”?
- DETECTION OF MASQUERADERS USING TREE STRUCTURED SVM?
- Outlier Mining for Removing the Anomalies in High Dimensional Data Using ARVDH Algorithm
- An Approach for Minimization of Power Consumption in Ad-Hoc Network?
Last modified: 2014-02-26 16:24:27