An Optimal and Secure Ranking Search Over out Sourced Cloud Databases
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 4
Abstract
Considering top k multi keywords from the out sourced information files is still an intriguing examination issue in light of the fact that out sourced information over cloud can be scrambled for secrecy .In this paper we propose an experimental model of top k retrieval from out sourced documents which are transferred through data owner, through administration arranged application by processing the document importance score for info multi keywords as far as term recurrence, time pertinence and symmetric key encryption and each control originates from the server end rather than customer end each the positioning of the archives in view of file significance scores.
Authors and Affiliations
N Madhuri, K Eswara Rao
EVS: A Cloud Services Information Security and Privacy Eligibility and Verification System
In recent years, cloud computing services have evolved as a new paradigm for delivering computing resources thatare dynamic and customizable, and providehigh performance. Many organizations are migrating their inform...
Performance Analysis of Different Space Time Block Codes in MIMO Systems
The main limitations of wireless transmission are fading and associated reduction in bit error rate. To mitigate these effects several techniques are employed. It is well known that the performance of the wireless com...
Cooperative Caching in Wireless P2P Networks: Design, Implementation and Evaluation
In this paper proposing cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. However, all these studies are at a very high level, leaving many design...
Routing Scheme for Exploring Opportunities in Ad Hoc Networks
OPPORTUNISTIC routing for multihop wireless ad hoc networks has seen recent research interest to overcome deficiencies of conventional routing. The proposed scheme utilizes a reinforcement learning framework to oppo...
Privacy Preserving Audit Of Data Storage In Cloud
Cloud computing is the deliverance of computing as a service rather than a product. It gives shared resources, information to computers, softwares and other devices over a set of connections. Cloud computing is the e...