Information Leakage Prevention and Efficiency Enhancement of Search over Enciphered Cloud Data
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 1
Abstract
Following the wide custom of cloud services, the amount of data stored in the data center has experienced a dramatic growth which makes real-time information retrieval much more complicated than before. Moreover, data is usually encrypted before being outsourced to data centers in order to preserve users’ data privacy. The relevance between documents is normally concealed in the process of encryption, which leads to significant search efficiency degradation. Recent techniques used to search on encrypted data do not perform well within such a massive data environment. Hence in this paper, multi-keyword ranked search over encrypted data based on clustering index is proposed to support more search semantics and to meet the demand for fast cipher text search. The proposed method has an advantage over the traditional approach in terms of document retrieval.
Authors and Affiliations
Nithya G, Sheba Kezia Malarchelvi PD
TEST CASE SELECTION FOR PATH TESTING USING BEE COLONY OPTIMIZATION
In software development life cycle (SDLC), testing phase is the most important phase. Without testing we can’t give quality software or risk free software to the client. Software testing process typicall...
A Feature Learning and Object Recognition Framework for Underwater Fish Images with Segmentation
Live fish recognition is one of the most decisive elements of fisheries analysis where the massive amount of data is promptly assimilated .Diverse from wide-ranging scenarios, experiments to underwater image recognition...
GREEN CLOUD COMPUTING FOR AUCTION BASED RESOURCE ALLOCATION
Cloud computing is rising as a paradigm for large-scale data-intensive applications. Cloud infrastructures allows users to remotely access computing power and information over the net. Besides the large economic im...
SURVEY ON NETWORK DEFENCE SYSTEM [NDS] FOR CRYPTOGRAPHY AND HYBRID NETWORK SECURITY SYSTEM
Many computing systems have recently and preventing hacking is important in protecting business. Many significant security methodologies have been proposed to provide security between hacking. Fortunate...
USER INTEREST FOR PERSONALISED SEARCH BASED ON AUTOMATIC IDENTIFICATION
The quality of several search services on the Internet is enhanced by the personalized web search (PWS). Due to the user’s unwillingness to reveal their individual information, while search has become...