An Optimized and Secured Ranking Approach for Retrieving Cloud Data Using Keyword Search

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5

Abstract

Abstract: Cloud computing is a versatile technology that emerged as a solution to reduce costs in organizations by providing on-demand high quality applications and services from a centralized pool of configurable computing resources. With the advantage of storage as a service data owners are motivated to outsource their valuable and sensitive data from local sites to commercial public cloud since it costs less, easily scalable and can be accessed from anywhere anytime. Sensitive data that moves into and across cloud infrastructures increases the risk of data loss or compliance violations. However to protect data privacy, sensitive cloud data have to be encrypted before outsourcing. Data encryption makes effective data utilization avery challenging task. In this paper we define an optimized and secured semantic based ranked keyword search over encrypted cloud data. Existing search schemes are not much efficient as they entirely depend on thesubmitted query keyword and did not consider the keyword semantics. Ranking approach in the proposed scheme not only consider the keyword semantics but also deals with examining the different forms of a queriedkeyword for retrieving the most matching files relevant to the user request. This type of ranked search enhances system usability by computing relevance score and ensures security guarantee by using an order preservingsymmetric encryption technique to protect those sensitive score information. Here user can retrieve more files from cloud server with less communication overhead.

Authors and Affiliations

Vineetha Viswan , Adarsh Sunil

Keywords

Related Articles

 CTV: Consistent Trust Value through Data Drop Monitoring Parameters Based Malicious Behaviour Detection in MANET

 Abstract: Growth of wireless technologies with its increased user demands of applications makes this area more vulnerable for attackers and intruders. The attacker continuously trying to affects the communication a...

Framework of Security Mechanisms for Monitoring Adaptive Distributed Systems

Abstract: The distributed systems have a noteworthy role in today’s information technology, whether it is governmental or nongovernmental organizations. The major concern of today’s software industry is that dealing with...

Survey On Energy Efficient Data Collection In Densely Populated Wireless Sensor Network

 Abstract: WSN uses a large number of wireless sensor nodes to collect information from their sensing terrain.WSN is battery-powered devices in which energy-saving is a crucial issue. Every node in sensor network co...

 A Study of vampire Attack to Avoid the Intruders without Backtracking Method

 Abstract: In a Wireless sensor network, every hub gathers the information and transmits all the information parcels to the sink hub utilizing any directing conventions. The directing Protocols are intended to be se...

A Survey of Network Security in Mobile Ad-Hoc Network

Abstract: This paper describes the concept of ad hoc networking and the security issues faced by giving its background and presenting some of the security challenges that are faced by the mobile ad hoc network. Ad hoc wi...

Download PDF file
  • EP ID EP90116
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

Vineetha Viswan, Adarsh Sunil (2015). An Optimized and Secured Ranking Approach for Retrieving Cloud Data Using Keyword Search. IOSR Journals (IOSR Journal of Computer Engineering), 17(5), 74-78. https://europub.co.uk/articles/-A-90116