Phrase Searching for Encrypted Cloud Storage

被引:0
|
作者
Gaware, Ankita J. [1 ]
Theng, Deepti. P. [1 ]
机构
[1] Comp Sci & Engn GH Raisoni Coll Engn, Nagpur, Maharashtra, India
来源
HELIX | 2018年 / 8卷 / 05期
关键词
Cryptography; Cloud; Encryption Technique; Phrase; Hash function;
D O I
10.29042/2018-3746-3749
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
The storage and access of confidential documents are known together for the central issues within the space. Whereas several schemes are planned to perform a conjunctive keyword search, less attention has been noted on more specialized looking techniques. There are several issues like as organizations and people adopt cloud technologies, several became aware of the intense considerations concerning security and privacy of accessing personal and confidential information over the net and conjointly there's want of correct looking. In existing conjunctive key search has less attention towards specialized search In this paper, we tend to propose a phrase search theme that takes advantage of the house potency of Bloom filters. It makes use of bilaterally symmetrical cryptography that provides process and storage potency over schemes supported public key cryptography. The theme provides the straightforward ranking capability, is custom-made to non-keyword search and is appropriate against inclusion-relation attack. Lastly, we tend to analyze our theme and value however it performs once changes.
引用
收藏
页码:3746 / 3749
页数:4
相关论文
共 50 条
  • [21] Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization
    Hu, Shengshan
    Cai, Chengjun
    Wang, Qian
    Wang, Cong
    Luo, Xiangyang
    Ren, Kaili
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 792 - 800
  • [22] CloudDBGuard: Enabling Sorting and Searching on Encrypted Data in NoSQL Cloud Databases
    Waage, Tim
    Wiese, Lena
    BIG DATA ANALYTICS AND KNOWLEDGE DISCOVERY (DAWAK 2018), 2018, 11031 : 261 - 270
  • [23] An Encrypted File Deduplication Scheme with Permission in Cloud Storage
    Deng, Zuojie
    Tan, Xiaolan
    Chen, Shuhong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 2018
  • [24] Removal of Duplicate Data From Encrypted Cloud Storage
    Maragatharajan, M.
    Prequiet, L.
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING (INCOS), 2017,
  • [25] ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage
    Puzio, Pasquale
    Molva, Refik
    Oenen, Melek
    Loureiro, Sergio
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 363 - 370
  • [26] Image Processing in Encrypted Domain for Distributed Storage in Cloud
    Deepthi, S.
    Lakshmi, V. S.
    Deepthi, P. P.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 1478 - 1482
  • [27] Semantic-Aware Searching Over Encrypted Data for Cloud Computing
    Fu, Zhangjie
    Xia, Lili
    Sun, Xingming
    Liu, Alex X.
    Xie, Guowu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2359 - 2371
  • [28] Deniable search of encrypted cloud-storage data
    Chi, Po-Wen
    Wang, Ming-Hung
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [29] Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization
    Zhang, Kai
    Wen, Mi
    Lu, Rongxing
    Chen, Kefei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2875 - 2887
  • [30] An Efficient Fuzzy Keyword Matching Technique for Searching Through Encrypted Cloud Data
    Ahsan, M. A. Manazir
    Chowdhury, Fahad Zaman
    Sabilah, Musarat
    Wahab, Ainuddin Wahid Bin Abdul
    Bin Idris, Mohd Yamani Idna
    2017 5TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS 2017): SOCIAL TRANSFORMATION THROUGH DATA SCIENCE, 2017,