alexa An Efficient Retrieval of Encrypted Data In Cloud Comp
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

An Efficient Retrieval of Encrypted Data In Cloud Computing

N.Nandhini1, and P.G Kathiravan2
  1. II Year M.Tech. IT Student, V.S.B Engineering College, Karur, Tamil Nadu, India
  2. Assistant Professor/IT, V.S.B Engineering College, Karur, Tamil Nadu, India
Related article at Pubmed, Scholar Google


The arrival of cloud computing the new pattern for data outsourcing and high quality data service is great flexibility and economic saving. However fear about the sensitive information on cloud to be protecting the data privacy problems sensitive information has to be encrypted before outsourcing, which creates the effective data utilization services a very big challenging task. Symmetric Searchable Encryption (SSE) technique allows to retrieval of encrypted data on cloud, but it leaks the data privacy. Secure server –side ranking based on the order-preserving Encryption (OPE) it include the similarity relevance and robustness. But OPE also unavoidable of data privacy. To eliminate server side ranking introduce the Two-Round Searchable Encryption (TRSE) it include the vector space model and homomorphic encryption. Vector space model used for user retrieve file accurately and homomorphic encryption used for ranking involve in the user side it done by server side operation on cipher text. The TRSE also leakage the privacy and it generated the small number of keys so unauthorized user easily hack the sensitive information so to avoid this problem propose the blowfish algorithm it generate the large number keys. We propose scheme is high security guarantee and more efficiently retrieve the over encrypted data.


Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version