Downloads: 126 | Views: 251
Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016 | Popularity: 6.6 / 10
Survey on Privacy Preservation for Multi-Keyword Search on Data Network
Nilima S. Kasar, Vitthal S. Phad
Abstract: In recent years, growth of private and semi-private information has grown rapidly on information network so, mechanisms to search such information have failed in privacy preservation. In todays emerging information networks, it is essential to find a solution for accessing the data from large number of providers while maintaining a privacy. So, there is a strong need to develop a technique which provides user required information in ranked order while preserving the users privacy. This paper analyzes different methods concerning about privacy of data in the public and private networks and also, analyzes a system based on public cloud platform where data sharing is takes place between public and private systems on a network through authentication and encryption. This system works on local private server which controls multiple systems. This paper is motivated by the lack of tools for an access controlled multi- search of data on the public and private network.
Keywords: Encryption, Decryption, Ranking algorithm
Edition: Volume 5 Issue 1, January 2016
Pages: 457 - 460
DOI: https://www.doi.org/10.21275/NOV152679
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash