PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

An Approach towards economical hierarchic Search over Encrypted Cloud

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Konferencja
International Conference on Information Technology and Knowledge Management (1 ; 22-23.12.2017 ; New Delhi, India)
Języki publikacji
EN
Abstrakty
EN
In display, Cloud registering is the prevailing area in data innovation. With expanded value of information outsourcing of cloud information protection of delicate information turns into a major issue. For the security reason information is encoded before outsourcing. Yet, scrambled information is exceptionally hard to be recovered proficiently. Albeit some conventional scan plans are accessible for looking encoded information, yet these methods are just base on Boolean pursuit and not manage the importance of records. These methodologies experience the ill effects of two principle inadequacies. Right off the bat, on the off chance that one client has no pre-learning of scrambled information, needs to process each recovered record to discover after effects of his utilization. Also, every time recovering every one of the records containing question watchword builds arrange movement. This work is devoted to build up a process for security and compelling recovery of cloud information. Positioned seek enormously enhances the execution by restoring the documents in positioned arrange in light of some closeness importance criteria. To accomplish more viable execution, framework shows an approach for SSE which uses data recovery and cryptography primitives. Thus the execution depends OPSE.
Rocznik
Tom
Strony
125--129
Opis fizyczny
Bibliogr. 9 poz., il.
Twórcy
autor
  • KPMG US
  • KPMG US
autor
  • Department of Computer Science & Engineering, Sri Satyasai University of Technology and Medical Sciences, Sehore, Madhya Pradesh
autor
  • ACERC AJMER
Bibliografia
  • 1. Song D X, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. Proceedings of IEEE Symposium on Security and Privacy, IEEE, Berkeley, California .
  • 2. Goh E-J (2003) Secure indexes. Cryptology ePrint Archive, Report 2003/216
  • 3. Boneh D, Cresecenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Advances in Cryptology- Eurocrypt3027: 506-522.
  • 4. Chang Y C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. Applied Cryptography and Network Security 3531: 442-455.
  • 5. Chang Y C, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. Applied Cryptography and Network Security 3531: 442-455.
  • 6. Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. Proceedings of the 13th ACM conference on Computer and communications security, ACM, Alexandria, VA, USA.
  • 7. Bellare M, Boldyreva A, O’Neill A (2007) Deterministic and efficiently searchable encryption. In Advances in Cryptology-CRYPTO4622: 535-552.
  • 8. Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data.30th IEEE International Conference on Distributed Computing Systems (ICDCS), IEEE Comp Society Washington, DC, USA.
  • 9. Wang C, Cao N, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel DistribSyst 23:1467-1479.
Uwagi
1. Preface
2. Technical Session: First International Conference on Information Technology and Knowledge Management
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-c5b88986-0bc3-4b05-9c00-8ece880c6999
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.