alexa Abstract | Top K Result Retrieval in Searching the File over the Encrypted Data in Cloud
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access

Abstract

In cloud computing, data owners may share their outsourced data with a number of users, who might want to only retrieve the data files they are interested in. One of the most popular ways to do so is through keywordbased retrieval. We propose a new searchable encryption scheme, in which novel technologies in cryptography community, including ECC encryption and the vector space model. In the proposed scheme, the data owner encrypts the searchable index with kNN. When the cloud server receives a query consisting of multikeywords, it computes the scores from the encrypted index stored on cloud and then returns the encrypted scores of files to the data user. Next, the data user decrypts the scores and picks out the top-k highest- scoring files’ identifers to request to the cloud server. The retrieval takes a two-round communication between the cloud server and the data user. The scheme, the privacypreserving multi-keyword ranked search over encrypted data in cloud computing scheme, in which ranking is done at the user side while scoring calculation is done at the server side.Thorough analysis investigating privacy and efficiency guarantees ofproposed schemes is given. Experiments on the real-world data set further show proposed schemes indeed introduce lowoverhead on computation and communication.

To read the full article Peer-reviewed Article PDF image | Peer-reviewed Full Article image

Author(s): C.Saranya, G.Radha, R.Subash

Share This Page

Additional Info

Loading
Loading Please wait..
 
 
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords