Cloud Computing: Ranked Keyword Search

Authors

  • Malik S M.Tech, Jind Institute of Engineering & Technology, KUK,Haryana (India)
  • Aggarwal S Assistant Professor, Jind Institute of Engineering & Technology, KUK,Haryana (India)

Keywords:

Search in cloud, secured search engines

Abstract

Cloud computing becomes more widely prevailed storage for outsourced data which may contain more sensitive information such as credit card numbers, passwords, e-mails, personal health records etc. As the data owners cannot risk their unencrypted outsourced data so as the cloud servers. The cloud server may fail to keep up the integrity of the cloud data due to hacking or entry of unauthorized entities. While searching the data in the cloud the attackers prefer the keyword which is not secured properly. The existing technique resolves the optimization complexities in ranked keyword search and its effective utilization of remotely stored encrypted cloud data. But it limits the further optimizations of the search results by preventing cloud server to interact with cloud users to maintain the integrity of actual owner’s keyword and the data associated with it. The aim is to define a framework which enhances the accuracy of the ranked keyword search by secured machine learning, which does not affect the data integrity. Introducing new and interactive access permissions allows only specific group of people to guide the search engine. This technique lists the exact or necessary search results for any encrypted keyword. Due to this learning the privacy of the keyword does not get to be violated because, the owner of the encrypted keyword has some lists of users to whom only the machine should learn for secured and improved search results.

References

Akassh A. Mishra, Chinmay Kamat (April 2011),”Migration of search engine process into the cloud”

Armbrust.M.Fox. A, Griffith. R, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, (Feb 2009) “Above the clouds: A berkeley view of cloud computing,” University of California, Berkeley.

Boneh .D. G. D. Crescenzo, R. Ostrovsky, and G. Persiano, (2004), “Public key encryption with keyword search,” in Proc. of EUROCRYP’04, volume 3027 of LNCS.

Y.-C. Chang and M. Mitzenmacher, (ACNS 2005), “Privacy preserving keyword searches on remote encrypted data”.

Chien Chin Chen and Meng Chang Chen, (SIGIR 2012) “TSCAN: A Content Anatomy Approach to Temporal Topic Summarization”.

Cong Wang, Ning Cao, Kui Ren, Wenjing Lou “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.

Song.D,Agner and Perrig. A, (IEEE 2000), “Practical techniques for searches on encrypted data,” in Proc. of IEEE Symposium on Security and Privacy’00.

Downloads

Published

2018-03-30

How to Cite

Malik, S., & Aggarwal, S. (2018). Cloud Computing: Ranked Keyword Search. Innovative Research Thoughts, 4(4), 84–87. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/801