ranked search
Recently Published Documents


TOTAL DOCUMENTS

134
(FIVE YEARS 47)

H-INDEX

12
(FIVE YEARS 4)

2021 ◽  
Vol 61 ◽  
pp. 102902
Author(s):  
Maryam Hozhabr ◽  
Parvaneh Asghari ◽  
Hamid Haj Seyyed Javadi
Keyword(s):  

Nowadays, information storing in third party storage is increased. Outsourcing the data to other storage device or servers which may questioned to the secure environment. However, sensitive data like medical information should need an privacy when it is stored in cloud storage. In this paper, a secure keyword search which provide the resultant data in a encrypted form where the end user can decrypt using the key given to them. It uses the Blowfish to encrypt the data and it also supports the data owner to delete or modify the content of their document. It also ensure accurate relevance score calculation between encrypted index and query vectors.


Author(s):  
M. Ambika ◽  
Mangayarkarasi N. ◽  
Raghuraman Gopalsamy ◽  
L. Sai Ramesh ◽  
Kamalanathan Selvakumar

Nowadays, information storing in third party storage is increased. Outsourcing the data to other storage device or servers which may questioned to the secure environment. However, sensitive data like medical information should need an privacy when it is stored in cloud storage. In this paper, a secure keyword search which provide the resultant data in a encrypted form where the end user can decrypt using the key given to them. It uses the Blowfish to encrypt the data and it also supports the data owner to delete or modify the content of their document. It also ensure accurate relevance score calculation between encrypted index and query vectors.


Author(s):  
Akash Tidke

In this paper we present a survey on keyword based searching algorithms. Various searching techniques are used for retrieving the encrypted data from cloud servers. This survey work involves a comparative study of these keyword based searching algorithms. It concludes that till now multi-keyword ranked search MRSE scheme is the best methodology for searching the encrypted data.


The recent trends suggest that there is an increase in the inclination towards storing data in the cloud due to explosive and massive growth of the volume of the data in the cloud computing environment. It helps them to reduce their computational and storage costs but also undeniably brought in concerns about security and privacy as the owners of the highly sensitive data lose control of it directly. The sensitive data could include electronic-based medical records, confidential fiscal documents, etc. An increased distrust about storage of files in a third-party service provider of cloud resources would contradict the very same reason for which cloud storage facilities were introduced. That’s because we cannot deny the fact that cloud based storage systems offer on- demand and ubiquitous access to flexible storage and computational resources. The keyword ranked search methodologies used in the existing systems mainly focus on enhancing and enriching the efficiency of searching the files and their respective functionalities but a lack of straight forward analysis of security and issues with providing access control have not been addressed. To address these disadvantages, in this paper, we propose an efficient Multi-Keyword Ranked Search scheme with Fine-grained access control (MRSF).MRSF is a methodology which can combine matching of coordinates technique with Term Frequency-Inverse Document Frequency (TF-IDF) to thereby achieve a highly precise retrieval of any cipher text of interest. It also improves the secure k-nearest neighbors (kNN) method. By utilizing an access strategy which is polynomial based, it can effectively refine the search privileges of the users’. Professional security analysis proves that MRSF is secure with respect to safeguarding the secrecy of outsourced data and the privacy of tokens and indices. Along with this enhanced methodology of ranked search scheme, a time limit based access control feature has also been proposed to ensure that the adaptive attackers are stalled from giving prolonged access to the data files. Session expiry will ensure security of data and that is to be achieved by providing a time window for the file retrieval. Extensive experiments also show that MRSF reaches higher search precision and many more functionalities when compared to the existing systems.


Author(s):  
Chien-Ming Chen ◽  
Zhuoyu Tie ◽  
Eric Ke Wang ◽  
Muhammad Khurram Khan ◽  
Sachin Kumar ◽  
...  
Keyword(s):  

Author(s):  
Chien-Ming Chen ◽  
Zhuoyu Tie ◽  
Eric Ke Wang ◽  
Kuo-Hui Yeh ◽  
Wensheng Gan ◽  
...  
Keyword(s):  

Author(s):  
Hua Dai ◽  
Maohu Yang ◽  
Geng Yang ◽  
Yang Xiang ◽  
Zheng Hu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document