Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 1
Page No. 32 - 37

Secure Ranked Keyword Search Algorithm for Encrypted Cloud Data using Double Indexing Technique

Authors : Payal V. Kale and Rashmi Welekar

References

Agrawal, R., J. Kiernan, R. Srikant and Y. Xu, 2004. Order preserving encryption for numeric data. Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, June 13-18, 2004, ACM, Paris, France, ISBN:1-58113-859-8, pp: 563-574.

Boldyreva, A., N. Chenette, Y. Lee and A. O'neill, 2009. Order-preserving symmetric encryption. Proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques Vol. 5479, April 26-30, 2009, Springer, Cologne, Germany, pp: 224-241.

Chang, Y.C. and M. Mitzenmacher, 2005. Privacy preserving keyword searches on remote encrypted data. Proceedings of the 3rd International Conference on Applied Cryptography and Network Security (ACNS’05) Vol. 5, June 7-10, 2005, Springer, New York, USA.,-pp: 442.

Ellaji, C.H. and R.D. Shobha, 2015. Security in multi keyword search over encrypted cloud data. Intl. J. Emerging Trends Eng. Res., 3: 113-116.

Gauch, S., J. Chaffee and A. Pretschner, 2003. Ontology-based personalized search and browsing. Web Intell. Agent Syst. Intl. J., 1: 219-234.
Direct Link  |  

Goh, E., 2003. Building secure indexes for searching efficiently on encrypted compressed data. http://eprint.iacr.org/2003/216/.

Liu, F., C. Yu and W. Meng, 2002. Personalized web search by mapping user queries to categories. Proceedings of the 11th International Conference on Information and Knowledge Management, November 4-9, 2002, ACM, McLean, Virginia, USA., ISBN:1-58113-492-4, pp: 558-565.

Ren, K., C. Wang and Q. Wang, 2012. Security challenges for the public cloud. IEEE Internet Comput., 16: 69-73.
CrossRef  |  Direct Link  |  

Speretta, M. and S. Gauch, 2005. Personalized search based on user search histories. Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, Sept. 19-22, IEEE Computer Society Washington, DC, USA., pp: 622-628.

Subashini, S. and V. Kavitha, 2011. A survey on security issues in service delivery models of cloud computing. J. Network Comput. Appl., 34: 1-11.
CrossRef  |  

Swetha, K. and R.M.R. Narasinga, 2016. Dynamic searchable encryption over distributed cloud storage. Assian J. Inf. Technol., 15: 4763-4769.

Wang, C., N. Cao, K. Ren and W. Lou, 2012. Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distib. Syst., 23: 1467-1479.
CrossRef  |  Direct Link  |  

Xiao, L. and I.L. Yen, 2012. Security analysis for order preserving encryption schemes. Proceedings of the 2012 46th Annual Conference on Information Sciences and Systems (CISS), March 21-23, 2012, IEEE, Princeton, New Jersey, USA., ISBN:978-1-4673-3139-5, pp: 1-6.

Xu, Y., K. Wang, B. Zhang and Z. Chen, 2007. Privacy-enhancing personalized web search. Proceedings of the 16th International Conference on World Wide Web, May 8-12, 2007, ACM, Banff, Alberta, Canada, ISBN:978-1-59593-654-7, pp: 591-600.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved