SEPARATENESS-DESTRUCTIVE ENCRYPTION CHARACTERS MULTIPLE-INVOLVEMENT MECHANISM FOR LARGE INFORMATION STORAGE
Abstract
Although data along with index privacy assurances are crucial instantly in connected literature, numerous search privacy needs associated with query procedure tend to be difficult to undertake. Exploring privacy preserving additionally to valuable search service above encrypted cloud facts are of supreme importance. Multi-keyword rated search problem above encrypted cloud data was solved inside our work while safeguarding strict system wise privacy within cloud-computing concept. It's personalized from secluded k-nearest neighbour method and subsequently provide two considerably improved multi-keyword rated search schemes to attain numerous stringent privacy needs by 50 percent threat models with enhanced attack ability. For managing of multi-keyword semantic missing of privacy breaches, we advise an easy idea for multi-keyword rated search by means of protected inner product computation. To achieve multi-keyword rated search, we advise utilizing inner product being similar to quantitatively assess ingenious similarity measure known as coordinate matching.
Keywords
References
S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing,” Proc. IEEE INFOCOM, 2010.
C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proc. IEEE INFOCOM, 2010.
S. Zerr, E. Demidova, D. Olmedilla, W. Nejdl, M. Winslett, and S. Mitra, “Zerber: r-Confidential Indexing for Distributed Documents,” Proc. 11th Int’l Conf. Extending Database Technology (EDBT ’08), pp. 287-298, 2008.
D. Boneh and B. Waters, “Conjunctive, Subset, and Range Queries on Encrypted Data,” Proc. Fourth Conf. Theory Cryptography (TCC), pp. 535-554, 2007.
R. Brinkman, “Searching in Encrypted Data,” PhD thesis, Univ. Of Twente, 2007.
Y. Hwang and P. Lee, “Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-User System,” Pairing, vol. 4575, pp. 2-22, 2007.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.