INFORMATION SECURITY AND SECURE SEARCH OVER ENCRYPTED DATA IN CLOUD STORAGE SERVICES
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 4
Abstract
Cloud computing is most widely used as the next generation architecture of IT enterprises, that provide convenient remote access to data storage and application services. This cloud storage can potentially bring great economical savings for data owners and users, but due to wide concerns of data owners that their private data may be exposed or handled by cloud providers. Hence end-to-end encryption techniques and fuzzy fingerprint technique have been used as solutions for secure cloud data storage. In this project we use searchable encryption techniques, which allows encrypted data to be searched by users without leaking information about the data itself and user’s queries. We build a secure searchable index, and develop a one to many order preserving mapping technique to protect those sensitive score information. The resulting design is able to facilitate efficient server side ranking without losing keyword privacy. Hence to avoid loose and loss of data, we use privacy preserving data-leak detection (DLD) solution to solve the issue where sensitive data digests is used in detection. The advantage of this method is that it enables the data owner to safely delegate the detection operation to a semi honest provider without revealing the sensitive data to the provider.In this project, we identify the challenges towards achieving privacy in searchable outsourced cloud data services and we use the DLD solution which helps to detect the leak data. This technique helps us to save securely our sensitive data in cloud storage and retrieve this data while we required without leaking our private data through Information Security and Secure Search over Encrypted Data in Cloud Storage Services.
Authors and Affiliations
Storage,
Cursor Movement in Real Time using Hand Gesture Recognition
This paper proposes a method for cursor movements by Classifiers. Purpose of this paper is to reduce the external hardware and to interact with the computer. The system consists of two modules namely, gesture rec...
PERFORMANCE ANALYSIS OF COOPERATIVE COMMUNICATION FOR DUALHOPE RELAYING NETWORK WITH HARDWARE IMPAIRMENT OVER RAYLEIGH FADING CHANNEL
The cooperative communication becomes an important topic in the field of wireless communication network to improve the reiliability and speed of communication over long distance and curvbed surface. As distance is...
Wormhole Attack Elimination in Mobile Ad-hoc Networks With OPTIMIZED Multipath Algorithm
Communication has different terms for different users in the technology. Wireless and Ad-hoc communication are two main communication medium which are fulfilling different domain requirement for the users. Talking abou...
A REVIEW ON CLASSIFICATION OF EEG SIGNAL DATA
A Brain computing system is a communication channel between the human or animal brain and external environment; it’s a collaboration in which brain controls a mechanical device as a natural part of its representat...
DETECTION OF COMPUTER VIRUSES USING WELM_ FMA_FBFO
Computer viruses are big threat for our society .The expansion of various new viruses of varying forms make the prevention quite tuff. Here we proposed WELM_FMA_FBFO to detect computer viruses. The proposed method...