An Optimized and Secured Ranking Approach for Retrieving Cloud Data Using Keyword Search
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5
Abstract
Abstract: Cloud computing is a versatile technology that emerged as a solution to reduce costs in organizations by providing on-demand high quality applications and services from a centralized pool of configurable computing resources. With the advantage of storage as a service data owners are motivated to outsource their valuable and sensitive data from local sites to commercial public cloud since it costs less, easily scalable and can be accessed from anywhere anytime. Sensitive data that moves into and across cloud infrastructures increases the risk of data loss or compliance violations. However to protect data privacy, sensitive cloud data have to be encrypted before outsourcing. Data encryption makes effective data utilization avery challenging task. In this paper we define an optimized and secured semantic based ranked keyword search over encrypted cloud data. Existing search schemes are not much efficient as they entirely depend on thesubmitted query keyword and did not consider the keyword semantics. Ranking approach in the proposed scheme not only consider the keyword semantics but also deals with examining the different forms of a queriedkeyword for retrieving the most matching files relevant to the user request. This type of ranked search enhances system usability by computing relevance score and ensures security guarantee by using an order preservingsymmetric encryption technique to protect those sensitive score information. Here user can retrieve more files from cloud server with less communication overhead.
Authors and Affiliations
Vineetha Viswan , Adarsh Sunil
Analysis of Spending Pattern on Credit Card Fraud Detection
Abstract: Credit card is one of the convenient way of payment in online shopping. In this on lineshopping, payment is made by giving information like card no, security code , expiration date of theCredit card etc ....
Energy Secure Dynamic Source Routing (ESDSR) Protocol For (MANET)
Abstract : MANET (Mobile Ad-hoc Network) is an unstructured, self-organized and self-deployment network. It can be set up anywhere, anytime because there is no need of centralize base station. Nodes in MANET are connecte...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery
The field of Adhoc Network has gained an important part of the interest of researchers and become very popular in last few years. Adhoc network can operate without fixed infrastructure and can survive rapid &nbs...
Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA
Abstract: In this paper Image Based Authentication application is applied on folder’s (folders that are confidential to user) ,since the studies till date have shown that textual passwords are more prone that the...
Utility Mining Algorithm for High Utility Item sets from Transactional Databases
The discovery of item sets with high utility like profits is referred by mining high utility item sets from a transactional database. Although in recent years a number of relevant algorithms have been proposed, for high...