Cryptography Based Dynamic Multi-Keyword Ranked Search Using ECC/B+TRE
International Journal of Security and Its Applications, 2015Today, Cloud computing is becoming a household technology. In cloud, a shared pool of computing resources can be accessed on demand through internet and web applications. Since outsourced data is in third party premises i.e. cloud, accountability of user data is paramount.
Prasanna B T, C B Akki
openaire +1 more source
Hierarchical Semantic Approximate Multi-keyword Ranked Search over Encrypted Data
2018With the rapid development of Cloud Computing, how to improve users search experience over encrypted data just like plaintext search has become a challenging task. In this paper, we propose a hierarchical semantic approximate multi-keyword ranked search (HSAMS) scheme over encrypted data. Performance analysis is demonstrated that our proposed scheme is
Chien-Ming Chen +5 more
openaire +1 more source
Verifiable attribute-based multi-keyword ranked search scheme in blockchain
The Computer JournalAbstract In recent years, cloud storage has gradually become a promising tool for providing data sharing and data storage services with privacy protection. However, to enable users to search over encrypted data and to enable data owners to perform fine-grained search authorization on their encrypted files is still a great challenge ...
Yang Chen +3 more
openaire +1 more source
Two-Step-Ranking Secure Multi-Keyword Search over Encrypted Cloud Data
2012 International Conference on Cloud and Service Computing, 2012To protect privacy of users, sensitive data need to be encrypted before outsourcing to cloud, which makes effective data retrieval a very tough task. In this paper, we proposed a novel order-preserving encryption(OPE) based ranked search scheme over encrypted cloud data, which uses the encrypted keyword frequency to rank the results and provide ...
Jun Xu +4 more
openaire +1 more source
Secure and Efficient Multi-keyword Ranked Search over Encrypted Cloud Data
Advanced Science and Technology Letters, 2014With the development of cloud computing, the sensitive information of outsourced data is at risk of unauthorized accesses. To protect data privacy, the sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless.
Xingming Sun +4 more
openaire +1 more source
An Improved Multi-Keyword Ranked Search over Encrypted Cloud Data
2017 4th International Conference on Information Science and Control Engineering (ICISCE), 2017Documents encrypted on the cloud servers can improve security, it also brings about a challenging question for secure query. We use the vector space model (VSM) to obtain the similarity of the documents. In this paper, we use a secure method to support multi-keyword parallel query, which the improved multi-tree [1] can storage the vector value and ...
openaire +1 more source
Semantic-aware multi-keyword ranked search scheme over encrypted cloud data
Journal of Network and Computer Applications, 2019Abstract Traditional searchable encryption schemes mostly adopt the TF-IDF (term frequency - inverse document frequency) model which ignores the semantic association between keywords and documents. It is a challenge to design an effective and secure semantic-aware search scheme.
Hua Dai +4 more
openaire +1 more source
Efficient privacy‐preserving scheme supporting disjunctive multi‐keyword search with ranking
Concurrency and Computation: Practice and Experience, 2019SummaryInformation storage and retrieval from the cloud is growing continuously unabated. The cost‐efficient solutions offered by the cloud providers to the end‐users have motivated them to outsource their confidential data to the cloud. Outsourcing confidential data leads to enhanced privacy risks due to disclosure of sensitive information to ...
Rohit Handa +2 more
openaire +1 more source
Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data
2014 International Conference on Computer and Communication Technology (ICCCT), 2014As the power of cloud computing became prevalent in the recent years, more and more sensitive information is being now shifted to the cloud. The cloud is a computing service that charges the user according to usage of the computing resources. This pay-as-you-use feature is the hallmark in cloud computing.
Neelam S. Khan +2 more
openaire +1 more source
A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data
2018Due to data privacy considerations, the data owners usually encrypt their documents before outsourcing to the cloud. The ability to search the encrypted documents is of great importance. Existing methods usually use the keywords to express users’ query intention, however it’s difficult for the users to construct a good query without the knowledge of ...
Xue Tian +4 more
openaire +1 more source

