INFORMATION SECURITY AND SECURE SEARCH OVER ENCRYPTED DATA IN CLOUD STORAGE SERVICES
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 4
Abstract
Cloud computing is most widely used as the next generation architecture of IT enterprises, that provide convenient remote access to data storage and application services. This cloud storage can potentially bring great economical savings for data owners and users, but due to wide concerns of data owners that their private data may be exposed or handled by cloud providers. Hence end-to-end encryption techniques and fuzzy fingerprint technique have been used as solutions for secure cloud data storage. In this project we use searchable encryption techniques, which allows encrypted data to be searched by users without leaking information about the data itself and user’s queries. We build a secure searchable index, and develop a one to many order preserving mapping technique to protect those sensitive score information. The resulting design is able to facilitate efficient server side ranking without losing keyword privacy. Hence to avoid loose and loss of data, we use privacy preserving data-leak detection (DLD) solution to solve the issue where sensitive data digests is used in detection. The advantage of this method is that it enables the data owner to safely delegate the detection operation to a semi honest provider without revealing the sensitive data to the provider.In this project, we identify the challenges towards achieving privacy in searchable outsourced cloud data services and we use the DLD solution which helps to detect the leak data. This technique helps us to save securely our sensitive data in cloud storage and retrieve this data while we required without leaking our private data through Information Security and Secure Search over Encrypted Data in Cloud Storage Services.
Authors and Affiliations
Storage,
Realization of Change of Hysteresis and Eddy Current Losses, with Change of Electrical Parameters, by using Matlab and Simulink
Hysteresis and Eddy current losses are most common losses occurring in static and rotating electrical machines. These losses depend on different variable and constant parameters. In this article, we will discuss variat...
Stiffness Analysis of Actuator Flexure by FEM
Actuator is a fluid control component, which will be used in any of the fluid control requirements. The proposed actuator is normally closed and electro-mechanically actuated with armature configuration. The armat...
Assessment of Food Habits & Nutritional Status of Jharna Adults, Jaipur, Rajasthan
The growth and prosperity of a nation depend heavily on the nutritional status of its population. In India people have different food habits and their food is all together different too so it is interesting scient...
Performance Evaluation of Cluster Computing
Cluster Computing addresses the latest results in these fields that support High Performance Distributed Computing (HPDC). In HPDC environments, parallel and/or distributed computing techniques are applied to the solut...
Voltage Controlled Delay Line with PFD for Delay Locked Loop in CMOS90nm Technology
Low power consumption is always desired for any electronic products today. Demand of modern measurement systems in submicron CMOS process introduced new challenges in design of low power high frequency clock gene...