An Optimized and Secured Ranking Approach for Retrieving Cloud Data Using Keyword Search

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5

Abstract

Abstract: Cloud computing is a versatile technology that emerged as a solution to reduce costs in organizations by providing on-demand high quality applications and services from a centralized pool of configurable computing resources. With the advantage of storage as a service data owners are motivated to outsource their valuable and sensitive data from local sites to commercial public cloud since it costs less, easily scalable and can be accessed from anywhere anytime. Sensitive data that moves into and across cloud infrastructures increases the risk of data loss or compliance violations. However to protect data privacy, sensitive cloud data have to be encrypted before outsourcing. Data encryption makes effective data utilization avery challenging task. In this paper we define an optimized and secured semantic based ranked keyword search over encrypted cloud data. Existing search schemes are not much efficient as they entirely depend on thesubmitted query keyword and did not consider the keyword semantics. Ranking approach in the proposed scheme not only consider the keyword semantics but also deals with examining the different forms of a queriedkeyword for retrieving the most matching files relevant to the user request. This type of ranked search enhances system usability by computing relevance score and ensures security guarantee by using an order preservingsymmetric encryption technique to protect those sensitive score information. Here user can retrieve more files from cloud server with less communication overhead.

Authors and Affiliations

Vineetha Viswan , Adarsh Sunil

Keywords

Related Articles

 Analysis of Spending Pattern on Credit Card Fraud Detection

 Abstract: Credit card is one of the convenient way of payment in online shopping. In this on lineshopping, payment is made by giving information like card no, security code , expiration date of theCredit card etc ....

Energy Secure Dynamic Source Routing (ESDSR) Protocol For (MANET)

Abstract : MANET (Mobile Ad-hoc Network) is an unstructured, self-organized and self-deployment network. It can be set up anywhere, anytime because there is no need of centralize base station. Nodes in MANET are connecte...

 Review paper on performance analysis of AODV, DSDV, OLSR  on the basis of packet delivery

 The field of Adhoc Network has gained an important part of the interest of researchers and become very popular in last few years. Adhoc network can operate without fixed infrastructure and can survive rapid &nbs...

 Image Based Authentication for Folder Security using Persuasive Cued Click-Points and SHA

 Abstract: In this paper Image Based Authentication application is applied on folder’s (folders that are confidential to user) ,since the studies till date have shown that textual passwords are more prone that the...

Utility Mining Algorithm for High Utility Item sets from Transactional Databases

The discovery of item sets with high utility like profits is referred by mining high utility item sets from a transactional database. Although in recent years a number of relevant algorithms have been proposed, for high...

Download PDF file
  • EP ID EP90116
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

Vineetha Viswan, Adarsh Sunil (2015). An Optimized and Secured Ranking Approach for Retrieving Cloud Data Using Keyword Search. IOSR Journals (IOSR Journal of Computer Engineering), 17(5), 74-78. https://europub.co.uk/articles/-A-90116