Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:3 Issue:1 Year: 26 June,2014 Pages:375-379
A reasoning storage area program, consisting of a collection of storage area web servers, provides long-term storage area services over the Internet. Storing information in a third person's reasoning program causes serious concern over information comfort. General security schemes protect information comfort, but also limit the functionality of the storage area program because a few functions are reinforced over secured information. Constructing a protected storage area program that facilitates multiple functions is challenging when the storage area program is allocated and has no central authority. It suggests a threshold proxies re-encryption plan and combines it with a decentralized erasure code such that a protected allocated storage area program is formulated. The allocated storage area program not only facilitates protected and robust information storage area and recovery, but also lets a customer forward his information in the storage area web servers to another customer without accessing the information back. The main technical contribution is that the proxies re-encryption plan facilitates development functions over secured information as well as sending functions over secured and secured information. For the first time, formulate the comfort issue from the aspect of likeness importance and plan robustness. It notices that server-side position based on order-preserving security (OPE) inevitably leaks information comfort. To eliminate the leak, it suggests a two-round retrievable security (TRSE) plan that facilitates top-k multi-keyword recovery. In TRSE, it utilizes a vector area design and homomorphism security. The vector area design helps to provide sufficient search accuracy, and the homomorphism security enables users to involve in the position while the majority of computing work is done on the server part by functions only on cipher text.
Cloud, data privacy, ranking, similarity relevance, homomorphism encryption, vector space model
Cloud, data privacy, ranking, similarity relevance, homomorphism encryption, vector space model