retrieval of data using searchable symmetric encryption

B. SINDHUJA,A.SENTHIL KUMAR,M. SURESH

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:3         Issue:1         Year: 26 June,2014         Pages:375-379

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

A reasoning storage area program, consisting of a collection of storage area web servers, provides long-term storage area services over the Internet. Storing information in a third person's reasoning program causes serious concern over information comfort. General security schemes protect information comfort, but also limit the functionality of the storage area program because a few functions are reinforced over secured information. Constructing a protected storage area program that facilitates multiple functions is challenging when the storage area program is allocated and has no central authority. It suggests a threshold proxies re-encryption plan and combines it with a decentralized erasure code such that a protected allocated storage area program is formulated. The allocated storage area program not only facilitates protected and robust information storage area and recovery, but also lets a customer forward his information in the storage area web servers to another customer without accessing the information back. The main technical contribution is that the proxies re-encryption plan facilitates development functions over secured information as well as sending functions over secured and secured information. For the first time, formulate the comfort issue from the aspect of likeness importance and plan robustness. It notices that server-side position based on order-preserving security (OPE) inevitably leaks information comfort. To eliminate the leak, it suggests a two-round retrievable security (TRSE) plan that facilitates top-k multi-keyword recovery. In TRSE, it utilizes a vector area design and homomorphism security. The vector area design helps to provide sufficient search accuracy, and the homomorphism security enables users to involve in the position while the majority of computing work is done on the server part by functions only on cipher text.

Kewords

Cloud, data privacy, ranking, similarity relevance, homomorphism encryption, vector space model

Reference

Cloud, data privacy, ranking, similarity relevance, homomorphism encryption, vector space model