3,495 research outputs found

    Semantic Search over Encrypted Data in Cloud Computing

    Get PDF
    Cloud storage becomes more and more popular in the recent trend since it provides various benefits over the traditional storage solutions. Along with many benefits provided by cloud storage, many security problems arise in cloud storage which prevents enterprises from migrate their data to cloud storage. These security problems induce the data owners to encrypt all their sensitive data such as social security number (SSN), credit card information, and personal tax information before they can be stored in cloud storage. The encryption approach may have strengthened the data security of cloud data, but it degrades the data efficiency because the encryption reduces the searchability of the data. Many schemes were proposed in recent researches which enable keyword search over encrypted data in cloud computing, and these schemes contain weaknesses which make them impractical when applying these schemes in real-life scenarios. In this project, we developed a system to support semantic search over encrypted data in cloud computing with three different schemes. The three schemes that we developed are “Synonym-Based Keyword Search (SBKS)”, “Wikipedia-Based Keyword Search (WBKS)”, and “Wikipedia-Based Synonym Keyword Search (WBSKS)”. Based on our experiment data, it demonstrated that the indexes created by our schemes are 95% smaller and reduced the average search time by 95% if compared to the schemes proposed previously. These improvements illustrated that our developed schemes are more practical than the former proposed schemes

    Secured Data Outsourcing in Cloud Computing

    Get PDF
    Cloud computing is a popular technology in the IT world. After internet, it is the biggest thing for IT world. Cloud computing uses the Internet for performing the task on the computer and it is the next- generation architecture of IT Industry. It is related to different technologies and the convergence of various technologies has emerged to be called as cloud computing. It places the application software and databases to the huge data centers, where the supervision of the data and services may not be fully trusted. This unique attribute poses many new security challenges which have not been well understood. In this paper, we develop system which allows customer to use cloud server with various profits and strong securities. So when customer stores his sensitive data on cloud server he should not worry about securities, we also protect customer’s account from malicious behaviors by verifying the result. This result verification mechanism is highly efficient for both cloud server and cloud customer. Covering security analysis and experiment results shows the immediate practicability of our mechanism design. DOI: 10.17762/ijritcc2321-8169.150314
    • …
    corecore