A SECURED SEARCHING IN CLOUD DATA USING CRYPTOGRAPHIC TECHNIQUE
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 7
Abstract
Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. Trusted applications from untrusted components will be a major aspect of secure cloud computing. Today, many such applications require a proof of result correctness. It has been envisioned as the next generation architecture of IT Enterprise. As it becomes prevalent, more and more sensitive information are being centralized into the cloud. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to commercial public cloud for great flexibility and economic savings. But for protecting data privacy, which obsoletes traditional data utilization based on plaintext keyword search. Multistep processing is commonly used for nearest neighbor (NN) and similarity search in applications involving high dimensional data and/or costly distance computations. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. This paper explores various secured searching algorithms such as Advanced Encryption Standard (AES), Secured Socket Layer (SSL), and Knowledge nearest Neighbor (k-NN).
Authors and Affiliations
C. BAGYALAKSHMI , DR. R. MANICKA CHEZIAN
Automated Intelligent Wireless Drip Irrigation Using Linear Programming
Drip Irrigation is today’s need because water is nature’s gift to the mankind and it is not unlimited and free forever. World’s water resources are fastly vanishing. The one and only one solution to this problem is a...
Link Aggregation Strategies
High Data volume data transfer face problems of low speeds for large file/video transfers over the network, especially in digital/HD video editing, where popular applications require high speed video streaming. It is o...
An Approach for clustering uncertain data objects: A Survey
Recently, uncertain data objects is used in various applications such as VANET environment, sensors applications, image processing based system etc. Clustering of uncertain data is a major concept in data mining since mo...
A Survey on Access Control of Cloud Data
t-Among the emerging technologies, cloud computing provides a flexible, on-demand computing infrastructure for a number of applications. Cloud computing is about moving computing from the single desktop pc/data c...
Implementation of Radix-4 Multiplier with a Parallel MAC unit using MBE Algorithm
t— A radix-4/-8 multiplier is implemented using modified booth multiplier encoder that demand high speed and low energy operation. Depending on the input pattern, the multiplier operates in the radix-8 mode in 56%...