Fuzzy Based Implementation o f Multi - Keyword Ranked Search over Encrypted Cloud Data in Secure Cloud Environment
Journal Title: International Journal of Scientific Research and Management - Year 2017, Vol 5, Issue 12
Abstract
Cloud computi ng enables the paradigm of data outsourcing. However, to protect data privacy, sensitive cloud data have to be encrypted before outsourced to the commercial public cloud, which makes effective data utilization service is a challenging task. Even though sea rchable encryption techniques allow users to securely search over encrypted data through keywords, they support only Boolean search and are not yet sufficient to meet the effective data utilization need that is inherently demanded by large number of users and huge amount of data files in cloud. Hence it is necessary to allow multiple keywords in the search request and return documents in the order of their relevance to the keywords. The works on searchable encryption focused on single keyword search or Boo lean keyword search and the result produced by them are rarely sorted. An effective method proposed for this challenging problem is privacy - preserving search over encrypted cloud data. This method establishes a set of strict privacy requirements for such a secure cloud data utilization system through MRSE. Among various multi - keyword semantics, this method chooses the efficient similarity measure of ―coordinate matching‖. Then according to Top K Query method the sorted results are produced. The privacy is p reserved by the chunk of data stored in a various server‘s. Then further improvisation is taken to introduce low overhead on computation and communication in future.
Authors and Affiliations
Gladiss Merlin. N
Adequate Battery Energy Storage System
This paper explain a review on adequate battery energy storage system. A Competent BESS(Battery Energy storage system) for buffer system is studied for the reason that a gradual diminishing in...
Automatic college bell system
The world over the decades has made considerable advancement in automation; automation is employed in every sector whethe r it is home or industry. Here a new and inexpensive design is being...
Improved Privacy over Authentication of K - Nearest Neighbor Query on Spatial Network
Security is evolving to be an important aspect to be taken into our mind due to the eternally altering globe of worldwide data communications, inexpensive Internet connections, and fast - growi...
Design Fabrication and Testing Of a Motorized Paper Perforation Machine
This is concern with design and fabrication of a powered paper perforating machine with efficiency and less cost for bindery department in printing industries. It is a machine that will compete favora...
Comparative Study of M20 and M25 grades of Concrete by ACI, DOE and BIS Methods of Mix Design Using Crushed Aggregate
The basis of this paper is to analyse c omparative study of different testing methods of concrete mix design of M20 and M25 grades. Different structures are being considered for testing the parameters relating to designe...