Open Access Open Access  Restricted Access Subscription or Fee Access

A Secure- Search- Scheme over encrypted data By Attaining a close grained query result verification techniques

P. Nikshiptha, M. Ranadheer, J. Tejaswi, N. Sindhuja, N. Premalatha, P. Pradeep Kumar

Abstract


Cloud computing is the on-demanding delivery of resources that are retrieved from the internet through Web-based tools and applications. Cloud computing is advantageous to the whole world but at the same time facing the problem of security. Encrypting the data in the cloud is not the solution as it is not meeting up the requirements of user. A secure search technique was developed over encrypted cloud data which allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy – preserving manner, but practically encounters a problem of incorrectness in the dishonest cloud environment by omitting some qualified results and communications overhead. The advantage of this scheme is its loose coupling to concrete secure search techniques and can be easily emerged into secure query scheme. In this paper we develop a verification object for encrypted cloud data and also a signature technique with extremely small storage cost.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.