Downloads: 119 | Views: 275 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 7.1 / 10
A Survey of Rank Based Search Results over Encrypted Cloud Data
Mithuna.R, Suguna.M
Abstract: Migration of users into the cloud environment is increased with the high popularity of services provided by the cloud providers. When large number of users outsource their files into the cloud environment privacy becomes the most important issue. In order to assure privacy users encrypt their files before outsourcing it to the cloud server. The efficient searching and effective retrieval of files becomes most complex when the files are stored in the encrypted format. In the previous work Multi- Ranked Search over Encrypted (MRSE) cloud data is implemented to assure privacy enhanced searching mechanism. The ranking mechanism is used to retrieve the most similar files over the encrypted files. However one cannot assure that whether all retrieved results are having similar fields. This work focuses on implementing the rank test method to check the integrity of the rank order (i. e. ) to find out the resulting files are having similar fields or not. Our proposed system is used to retrieve the files with the most similarity values and hence the privacy is improved.
Keywords: Cloud computing, multi search, privacy preserving, ranked search, encrypted file
Edition: Volume 4 Issue 1, January 2015
Pages: 1013 - 1016
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 94
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V
Downloads: 100
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1058 - 1060Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Downloads: 101
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1232 - 1234A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem
Rashmi Khawale, Omprakash Tembhurne
Downloads: 102
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1165 - 1168Privacy Preserving Closed Frequent Pattern Mining
Anju Vijayan