Secure Full-Text Retrieval on Cloud

  • Authors

    • B. Deepthi
    • Rakesh .
    2018-11-26
    https://doi.org/10.14419/ijet.v7i4.29.21640
  • .
  • Cloud Computing is a present day technology that effectively support the client oriented services. These days we are mostly using applications that consumes the cloud storage for storing and retrieving information. In such case that data management and privacy preservation cryptographic technique the data is converted to unreadable format. Due to this full text retrieval on encrypted data on cloud of required information becomes complex. Therefore in this paper we proposed bit slice indexing method on Elliptic-Curve-Diffie-Hellman for providing some security to cloud.

  • References

    1. [1] W. Zheng, Y. Qin, B. Emmanuel, D. Zhang, and J. Chen, “Cost optimization for deadline-aware scheduling of big-data processing jobs on cloudsâ€, Future Generation Computer Systems, 2017.

      [2] N. Sachdeva, O. Singh, P. K. Kapur, and D.Galar, “Multi-criteria intuitionistic fuzzy group decision analysis with TOPSIS method for selecting appropriate cloud solution to manage big data projectsâ€, International Journal of System Assurance Engineering and Management, vol. 7, no. 3, pp. 316-324, 2016.

      [3] J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, “A secure cloud computing based framework for big data information management of smart gridâ€, IEEE transactions on cloud computing, vol. 3, no. 2, pp. 233-244, 2015.

      [4] Indu, PM Rubesh Anand, and Vidhyacharan Bhaskar. "Encrypted Token based Authentication with Adapted Security Assertions Mark-up Language Technology for Cloud Web Services." Journal of Network and Computer Applications, 2017.

      [5] Lu. Zhou,Youwen Zhu, and Aniello Castiglione. "Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner." Computers & Security, 2016.

      [6] H. Yin, Z. Qin, L. Ou, and K. Li, “A query privacy-enhanced and secure search scheme over encrypted data in cloud computingâ€, Journal of Computer and System Sciences, 2017.

      [7] X. Jiang, J. Yu, J. Yan, and R. Hao, “Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud dataâ€, Information Sciences, vol. 403, pp. 22-41, 2017.

      [8] W. Song, B. Wang, Q. Wang, Z. Peng, W. Lou, and Y. Cui, “A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applicationsâ€, Journal of Parallel and Distributed Computing, vol. 99, pp. 14-27, 2017.

      [9] R. Pitchai, S. Jayashri, and J. Raja. "Searchable Encrypted Data File Sharing Method Using Public Cloud Service for Secure Storage in Cloud Computing." Wireless Personal Communications, vol. 90, no. 2, pp. 947-960, 2016.

      [10] Wang, Haijiang, Xiaolei Dong, and Zhenfu Cao. "Secure and efficient encrypted keyword search for multi-user setting in cloud computing." Peer-to-Peer Networking and Applications, pp. 1-11, 2017.

      [11] C. Y. Yang, C. T. Huang, Y. P. Wang, Y. W. Chen, and S. J. Wang, “File changes with security proof stored in cloud service systemsâ€, Personal and Ubiquitous Computing, pp. 1-9, 2017.

      [12] H. Cui, Robert H. Deng, and Yingjiu Li. "Attribute-based cloud storage with secure provenance over encrypted data." Future Generation Computer Systems, vol. 79, pp. 461-472, 2018.

      [13] Mehmet SabırKiraz, "A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing", Journal of Ambient Intelligence and Humanized Computing, vol. 7, no. 5, pp. 731-760, 2016.

      [14] D. He, N. Kumar, H. Wang, L. Wang, and K. K. R. Choo, “Privacy-preserving certificateless provable data possession scheme for big data storage on cloudâ€, Applied Mathematics and Computation, vol. 314, pp. 31-43, 2017.

      W. Teng, G. Yang, Y. Xiang, T. Zhang, and D. Wang, “Attribute-based access control with constant-size ciphertext in cloud computingâ€, IEEE Transactions on Cloud Computing, 2015.
  • Downloads

  • How to Cite

    Deepthi, B., & ., R. (2018). Secure Full-Text Retrieval on Cloud. International Journal of Engineering & Technology, 7(3.29), 694-696. https://doi.org/10.14419/ijet.v7i4.29.21640