A Secure Privacy Preserving Information Retrieval Model in Cloud Computing

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2019 by IJCOT Journal
Volume - 9 Issue - 1
Year of Publication : 2019
Authors :  Saripalli Vinod Manikanta, Kondapalli Varaprasad

Citation

MLA Style:Saripalli Vinod Manikanta, Kondapalli Varaprasad "A Secure Privacy Preserving Information Retrieval Model in Cloud Computing" International Journal of Computer and Organization Trends 9.1 (2019): 16-19.

APA Style:Saripalli Vinod Manikanta, Kondapalli Varaprasad (2019). A Secure Privacy Preserving Information Retrieval Model in Cloud Computing. International Journal of Computer and Organization Trends, 9(1), 16-19.

Abstract

Information retrieval over cloud resources or data storage is an interesting research issue with multiple data owners. Privacy preserving data is major concern while transmission data from the clients and data sources. Tree based security models are complex to implement and takes more navigation time when data is huge. We propose a novel privacy-preserving model of base table generation to improve the search implementation and user search performance or response time. Cloud based cache implementation improves the performance without accessing the data from data sources when it is available at midlevel .Our proposed model gives more efficient results than traditional models.

References

[1] (May 24, 2017). 2016 Monitoring Report on the Data of China`s E-Commerce Market [EB/OL]. [Online]. Available: http://www.100ec.cn/zt/16jcbg/
[2] Amazon. Amazon S3. Accessed: Sep. 5, 2017. [Online]. Available:http://aws.amazon.com/s3/
[3] Windows Azure. Accessed: Sep. 5, 2017. [Online]. Available: http://www.microsoft.com/windowsazure/
[4] Apple iCloud. Accessed: Sep. 5, 2017. [Online]. Available: http://www.icloud.com/
[5] Google App Engine. Accessed: Sep. 5, 2017. [Online]. Available:http://appengine.google.com/VOLUME 6, 2018 14753
[6] Y.-S. Zhao, Q.-A. Zeng: Secure and Efficient Product Information Retrieval in Cloud Computing
[7] P.Golle, J. Staddon, and B. Waters, ``Secure conjunctive keyword search over encrypted data,`` in Proc. Int. Conf. Appl. Cryptogr. Netw. Secur., 2004, pp. 31_45.
[8] D.X.Song and D. A. Wanger Perrig, ``Practical techniques for searches on encrypted data,`` in Proc. IEEE Symp. Security Privacy, May 2000, pp. 44_55.
[9] D.Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, ``Public key encryption with keyword search,`` in Proc. Int. Conf. Theory Appl.Cryptogr. Techn., 2004, pp. 506_522.
[10] H.S.Rhee, J. H. Park, W. Susilo, and D. H. Lee, ``Trapdoor security in a searchable public-key encryption scheme with a designated tester,`` J. Syst.Softw., vol. 83, no. 5, pp. 763_771, 2010.
[11] K.Ren, C.Wang, and Q.Wang, ``Security challenges for the public cloud,`` IEEE Internet Comput., vol. 16, no. 1, pp. 69_73, Jan./Feb. 2012.
[12] E.-J. Goh, ``Secure indexes,`` IACR Cryptol. ePrint Arch., Newark, NJ, USA, Tech. Rep. 1, 2003, p. 216.

Keywords
Saripalli Vinod Manikanta, Kondapalli Varaprasad