A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Chougule, Amit B.
- Maintaining Privacy for Multi-keyword Search on Encrypted Data:A Survey
Authors
Source
Networking and Communication Engineering, Vol 8, No 3 (2016), Pagination: 80-82Abstract
Cloud computing is rising as a promising pattern for information outsourcing and high-quality services. The data owners prefer to outsource their data to the cloud server in order to reduce data management cost and storage facility. Data encryption and compression is used to maintain the security and privacy of documents and also to reduce the cloud storage space. The encrypted documents are stored on cloud server. The similarity between the documents will be hiding in the process of encryption, which will lead to the search accuracy performance degradation. The amount of data stored on cloud server increases per day. It is challenging to design search technique on encrypted documents that can provide the reliable online information retrieval on large volume of encrypted data. We propose a cosine similarity clustering to support more search semantics and fast search within the large volume of data. The proposed cosine similarity approach clusters the documents based on their cosine similarity value. We also propose a method which can maintain and utilize the relationship between documents to increase the speed of search.
Keywords
Cloud Computing, Multi-Keyword Search, Cosine Similarity Clustering, Encrypted Data.- Proof of Data Integrity Using No-SQL Database in Cloud Storage:A Survey
Authors
1 Shivaji University, IN
2 Institute of Civil and Rural Engineering Polytechnic, Gargoti, IN
Source
Networking and Communication Engineering, Vol 8, No 2 (2016), Pagination: 47-49Abstract
Cloud computing shares a pool of the application software, databases, and hardware to the centralized large data centers. When multiple users use the cloud service, the management of the data at the server side is difficult, so cloud services may not be trusted. This paper introduces the problem of ensuring the integrity of data stored in cloud computing. To reduce the computational cost at user side during the integrity verification of their data, the many schemes introduce the notion of public verifiability. These schemes introduce one more network element which acts as an auditor on the behalf of the client. The auditor preprocesses client's data and uploads it to the storage server and later verifies the integrity of that data. However, the challenge is to find out this verifier is itself trustable or not. For this, we propose a new scheme where the storage server as well as auditor also is assumed to be untrusted. Furthermore, we strengthen the performance of data operation to process user’s time series data by replacing traditional data warehouse solution into emerging big data technologies such as No-Sql databases. We also maintain multiple replica of data file to increase availability and reduce the data loss.