Research Article | Open Access | Download PDF
Volume 8 | Issue 4 | Year 2018 | Article Id. IJCOT-V8I4P302 | DOI : https://doi.org/10.14445/22492593/IJCOT-V8I4P302
Multi-Top Keyword Search Over Outsourced Data Files
Cherukuri Kiranmai, Dr. Gandi Satyanarayana
Citation :
Cherukuri Kiranmai, Dr. Gandi Satyanarayana, "Multi-Top Keyword Search Over Outsourced Data Files," International Journal of Computer & Organization Trends (IJCOT), vol. 8, no. 4, pp. 9-12, 2018. Crossref, https://doi.org/10.14445/22492593/IJCOT-V8I4P302
Abstract
ced data files is still an interesting research issue because out sourced data over cloud can be encrypted for confidentiality .In this paper we are proposing an efficient top k retrieval from out sourced file through service oriented application by computing the file relevance score for input multi keywords and symmetric key encryption and every manipulation comes from the server end instead of client end every the ranking of the documents based on file relevance scores.
Keywords
Over, proposing, encrypted, Cloud Computing, Data Files, OutsourcedReferences
[1] ARMBRUST, M., AND ET AL. Above the clouds: A berkeley viewof cloud computing. Tech. Rep. UCB/EECS-2009-28, EECS Department,
[2] U.C. Berkeley, Feb 2009.
[3] M.Arrington, “Gmail disaster: Reports of mass email deletions,”http://www.techcrunch.com/2006/12/28/gmail-disasterreports-of-mass-email-deletions/,December 2006.
[4] Amazon.com, “Amazon s3 availability event: July 20, 2008,”http://status.aws.amazon.com/s3-20080720.html, 2008.
[5] RAWA News, “Massive information leak shakes Washington over Afghan war,”http://www.rawa.org/temp/runews/2010/08/20/massive-information-leak-shakeswashington-over-afghan-war.html, 2010
[6] AHN, “Romney hits Obama for security information leakage,”http://gantdaily.com/2012/07/25/romney-hits-obama-for-security-information-leakage/,2012
[7] Cloud Security Alliance, “Top threats to cloud computing,” http://www.cloudsecurity alliance.org, 2010.
[8] C.Leslie, “NSA has massive database of Americans’ phone calls,”http://usatoday30.usatoday.com/news/washington/2006-05-10/.
[9] R.Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption:improved definitions and efficient constructions,” in Proc. of ACM CCS, 2006.
[10] C.Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encryptedcloud data,” in Proc. of ICDCS, 2010.
[11] S.Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r: Top-k retrieval from aconfidential index,” in Proc. of EDBT, 2009.