CFP last date
20 May 2024
Reseach Article

Improving the Efficiency of Data Retrieval in Secure Cloud by Introducing Conjunction of Keywords

Published on February 2012 by Nisha T.M, Lijo V.P
International Conference on Advances in Computational Techniques
Foundation of Computer Science USA
ICACT2011 - Number 1
February 2012
Authors: Nisha T.M, Lijo V.P
fb8f8567-ff6b-4d99-b523-8293c39ff74a

Nisha T.M, Lijo V.P . Improving the Efficiency of Data Retrieval in Secure Cloud by Introducing Conjunction of Keywords. International Conference on Advances in Computational Techniques. ICACT2011, 1 (February 2012), 25-28.

@article{
author = { Nisha T.M, Lijo V.P },
title = { Improving the Efficiency of Data Retrieval in Secure Cloud by Introducing Conjunction of Keywords },
journal = { International Conference on Advances in Computational Techniques },
issue_date = { February 2012 },
volume = { ICACT2011 },
number = { 1 },
month = { February },
year = { 2012 },
issn = 0975-8887,
pages = { 25-28 },
numpages = 4,
url = { /proceedings/icact2011/number1/4773-1106/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Computational Techniques
%A Nisha T.M
%A Lijo V.P
%T Improving the Efficiency of Data Retrieval in Secure Cloud by Introducing Conjunction of Keywords
%J International Conference on Advances in Computational Techniques
%@ 0975-8887
%V ICACT2011
%N 1
%P 25-28
%D 2012
%I International Journal of Computer Applications
Abstract

Cloud computing uses internet and central remote servers to maintain data and applications. This allows much more efficient computing by centralizing storage, memory, procession and bandwidth. The data is stored in off-premises and accessing this data through keyword search. Traditional keyword search was based on plaintext keyword search. But for protecting data privacy the sensitive data should be encrypted before outsourcing. So there comes the importance of encrypted cloud data search. One of the most popular ways is selectively retrieve files through keyword-based search instead of retrieving all the encrypted files back. The data encryption also demands the preservation of keyword privacy since keywords usually contain important information related to the data files. So in order to improve adaptation of cloud computing, first ensure its security. Present methods are focusing on the fuzzy keyword search and which efficiently search and retrieve the data in most secure and privacy preserved manner. The existing system uses single fuzzy keyword searching mechanism. A conjunctive/sequence of keyword search mechanism will retrieve most efficient and relevant data files. The conjunctive/sequence of keyword search automatically generates ranked results so that the searching flexibility and efficiency will be improved.

References
  1. Philippe Golle, Jessica Staddon, Brent Waters. 2004. Secure Conjunctive Keyword Search Over Encrypted Data. Applied Cryptography and Network, Springer.
  2. Xin Zhou, Yunlong Xu, Gongming Chen, Zhigeng Pan. 2006. A New Wild- card Search Method for Digital Dictionary Based on Mobile Platform. Proceedings of the 16th International Conference on Artificial Reality and Telexistence Workshops (ICAT'06), IEEE.
  3. S. Ji, G. Li, C. Li, and J. Feng. 2009. Efficient interactive fuzzy keyword Search, in Proc. of WWW09.
  4. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, March 2009. Enabling Efficient Fuzzy keyword search over encrypted data in cloud computing, in Proc. of IEEE INFOCOM10 Mini-conference, San Diego, CA, USA.
  5. Lori M. Kaufman. July/Aug.2009, Data Security in the World of Cloud Computing, IEEE Security and Privacy, vol. 7, no. 4, pp. 61-64.
  6. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou. March 2010. Fuzzy keyword search over encrypted data in cloud computing, in Proc. of IEEE INFOCOM10 Mini-Conference, San Diego, CA, USA.
  7. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou2010. Secure ranked key word search over encrypted cloud data,” in Proc. of ICDCS10.
  8. Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou. April 2011. Privacy Preserving Multi-keyword Ranked Search over Encrypted Cloud Data, in Proc. of IEEE INFOCOM11.
  9. D. Boneh and B. Waters. 2007. Conjunctive, subset, and range queries on encrypted data, in Proc. of TCC, pp. 535554.
  10. Sameer Rajan , Apurva Jairath.Cloud Computing. 2011. The Fifth generation of Computing, International Conference on Communication Systems and Network Technologies.
Index Terms

Computer Science
Information Sciences

Keywords

Fuzzy keyword conjunction keyword sequence keyword edit distance wildcard method