Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient and Secure Multi Keyword Search in Encrypted Cloud Data with Ranking

As cloud computing become more flexible & effective in terms of economy, data owners are motivated to outsource their complex data systems from local sites to commercial public cloud. But for security of data, sensitive data has to be encrypted before outsourcing, which overcomes method of traditional data utilization based on plaintext keyword search. Considering the large number of data users...

متن کامل

Secure and Dynamic Multi-keyword Ranked Search Scheme and Fuzzy Search over Encrypted Cloud Data

With the increased rate of growth and adaptation of cloud computing, daily, more and more sensitive information is being centralized onto the cloud. For the protection of valuable proprietary information, the data must be encrypted before outsourcing. There is no tolerance for typos and format inconsistencies which are normal user behavior. This makes effective data storage and utilization a ve...

متن کامل

Secure Keyword Based Search in Cloud Computing: A Review

An effective search that give the better suggestion to the user so that the user can get better choices for the services is also a challenge for cloud computing. Several methods have been given to solve the problem of effective and secure ranked keyword search of cloud data. Ranked search greatly enhances system usability by returning the matching files in a ranked order regarding to certain re...

متن کامل

Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup

Searchable encryption allows one to store encrypted documents on a remote honest-butcurious server, and query that data at the server itself without requiring the documents to be decrypted prior to searching. This not only protects the data from the prying eyes of the server, but can also reduce the communication overhead between the server and the user and local processing at the latter. Previ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in Electrical and Computer Engineering

سال: 2016

ISSN: 1582-7445,1844-7600

DOI: 10.4316/aece.2016.02002