ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 2)

Publication Date:

Authors : ;

Page : 580-585

Keywords : Network; keyword search; Information; encryption;

Source : Downloadexternal Find it from : Google Scholarexternal


Cloud Computing becomes prevailing, sensitive data area unit being progressively centralized into the cloud. For the protection of information privacy, sensitive knowledge needs to be encrypted before outsourcing, that makes effective knowledge utilization a awfully difficult task. Though ancient searchable cryptography schemes enable users to firmly search over encrypted knowledge through keywords, these techniques support solely mathematician search, while not capturing any connection of information files. This approach suffers from 2 main drawbacks once directly applied within the context of Cloud Computing. On the one hand, users, United Nations agency don't essentially have pre-knowledge of the encrypted cloud knowledge, ought to post method each retrieved move into order to search out ones most matching their interest; On the opposite hand, invariably retrieving all files containing the queried keyword any incurs gratuitous network traffic, that is completely undesirable in today’s pay-as-you-use cloud paradigm. during this paper, for the primary time we have a tendency to outline and solve the matter of effective nevertheless secure graded keyword search over encrypted cloud knowledge. In our planned Model, we have a tendency to exhibit the Querying method over the cloud computing infrastructure mistreatment Secured & Encrypted knowledge access and Ranking over the results would profit the user for the convalescing Results.

Last modified: 2014-02-26 16:24:27