Multi-Top Keyword Search Over Outsourced Data Files

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2017 by IJCOT Journal
Volume - 8 Issue - 4
Year of Publication : 2018
AuthorsCherukuri Kiranmai, Dr. Gandi Satyanarayana

MLA

MLA Style: Cherukuri Kiranmai, Dr. Gandi Satyanarayana "Multi-Top Keyword Search Over Outsourced Data Files" International Journal of Engineering Trends and Technology 8.4 (2018): 9-12.

APA Style: Cherukuri Kiranmai, Dr. Gandi Satyanarayana (2018). Multi-Top Keyword Search Over Outsourced Data Files. International Journal of Engineering Trends and Technology, 8(4), 9-12.

Abstract

ced data files is still an interesting research issue because out sourced data over cloud can be encrypted for confidentiality .In this paper we are proposing an efficient top k retrieval from out sourced file through service oriented application by computing the file relevance score for input multi keywords and symmetric key encryption and every manipulation comes from the server end instead of client end every the ranking of the documents based on file relevance scores.

References

[1] ARMBRUST, M., AND ET AL. Above the clouds: A berkeley viewof cloud computing. Tech. Rep. UCB/EECS-2009-28, EECS Department,
[2] U.C. Berkeley, Feb 2009.
[3] M.Arrington, “Gmail disaster: Reports of mass email deletions,”http://www.techcrunch.com/2006/12/28/gmail-disasterreports-of-mass-email-deletions/,December 2006.
[4] Amazon.com, “Amazon s3 availability event: July 20, 2008,”http://status.aws.amazon.com/s3-20080720.html, 2008.
[5] RAWA News, “Massive information leak shakes Washington over Afghan war,”http://www.rawa.org/temp/runews/2010/08/20/massive-information-leak-shakeswashington-over-afghan-war.html, 2010
[6] AHN, “Romney hits Obama for security information leakage,”http://gantdaily.com/2012/07/25/romney-hits-obama-for-security-information-leakage/,2012
[7] Cloud Security Alliance, “Top threats to cloud computing,” http://www.cloudsecurity alliance.org, 2010.
[8] C.Leslie, “NSA has massive database of Americans’ phone calls,”http://usatoday30.usatoday.com/news/washington/2006-05-10/.
[9] R.Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption:improved definitions and efficient constructions,” in Proc. of ACM CCS, 2006.
[10] C.Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encryptedcloud data,” in Proc. of ICDCS, 2010.
[11] S.Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r: Top-k retrieval from aconfidential index,” in Proc. of EDBT, 2009.

Keywords
Over, proposing, encrypted, Cloud Computing, Data Files, Outsourced