Manuscript Number : IJSRSET11844113
An Efficient Search Method over an Encrypted Cloud Data
Authors(6) :-Dipeeka Radke, Nikita Hatwar, Lila Gouda , Minal Shambharkar, Parul Gajimwar, Ruchika Raut
Cloud data owners used to transfer data in an encrypted form for the purpose of privacy preserving. Therefore it is important to develop efficient & reliable cipher text search techniques. In encryption technique, the relation between the data is hidden, which make them to perform deterioration. In earlier days it was not possible to upload the encrypted data on the cloud. Now a days the number of internet users are increasing & day by day the number of data is also increasing. According to the growth of increasing number of data it is important to provide security to the cloud data. For providing security to the data on the cloud, it should be first converted into encrypted form before transferring it & it can be regain effectively. Along with this more additional features can also be provided with the search techniques like dynamic update operations. In this paper a hierarchical clustering method is used to support more search methods & also to complete the demand for fast cipher text search method for big data environments. For the huge number of users & the data in the cloud, it is important for the search method to include multi keyword query for arranging the comparison of ranking for the proper need of data regain search and not regularly famed the search results. In this system, the interesting problem of privacy preserving multi keywords ranked search over encrypted cloud data can be explain and solve. And also used to create strict privacy for safe cloud data application so that the system should be effected in real world.
Dipeeka Radke
Multi-Keyword Ranked Search, Security, Cipher text Search, Privacy preserving
Publication Details
Published in :
Volume 4 | Issue 4 | March-April 2018 Article Preview
Department of Computer Science and Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
Nikita Hatwar
Department of Computer Science and Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
Lila Gouda
Department of Computer Science and Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
Minal Shambharkar
Department of Computer Science and Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
Parul Gajimwar
Department of Computer Science and Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
Ruchika Raut
Department of Computer Science and Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, Maharashtra, India
Date of Publication :
2018-04-30
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) :
436-441
Manuscript Number :
IJSRSET11844113
Publisher : Technoscience Academy