Facilitating Efficient Encrypted Document Storage and Retrieval in a Cloud Framework
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract:In the recent years, cloud computing has gained a lot of attention and big IT giants are providing cloudservices to the clients. As a part of this service user data are stored in remote server machines which are managed by the cloud service provider.This necessitates the encryption of user’s sensitive information before outsourcing to the commercial public cloud. Huge amount of information present in the cloud calls for an efficient data retrieval mechanism.We are proposing a novel approach for keyword based search on the encrypted cloud data which facilitates easy retrieval of information from multiple encrypted data sources. Some of the existing approaches for the keyword based search focuses on Boolean search which will consider only the presence of the keyword in the file collection. Some other methods has server-side ranking wherethe encrypted relevance score may maintain some specific order which may lead to leakage of information. This paper uses latest information retrieval procedures along with vector space model and homomorphic encryption to ensure the search accuracy and secrecy while concealing the access pattern and search pattern. It provides a multi-user environment that supports storage of data belonging to multiple data owners andsearch request from multiple users. A salient feature of the suggested method is it allows efficient update operation of the file collection by the data owners. This process avoids the overhead of uploading/calculating the index scores for each of the existing documents from scratch for any file collection change.
Authors and Affiliations
Samantha Susan Mathew , Hafsath C A
Development of Text-to-Speech Synthesizer for Pali Language
Abstract : We introduced a new method for Text-To-Speech (TTS) synthesis for Pali language. We discuss the efforts in collecting speech database of Pali language and relevant design issues in development of TTS system.T...
Dynamic Passwords Using Graphics
Abstract:Textual passwords are most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are intro...
Cyber Physical Systems: Error Verification and Prediction in Smart Medical Devices
Abstract: Embedded software is a piece of software that is built in a system or hardware component to achieve an objective. Cyber-Physical Systems (CPS) are integrations of computation with physical processes which are m...
Dendritic Cell Algorithm and Dempster Belief Theory Based Approach for Intrusion Detection System
Abstract: Everyone knows the services of the Internet. Internet services contain large scale of data. Security is one of the important issues during transmission of data over the network. To avoid misuse of data an...
Evaluating Air Pollution Parameters Using Zigbee (IEEE 802.15.4)
Air pollution receives one of the prime concerns in India, primarily due to rapid economic growth, industrialization and urbanization with associated increase in energy demands. Lacks of implementation of e...