A PROTECTED AND ACTIVE MULTI-KEYWORD EXPLORATION ARRANGEMENT CONCLUDED TRANSLATED MIST INFORMATION

Suneela Devi Bonigala, Sirajuddin Mohammad

Abstract


Many works were suggested in many types of threat to achieve various functionalities for search for example single keyword search, multi-keyword rated search, and so forth.  Of individual’s works, multi-keyword kinds of rated search is becoming more importance because of its realistic applicability.  We submit a great search method which draws on the tree above encrypted cloud information, and it also manages multi-keyword search furthermore to dynamic process on selection of documents.  For acquiring of high search effectiveness, we produce a tree-based index structure and propose an formula using the index tree. The forecasted plan is called to provide multi-keyword query furthermore to a particular result ranking, in addition dynamic update above document collections. Due to important structure of tree-based index, forecasted search system will effectively get sub-straight line search serious amounts of manage the operation of deletion furthermore to insertion of documents.


Keywords


Multi-Keyword Ranked Search; Tree-Based Index; Sub-Linear Search; Encrypted Cloud Data; Documents; Result Ranking;

References


D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on. IEEE, 2000, pp. 44– 55.

B. Wang, S. Yu, W. Lou, and Y. T. Hou, “Privacy-preserving multikeyword fuzzy search over encrypted data in the cloud,” in IEEE INFOCOM, 2014.

P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword search over encrypted data,” in Applied Cryptography and Network Security. Springer, 2004, pp. 31–45.

Y. H. Hwang and P. J. Lee, “Public key encryption with conjunctive keyword search and its extension to a multi-user system,” in Proceedings of the First international conference on Pairing-Based Cryptography. Springer-Verlag, 2007, pp. 2–22.

D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Advances in Cryptology- Eurocrypt 2004. Springer, 2004, pp. 506–522.

D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. Skeith III, “Public key encryption that allows pir queries,” in Advances in Cryptology-CRYPTO 2007. Springer, 2007, pp. 50–67.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.