keyword ranked metadata indexed object clawler in cloud servers

R Bakyalakshmi,R Rameh

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:2         Issue:1         Year: 08 February,2014         Pages:58-65

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Ranked search greatly enhances system usability by enabling search result relevance ranking instead of sending undifferentiated results, and further ensures the file retrieval accuracy. The statistical measure approach, i.e., relevance score, from information retrieval to build a secure searchable index, and develop a one-to-many order-preserving mapping technique to properly protect those sensitive score information. The resulting design is able to facilitate efficient server-side ranking without losing keyword privacy. Thorough analysis shows that our proposed solution enjoys “as strong-as-possible” security guarantee compared to previous searchable encryption schemes, while correctly realizing the goal of ranked keyword search. In this system provides B-Tree conceptual data storage associated with easy indexing and fastest searching option on the dynamic ranked data. Extensive experimental results demonstrate the efficiency of the proposed solution.

Kewords

Cloud data privacy ranking similarity relevance homomorphic encryption vectorspace model

Reference

[1] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,” Proc. IEEE 30th Int’l Conf. Distributed Computing Systems (ICDCS ’10), 2010. [2] P. Mell and T. Grance, “Draft Nist Working Definition of Cloud Computing,” http://csrc.nist.gov/groups/SNS/cloudcomputing/ index.html, Jan. 2010. 12 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. X, XXX 2012 [3] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” Technical Report UCB-EECS-2009-28, Univ. of California, Berkeley, Feb. 2009. [4] Cloud Security Alliance “Security Guidance for Critical Areas of Focus in Cloud Computing,” http://www.cloudsecurityalliance. org, 2009.