A SECURED SEARCHING IN CLOUD DATA USING CRYPTOGRAPHIC TECHNIQUE
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 7
Abstract
Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. Trusted applications from untrusted components will be a major aspect of secure cloud computing. Today, many such applications require a proof of result correctness. It has been envisioned as the next generation architecture of IT Enterprise. As it becomes prevalent, more and more sensitive information are being centralized into the cloud. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to commercial public cloud for great flexibility and economic savings. But for protecting data privacy, which obsoletes traditional data utilization based on plaintext keyword search. Multistep processing is commonly used for nearest neighbor (NN) and similarity search in applications involving high dimensional data and/or costly distance computations. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. This paper explores various secured searching algorithms such as Advanced Encryption Standard (AES), Secured Socket Layer (SSL), and Knowledge nearest Neighbor (k-NN).
Authors and Affiliations
C. BAGYALAKSHMI , DR. R. MANICKA CHEZIAN
Web usage mining: Review on preprocessing of web log file
Web log data is one of the major source which contain all the information regarding the users visited links browsing pattern, time spent on a particular page. A web server log file contain information about user nam...
UNIDIRECTIONAL SEEDED SINGLE CRYSTAL GROWTH FROM SOLUTION OF SULPHAMIC ACID AND ITS CHARACTERIZATION
Unidirectional seeded single crystal growth by SR Method. The growth crystal has a cylindrical morphology with good optical quality by this method. The entire solute can be converted in crystal so that, 100 %...
Blind Image De-convolution In Surveillance Systems By Genetic Programming
surveillance systems has an important part as a Image acquisition and filtering, segmentation, object detection and tracking the object in that image. In blind image de-convolution .most of the methods requires tha...
Improving ontology and precision recall using ontology model, genetic, greedy algorithm semantic similarity calculation and ontology graph
The content is extracted by means of semantic relevancy. The semantic relevancies relate the content of videos based on a certain parameter. The parameter varies between system to system (implementation). The paramet...
Review and Study of Different Methods for Author Identification
As assessment of an individual has become an important aspect in the field of distance learning, it is difficult for these institutions to verify whether the individual participated is the person enrolled. Author i...