A SECURED SEARCHING IN CLOUD DATA USING CRYPTOGRAPHIC TECHNIQUE
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 7
Abstract
Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. Trusted applications from untrusted components will be a major aspect of secure cloud computing. Today, many such applications require a proof of result correctness. It has been envisioned as the next generation architecture of IT Enterprise. As it becomes prevalent, more and more sensitive information are being centralized into the cloud. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to commercial public cloud for great flexibility and economic savings. But for protecting data privacy, which obsoletes traditional data utilization based on plaintext keyword search. Multistep processing is commonly used for nearest neighbor (NN) and similarity search in applications involving high dimensional data and/or costly distance computations. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. This paper explores various secured searching algorithms such as Advanced Encryption Standard (AES), Secured Socket Layer (SSL), and Knowledge nearest Neighbor (k-NN).
Authors and Affiliations
C. BAGYALAKSHMI , DR. R. MANICKA CHEZIAN
A New Multiplier - Accumulator Architecture based on High Accuracy Modified Booth Algorithm
In this paper, a new MAC architecture is developed for high speed performance. The performance can be improved by developing a new carry save adder which is designed by combining multiplication with accumulation. The ove...
IDENTIFICATION OF HUMAN THROUGH PALMPRINT: A REVIEW
Palm Print is one of the relatively new physiological biometrics, attracted the researchers due to its stable and unique characteristics. The rich feature information of palm print offers one of the powerful means...
Inventory Management System Software for Public Universities in Ghana (IMSSPUG)
Managing inventories at Public Universities is one of the major challenges for higher educational institutions in Ghana. This is especially true for large, diverse and research-oriented institutions like the University f...
Application Development Using WPF
The paper focuses on the application development using WPF. It covers the overall architecture of WPF. The programming models of the WPF shows how code and XAML is separated and how XAML objects can be accessed. We a...
Improved Focused Crawler Using Inverted WAH Bitmap Index
Focused Crawlers are software which can traverse the internet and retrieve web pages by hyperlinks according to specific topic. The traditional web crawlers cannot function well to retrieve the relevant pages effec...