CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Design and Development of a Novel Algorithm for Search on Encrypted File

by R. Priya, T. Devi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 13
Year of Publication: 2013
Authors: R. Priya, T. Devi
10.5120/13586-1353

R. Priya, T. Devi . Design and Development of a Novel Algorithm for Search on Encrypted File. International Journal of Computer Applications. 78, 13 ( September 2013), 38-43. DOI=10.5120/13586-1353

@article{ 10.5120/13586-1353,
author = { R. Priya, T. Devi },
title = { Design and Development of a Novel Algorithm for Search on Encrypted File },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 13 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 38-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number13/13586-1353/ },
doi = { 10.5120/13586-1353 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:51:31.010472+05:30
%A R. Priya
%A T. Devi
%T Design and Development of a Novel Algorithm for Search on Encrypted File
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 13
%P 38-43
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Everyone has secrets and some have more than others. Each and every one wanted to have their data and information to be more secure and confidential. There are many ways to maintain the data and information to be safe. The main objective of this paper is to be maintained the file or data to be secure. So, proposed system has developed for searching keyword in encrypted format and search with encrypted file.

References
  1. Deborah Russell & G. T. Gangemi, Sr, "Computer Security Basics", 1st Edition July 1991, 0-937175-71-4, Order Number: 714, 464 pages
  2. Dorothy E. Denning and Peter J. Denning, "Data Security", Computer Science Department, Purdue University, West Lafayette, Indiana, 47907, Vol. 11, No. 3, September 1979
  3. Prof. Christof Paar, "applied cryptography and data security", version 2. 5 | January 2005
  4. Kristina Unnebrink And Ju Rgen Windeler, "Sensitivity Analysis by Worst and Best Case Assessment: Is it really sensitive?" Drug Information Journal, Vol. 33, Pp. 835–839, 1999
  5. http://docs. oracle. com/cd/B10501_01/server. 920/a96520/extract. htm
  6. John E. Hershey, Radha Krishna R. Yarlagadda, Lawrence H. Ozarow, "PUBLIC KEY CRYPTOGRAPHIC MECHANISM", General Electric Company, Appl. No. : 739,263, 1991
  7. Maryam Hourali and Gholam Ali Montazer, "An Intelligent Information Retrieval Approach Based on Two Degrees of Uncertainty Fuzzy Ontology", Volume 2011 (2011), Article ID 683976, 11 pages
  8. Y. -C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in Proc. of ACNS'05, 2005
  9. D. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. of IEEE Symposium on Security and Privacy, 2000
  10. Dawn Xiaodong Song David Wagner Adrian Perrig "Practical Techniques for Searches on Encrypted Data", University of California, Berkeley
  11. Whitepaper, "Advantages and disadvantages of EFS and effective recovery of encrypted data", Copyright (c) 2007 ElcomSoft Co. Ltd.
Index Terms

Computer Science
Information Sciences

Keywords

Data security File security System security and Encryption