Submit Search
Upload
Multi-Keyword Ranked Search in Encrypted Cloud Storage
•
0 likes
•
30 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i2/IRJET-V4I2338.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
552 556
552 556
Editor IJARCET
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
Venkat Projects
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET Journal
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
Recommended
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
552 556
552 556
Editor IJARCET
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
Venkat Projects
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
Efficient Privacy Preserving Clustering Based Multi Keyword Search
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET Journal
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
Final 1st
Final 1st
gokulprema
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
IAESIJEECS
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
IMPULSE_TECHNOLOGY
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in Clouds
IRJET Journal
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
IJERA Editor
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
theijes
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
swathi78
IJARCCE 20
IJARCCE 20
Nahan Rahman
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Shakas Technologies
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET Journal
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
sharathdj
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
More Related Content
What's hot
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
Final 1st
Final 1st
gokulprema
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IGEEKS TECHNOLOGIES
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
Nexgen Technology
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
IAESIJEECS
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
IMPULSE_TECHNOLOGY
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Swathi Rampur
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in Clouds
IRJET Journal
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
IJERA Editor
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
theijes
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
swathi78
IJARCCE 20
IJARCCE 20
Nahan Rahman
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
Shakas Technologies
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET Journal
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
sharathdj
What's hot
(20)
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Final 1st
Final 1st
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Privacy preserving multi-keyword ranked search over encrypted cloud data 2
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in Clouds
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
IJARCCE 20
IJARCCE 20
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
IRJET- An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Privacy preservingmulti-keywordrankedsearchoverencryptedclouddata-14090213203...
Similar to Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
IRJET Journal
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
IRJET Journal
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET Journal
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET Journal
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
hemanthbbc
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
ASAITHAMBIRAJAA
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET Journal
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
IEEEFINALSEMSTUDENTPROJECTS
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
IRJET Journal
J017547478
J017547478
IOSR Journals
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
IRJET Journal
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
Similar to Multi-Keyword Ranked Search in Encrypted Cloud Storage
(20)
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Review Paper On Multi-Keyword Ranked Search in Encrypted Cloud Storage
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
Efficient Similarity Search over Encrypted Data
Efficient Similarity Search over Encrypted Data
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee java project - privacy-preserving multi-keywor...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
Ieeepro techno solutions ieee dotnet project - privacy-preserving multi-keyw...
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
J017547478
J017547478
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
Privacy Preserving Multi-keyword Top-K Search based on Cosine Similarity Clus...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Call Girls in Nagpur High Profile
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZTE
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Recently uploaded
(20)
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
Internship report on mechanical engineering
Internship report on mechanical engineering
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Multi-Keyword Ranked Search in Encrypted Cloud Storage
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1708 Multi-Keyword Ranked Search in Encrypted Cloud Storage Akshay Kasulkar, Sahil Kamble, Nikhil Shettiwar,Tejaswini Dongre Prof. Vijay Masne UG Student, Dept. of Computer Science & Engineering, DBACER College, Maharashtra, India Assistant Professer, Dept. of Computer Science & Engineering, DBACER College, Maharashtra, India ---------------------------------------------------------------------***-------------------------------------------------------- Abstract— The approach of conveyed figuring, data proprietors are awakened to outsource their brain boggling data organization structures from neighbourhood goals to business open cloud for remarkable versatility and money related save stores. In any case, for guaranteeing data assurance, tricky data must be encoded before outsourcing, which obsoletes customary data use in perspective of plaintext catchphrase look. In this way, enabling an encoded cloud data look for organization is of focal criticalness. Considering the broad number of data customers and reports in cloud, it is basic for the chase organization to allow multi- watchword question and give result similarity situating to meet the convincing data recuperation require. Related tackles searchable encryption focus on single catchphrase request or Boolean watchword look for, and on occasion isolate the inquiry things. In this paper, strikingly, we portray and handle the testing issue of insurance sparing multi- keyword positioned look over encoded cloud Information (MRSE), and set up a game plan of strict assurance necessities for such a sheltered cloud data utilize structure to wind up unmistakably a reality. Among various multi- watchword semantics, we pick the capable lead of "orchestrate planning", i.e., whatever number matches as could sensibly be normal, to get the similarity between interest request and data documents, and further use "interior thing equivalence" to quantitatively formalize such rule for closeness estimation. We first propose a central MRSE plot using secure inner thing count, and after that inside and out upgrade it to meet different insurance necessities in two levels of hazard models. Serious examination investigating security and adequacy confirmations of proposed arrangements is given, and examinations on this present reality dataset also exhibit proposed plots most likely present low overhead on figuring and correspondence. Key words— Cloud computing, Encryption, Inner product similarity, Single Keyword Search, Multi-keyword search, ranking. 1.INTRODUCTION Presently a-days a large number of information is basic regular on the web. Every day new information is outsourced because of development away in addition to prerequisites of clients, then basically semi-put stock in servers. Cloud registering is a Web-based model, where cloud customers can supply their information into the cloud [1]. By stacking information into the cloud, the information proprietors remain unbound after the limit of capacity. Subsequently, to protect touchy information honesty is a fundamental errand. To shield information protection in the cloud, the information proprietor must be outsourced in the encoded framework to people in general cloud and the information operation is established on plaintext keyword look. We select the proficient measure of "arrange coordinating". Organize coordinating is utilized to gauge the parallel sum. Facilitate coordinating catches the centrality of information records to the inquiry question keywords. The inquiry office and security defensive over scrambled cloud information are fundamental. In the event that we concentrate enormous measure of information reports and information clients in the cloud, it is hard for the necessities of execution, convenience, in addition to versatility. Worried to experience the genuine information recuperation, the colossal measure of information archives in the cloud server accomplishes to result important rank as opposed to returning undistinguishable results. Positioning plan minds multiple keyword pursuit to recoup the inquiry rightness. Today's Google network seek gadgets, information clients offer arrangement of keywords rather than remarkable keyword look significance to recover the most extreme critical information. Organize coordinating is a synchronize matching of question keywords which are significance to that report to the inquiry. Because of inherence wellbeing and security, it remains the intriguing employment for how to relate the scrambled cloud seeks. The troublesome of multi-keyword positioned seek over encoded cloud information is settled by utilizing stringent security necessities then various multi-keyword semantics. Among various multi-keyword positioned semantics, we pick facilitate coordinating. Our commitments are condensed as takes after, 1) For the first occasion when, we investigate the issue of multi keyword positioned look over scrambled cloud information, and build up an arrangement of strict protection prerequisites for such a safe cloud information use framework. 2) We propose two MRSE plans in view of the likeness measure of "arrange coordinating" while meeting diverse protection prerequisites in two distinctive risk models. 3) Thorough examination exploring security and productivity assurances of the proposed plans is given; an analysis on this present
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1709 reality dataset additionally demonstrate the proposed plots in fact present low overhead on calculation and correspondence. 2. PROBLEM STATEMENT Quite number of on-request information clients and enormous measure of information archives in the cloud, this trouble is testing. It is fundamental for the hunt office to allow multi keyword look question and make accessible outcome correlation positioning to see the viable information recovery prerequisite. To build up the query output precision and in addition to enhance the client looking background, it is additionally fundamental for such positioning framework to bolster multiple keywords hunt, as single keyword inquiry frequently yields extraordinary coarse outcomes. The searchable encryption technique support to give encoded information encourages a client to immovably look over single keyword and recover archives of concern. 3. Literature Survey Qin Liu et al. proposed Secure and protection saving keyword seek in [1]. It gives keyword protection, information protection and semantic secure by open key encryption. The principle issue of this hunt is that the correspondence and computational cost of encryption and unscrambling is more. Ming Li et al. proposed Authorized Private keyword Search (APKS) in [2]. It gives keyword security, Index and Query Privacy, Fine-grained Search Authorization and Revocation, Multi-dimensional Keyword Search, Scalability and Efficiency. This pursuit technique builds the hunt productivity utilizing quality chain of importance however by and by every one of the characteristics are not various leveled. Cong Wang et al in [3] proposed Secure and Efficient Ranked Keyword Search which illuminates preparing overhead, information and keyword protection, least correspondence and calculation overhead. It is not helpful for multiple keyword quests, Also there is a tiny bit of overhead in file building. Kui Ren et al. [4] proposed Secured fluffy keyword seek with symmetric searchable encryption (SSE). It doesn't bolster fluffy pursuit with open key based searchable encryption, additionally it can't play out multiple keywords semantic hunt. The overhauls for fluffy searchable file are not proficiently performed. Ming Li et al. [5] proposed Privacy guaranteed searchable cloud Storage strategy. It is executed utilizing SSE, Scalar-Product-Preserving Encryption and Order- Preserving Symmetric Encryption. It bolsters the protection and utilitarian prerequisites. This plan does not bolster open key based searchable encryption. Wei Zhou et al. [6] proposed K-gram based fluffy keyword Ranked Search. In this proprietor make k-gram fluffy keyword file for records D and tuple <I, D> is transferred to inquiry server (SS) which is embedded to sprout channel for size controlling. The scrambled record D is transferred to capacity server. However, the issue is that, the measure of the k-gram construct fluffy keyword set depends in light of the jacquard coefficient esteem. J. Baek et al. in [7] proposed Secure Channel Free Public Key Encryption with Keyword Search (SCF-PEKS) technique. In these strategy bunch servers makes its own open and private key combine however this technique experiences outside assailant by KGA. H. S. Rhee et al. [8] proposed Trapdoor in noticeability Public-Key Encryption with Keyword Search (IND-PEKS). In this outsourcing is done as SCF-PEKS. It experiences outside aggressor utilizing KGA and breaking down the recurrence of event of keyword trapdoor. Peng Xu et al. [9] proposed Public-Key Encryption PEFKS with Fuzzy Keyword Search, in this client makes fluffy keyword trapdoor Tw and correct keyword trapdoor Kw for W. Client asks for Tw to CS. At that point CS checks Tw with fluffy keyword file and sends superset of coordinating figure messages by Fuzz Test calculation that is executed by CS. The client procedure Exact Test calculation for checking figure writings with Kw and recover the encoded records. The way toward making fluffy keyword file and correct keyword list is troublesome for vast size database. Ning et al. [10] proposed Privacy Preserving Multi Keyword Ranked Search (MRSE). It is helpful for known figure content model and foundation demonstrate over scrambled information. It gives low calculation and correspondence overhead. The facility coordinating is chosen for multi- keyword seeks. The downside is that MRSE have little standard deviation which lessens the keyword security. 4. PROPOSED SOLUTION We propose a powerful framework where any approved client can do a pursuit on scrambled information with multiple keywords, without uncovering the keywords he looks for, nor the information of the records that match by the question. Approved clients can make seek forms by distinct keywords on the cloud to recover the pertinent reports. Our proposition framework encourages that a gathering of clients can inquiry the database gave that they have purported trapdoors for the hunt terms that approve the clients to incorporate them in their inquiries. Our proposed framework can play out multiple keyword hunts in a solitary question and positions the outcomes so the client can recover just the most important matches in a requested way. Also, we build up an arrangement of strict protection prerequisites. Among various multi keyword semantics, we select the viable rule of "organize coordinating".
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1710 5. SYSTEM OVERVIEW The framework engineering is worried by making a straightforward auxiliary structure for a framework. It characterizes the general edge of the venture which quickly depicts the working of the structure and the motivation behind the venture stage is to arrange an answer of the issue distinguished by the need document. The underneath Figure 1 demonstrates the framework of the structure. We consider three sections in our framework engineering: Data Owner, Data client and Cloud Server. Data Owner is in charge of the making of the database. Data Users are the devotees in a gathering who can utilize the documents of the database. Cloud Server bargains information offices to confirmed clients. It is fundamental that server be torpid to substance of the database it keeps. Fig 1: Search over Encrypted Cloud Information proprietor has measure of information records that he wishes to outsource on cloud server in scrambled frame. Before outsourcing, information proprietor will first build a protected searchable record from an arrangement of differing keywords expelled from the document gathering and store both the list and the encoded document on the cloud server. We attempt the endorsement between the information proprietor and clients are finished. To look the record gathering for a given keyword, ensured client makes and presents an inquiry ask for in a mystery frame a trapdoor of the keyword to the cloud server. After getting the hunt ask for, the server is in control to seek the record and give back the coordinating arrangement of documents to the client. We concentrate the protected positioned keyword look dangerous as takes after: the query output must be returned providing for clear positioned significance standards, to create record recovery accuracy for clients. However, cloud server must review obscure or minimal about the critical standards themselves as they uncover significant touchy information against keyword protection. To decline transfer speed, the client may send conceivable esteem k alongside the trapdoor and cloud server just sends back the top-k most proper documents to the client's concerned keyword. Outline Goals: To permit positioned scan for agent utilization of outsourced cloud information under the previously mentioned display, our framework configuration ought to quickly accomplish security and execution affirmations as takes after. Multi-keyword Ranked Search: To configuration seek plans which permit multi-keyword question and give result closeness positioning to successful information recovery, rather than returning undifferentiated outcomes. Protection Preserving: To keep the cloud server from taking in extra information from the dataset and the record, and to meet security. Effectiveness: Above objectives on usefulness and security ought to be accomplished with low correspondence and calculation overhead. Arrange Matching: "Organize coordinating" [2] is a middle of the road comparability measure which utilizes the quantity of question keywords showing up in the report to evaluate the importance of that archive to the inquiry. At the point when clients distinguish the correct subset of the dataset to be recaptured, Boolean inquiries accomplish well with the correct hunt need expressed by the client. It is more versatile for clients to recognize a rundown of keywords demonstrating their worry and recover the most important reports with a rank request. 6. IMPLEMENTATION Data User Module: Information clients are clients on this framework, will's identity ready to download documents from the cloud that are transferred by the information proprietors. Since the documents put away on the cloud server could be in enormous numbers, there is a pursuit office gave to the client. The client ought to have the capacity to do a multi- keyword look on the cloud server. Once, the outcome shows up for the particular pursuit, these clients ought to have the capacity to send a demand to the individual information proprietors of the document through the framework (likewise called trap-entryway ask for) for downloading these records. The information clients will likewise be given a demand endorsement screen, where it will tell if the information proprietor has acknowledged or dismisses the demand. In the event that the demand has been affirmed, the clients ought to have the capacity to download the decoded record. Information Owner Module: In this module, the information proprietors ought to have the capacity to transfer the records. The documents are encoded before the records are transferred to the cloud. The information proprietors are given an alternative to
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1711 enter the keywords for the document that are transferred to the server. These keywords are utilized for the ordering reason which helps the pursuit return values rapidly. These records when once accessible on the cloud, the information clients ought to be capable pursuit utilizing the keywords. The information proprietors will likewise be furnished with a demand endorsement screen so they can support or reject the demand that is gotten by the information clients. Document Upload and Encryption Module: In this module, the information proprietors ought to have the capacity to transfer the documents. The records are scrambled before the documents are transferred to the cloud. The information proprietors are given an alternative to enter the keywords for the record that are transferred to the server. These keywords are utilized for the ordering reason which helps the hunt return values rapidly. These records when once accessible on the cloud, the information clients ought to have the capacity to hunt utilizing keywords. The information proprietors will likewise be furnished with a demand endorsement screen so they can support or reject the demands that are gotten by the information clients. The document before transfer should be encoded with a key so that the information clients can't simply download it without this key. This key will be asked for by the information clients through the trap-entryway. The encryption of these records utilizes RSA calculation so that unapproved clients won't have the capacity to download these documents. Document Download and Decryption Module: Information clients are clients on this framework, will's identity ready to download documents from the cloud that are transferred by the information proprietors. Since the records put away on the cloud server could be in immense numbers, there is a pursuit office gave to the client. The client ought to have the capacity to do a multi-keyword seek on the cloud server. Once, the outcome shows up for the particular pursuit, the clients ought to have the capacity to send a demand to the individual information proprietors of the document through the framework (additionally called trap-entryway ask for) for downloading these records. The information clients will likewise be given a demand endorsement screen, where it will tell if the information proprietor has acknowledged or dismisses the demand. On the off chance that the demand has been endorsed, the clients ought to have the capacity to download the unscrambled document. The record before download should be unscrambled with a key. This key will be asked for by the information clients through the trap- entryway ask. Once the key is given amid the download, the information clients will have the capacity to download the record and utilize them. Rank-Search Module: This module permits the information clients to seek the documents with multi-keyword rank looking. This model uses the every now and again utilized rank hunting calculation down present the yield for multi-keywords. "Facilitate Matching" guideline will be embraced for the multi-keyword seeking. This module likewise deals with making a file for speedier hunt. 7. CONCLUSION In this work, firstly we portray and resolve the troublesome of multi-keyword positioned look over scrambled cloud information, and make an assortment of protection necessities. Between various multi-keyword semantics, we select the compelling likeness measure of "facilitate coordinating", i.e., as different matches as likely, to adequately catch the importance of outsourced archives to the question correspondence .In our future work, we will seek supporting other multi keyword semantics over encoded information and checking the honesty of the rank request in the item keywords. For tradition the test of steady multi-keyword semantic without security breaks, we propose an essential thought of MRSE. At that point we give two better MRSE diagrams to acknowledge numerous stringent security necessities in two divergent risk models. Nitty gritty examination contemplating security and effectiveness assurances of proposed plans is given, and trials on this present reality information set demonstrate our future frameworks present low overhead on both calculation and correspondence. REFERENCES [1] Qin Liuy, Guojun Wangyz, and Jie Wuz,”Secure and privacy preserving keyword searching for cloud storage services”, ELSEVIER Journal of Network and computer Applications, March 2011 [2] Ming Li et al.,” Authorized Private Keyword Search over Encrypted Data in Cloud Computing,IEEE proc. International conference on distributed computing systems, June 2011,pages 383-392 [3] Cong Wang et al.,”Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 23, no. 8, August 2012 [4] Kui Ren et al., “Towards Secure and Effective Data utilization in Public Cloud”, IEEE Transactions on Network, volume 26, Issue 6, November / December 2012 [5] Ming Li et al.,”Toward Privacy-Assured and Searchable Cloud Data Storage Services”, IEEE Transactions on Network, volume 27, Issue 4, July/August 2013 [6] Wei Zhou et al., “K-Gram Based Fuzzy Keyword Search over Encrypted Cloud Computing “Journal of Software Engineering and Applications, Scientific Research , Issue 6, Volume 29-32,January2013
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1712 [7] J. Baek et al., “Public key encryption with keyword search revisited", in ICCSA 2008, vol. 5072 of Lecture Notes in Computer Science, pp. 1249 - 1259, Perugia, Italy, 2008. Springer Berlin/Heidelberg. [8] H. S. Rhee et al., “Trapdoor security in a searchable public-key encryption scheme with a designated tester," The Journal of Systems and Software, vol. 83, no. 5, pp. 763-771, 2010. [9] Peng Xu et al., Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack”,IEEE Transactions on computers, vol. 62, no. 11, November 2013 [10] Ning Cao et al.,” Privacy-Preserving Multi- Keyword Ranked Search over Encrypted Cloud Data”, IEEE Transactions on parallel and distributed systems, vol. 25, no. 1, jan 2014 [11] D. X. D. Song, D. Wagner, and A. Perrig, ”Practical techniques for searches on encrypted data,” in Proc. S & P, BERKELEY, CA, 2000, pp. 44. [12] C. Wang, N. Cao, K. Ren, and W. J. Lou, Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012. [13] W. Sun, B. Wang, N. Cao, M. Li, W. Lou, Y. T. Hou, and H. Li, ”Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” in Proc. ASIACCS, Hangzhou, China, 2013, pp. 71-82. [14] R. X. Li, Z. Y. Xu, W. S. Kang, K. C. Yow, and C. Z. Xu, Efficient multi-keyword ranked query over encrypted data in cloud computing, Futur. Gener. Comp. Syst., vol. 30, pp. 179-190, Jan. 2014. [15] Gurdeep Kaur, Poonam Nandal, “Ranking Algorithm of Web Documents using Ontology”, IOSR Journal of Computer Engineering (IOSR-JCE) eISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VIII (May- Jun. 2014), PP 52-55
Download now