418 research outputs found

    Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data

    Get PDF
    With the advancement of Cloud computing, people now store their data on remote Cloud servers for larger computation and storage resources. However, users’ data may contain sensitive information of users and should not be disclosed to the Cloud servers. If users encrypt their data and store the encrypted data in the servers, the search capability supported by the servers will be significantly reduced because the server has no access to the data content. In this paper, we propose a Fine-grained Multi-keyword Ranked Search (FMRS) scheme over encrypted Cloud data. Specifically, we leverage novel techniques to realize multikeyword ranked search, which supports both mixed “AND”, “OR” and “NO” operations of keywords and ranking according to the preference factor and relevance score. Through security analysis, we can prove that the data confidentiality, privacy protection of index and trapdoor, and the unlinkability of trapdoor can be achieved in our FMRS. Besides, Extensive experiments show that the FMRS possesses better performance than existing schemes in terms of functionality and efficiency

    Efficient Multi - Keyword Ranked Search over Encrypted Cloud Computing

    Get PDF
    Cloud computing allow customer to store their data on remote site so it reduce burden on local complex data storing. But before storing sensitive data it can encrypted and this can overcome plaintext keyword search.AS large number of user and data on cloud and for search on that data allow multi keyword search also provide result similarity ranking for effective retrieval of data. From number of multi-keyword semantics to identify similarity between search query and data highly efficient rule of coordinate matching, i.e., as many matches as possible, and then use inner data similarity for quantitatively similarity measure. In this system, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE),and establish a set of strict privacy requirements for such a secure cloud data utilization system to be implemented in real. We first propose basic idea of different privacy preserving multi-keyword search technique along with search on data that store on cloud in encrypted form and maintaining the integrity of rank order in search result and the cloud server is untrusted. .By hiding the user’s identity, the confidentiality of user’s data is maintaine

    Privacy-preserving targeted advertising scheme for IPTV using the cloud

    Get PDF
    In this paper, we present a privacy-preserving scheme for targeted advertising via the Internet Protocol TV (IPTV). The scheme uses a communication model involving a collection of viewers/subscribers, a content provider (IPTV), an advertiser, and a cloud server. To provide high quality directed advertising service, the advertiser can utilize not only demographic information of subscribers, but also their watching habits. The latter includes watching history, preferences for IPTV content and watching rate, which are published on the cloud server periodically (e.g. weekly) along with anonymized demographics. Since the published data may leak sensitive information about subscribers, it is safeguarded using cryptographic techniques in addition to the anonymization of demographics. The techniques used by the advertiser, which can be manifested in its queries to the cloud, are considered (trade) secrets and therefore are protected as well. The cloud is oblivious to the published data, the queries of the advertiser as well as its own responses to these queries. Only a legitimate advertiser, endorsed with a so-called {\em trapdoor} by the IPTV, can query the cloud and utilize the query results. The performance of the proposed scheme is evaluated with experiments, which show that the scheme is suitable for practical usage

    Review on Different Searchable Encryption Schemes for Cloud Computing

    Get PDF
    Heavily available online data and its day to day expansion is need to be focus to store and retrieve it properly. This enforces the data owners tend to store their data into the cloud. This also suggest to handle the data properly and so release the burden of data storage and maintenance. But as the data owner and user, cloud server are not belong to same trusted domain, this may cause the outsourced to the risk. This enforce us to set the policy to avoid such risk factor. This gives us study scope to fine the different techniques to overcome such issue observed by different author. In this paper we try to underline the different solution, its limitation and results they achieved for retrieval of data securely and within less time. Definitely from this we will be able to propose our own solution
    corecore