Secure Full-Text Retrieval on Cloud

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Cloud Computing is a present day technology that effectively support the client oriented services. These days we are mostly using applications that consumes the cloud storage for storing and retrieving information. In such case that data management and privacy preservation cryptographic technique the data is converted to unreadable format. Due to this full text retrieval on encrypted data on cloud of required information becomes complex. Therefore in this paper we proposed bit slice indexing method on Elliptic-Curve-Diffie-Hellman for providing some security to cloud.

  • Keywords


  • References

      [1] W. Zheng, Y. Qin, B. Emmanuel, D. Zhang, and J. Chen, “Cost optimization for deadline-aware scheduling of big-data processing jobs on clouds”, Future Generation Computer Systems, 2017.

      [2] N. Sachdeva, O. Singh, P. K. Kapur, and D.Galar, “Multi-criteria intuitionistic fuzzy group decision analysis with TOPSIS method for selecting appropriate cloud solution to manage big data projects”, International Journal of System Assurance Engineering and Management, vol. 7, no. 3, pp. 316-324, 2016.

      [3] J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, “A secure cloud computing based framework for big data information management of smart grid”, IEEE transactions on cloud computing, vol. 3, no. 2, pp. 233-244, 2015.

      [4] Indu, PM Rubesh Anand, and Vidhyacharan Bhaskar. "Encrypted Token based Authentication with Adapted Security Assertions Mark-up Language Technology for Cloud Web Services." Journal of Network and Computer Applications, 2017.

      [5] Lu. Zhou,Youwen Zhu, and Aniello Castiglione. "Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner." Computers & Security, 2016.

      [6] H. Yin, Z. Qin, L. Ou, and K. Li, “A query privacy-enhanced and secure search scheme over encrypted data in cloud computing”, Journal of Computer and System Sciences, 2017.

      [7] X. Jiang, J. Yu, J. Yan, and R. Hao, “Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data”, Information Sciences, vol. 403, pp. 22-41, 2017.

      [8] W. Song, B. Wang, Q. Wang, Z. Peng, W. Lou, and Y. Cui, “A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications”, Journal of Parallel and Distributed Computing, vol. 99, pp. 14-27, 2017.

      [9] R. Pitchai, S. Jayashri, and J. Raja. "Searchable Encrypted Data File Sharing Method Using Public Cloud Service for Secure Storage in Cloud Computing." Wireless Personal Communications, vol. 90, no. 2, pp. 947-960, 2016.

      [10] Wang, Haijiang, Xiaolei Dong, and Zhenfu Cao. "Secure and efficient encrypted keyword search for multi-user setting in cloud computing." Peer-to-Peer Networking and Applications, pp. 1-11, 2017.

      [11] C. Y. Yang, C. T. Huang, Y. P. Wang, Y. W. Chen, and S. J. Wang, “File changes with security proof stored in cloud service systems”, Personal and Ubiquitous Computing, pp. 1-9, 2017.

      [12] H. Cui, Robert H. Deng, and Yingjiu Li. "Attribute-based cloud storage with secure provenance over encrypted data." Future Generation Computer Systems, vol. 79, pp. 461-472, 2018.

      [13] Mehmet SabırKiraz, "A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing", Journal of Ambient Intelligence and Humanized Computing, vol. 7, no. 5, pp. 731-760, 2016.

      [14] D. He, N. Kumar, H. Wang, L. Wang, and K. K. R. Choo, “Privacy-preserving certificateless provable data possession scheme for big data storage on cloud”, Applied Mathematics and Computation, vol. 314, pp. 31-43, 2017.

      W. Teng, G. Yang, Y. Xiang, T. Zhang, and D. Wang, “Attribute-based access control with constant-size ciphertext in cloud computing”, IEEE Transactions on Cloud Computing, 2015.




Article ID: 21640
DOI: 10.14419/ijet.v7i4.29.21640

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.