International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 3 | Year 2013 | Article Id. IJCTT-V4I3P109 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I3P109

Data Storage in Cloud Environment Enhance Privacy


Treesa Maria Vincent, J.Sakunthala

Citation :

Treesa Maria Vincent, J.Sakunthala, "Data Storage in Cloud Environment Enhance Privacy," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 3, pp. 241-246, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I3P109

Abstract

Cloud data have to be encrypted to protect data privacy, before outsourced to the commercial public cloud. The encryption process makes effective data utilization service a very challenging task. Traditional searchable encryption techniques allow users to securely search over encrypted data through keywords. They support only Boolean search and are not yet sufficient to meet the effective data utilization need that is inherently demanded by large number of users and huge amount of data files in cloud. The system facilitates server side ranking without keyword privacy. Search result authentication is provided in the system. The similarity analysis scheme is used to identify the query results under the cloud data storage.

Keywords

Encryption, Searchable encryption technique, Boolean search, Server side ranking, Search result authentication, Similarity analysis scheme.

References

[1] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure Ranked Keyword Search over Encrypted Cloud Data,” Proc. IEEE 30th Int’l Conf. Distributed Computing Systems (ICDCS ’10), 2010. 
[2] P. Mell and T. Grance, “Draft Nist Working Definition of Cloud Computing,” http://csrc.nist.gov/groups/SNS/cloudcomputing/ index.html, Jan. 2010.
[3] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” Technical Report UCB-EECS-2009-28, Univ. of California, Berkeley, Feb. 2009.  of
[4] Cloud Security Alliance “Security Guidance for Critical Areas Focus in Cloud Computing,” http://www.cloudsecurityalliance.org, 2009.
[5] Z. Slocum, “Your Google Docs: Soon in Search Results?” http://news.cnet.com/8301-17939_109-10357137-2.html, 2009.
[6] B. Krebs, “Payment Processor Breach May Be Largest Ever,” http://voices.washingtonpost.com/securityfix/2009/01/paymen t_processor_breach_may_b.html, Jan. 2009.
[7] A. Boldyreva, N. Chenette, Y. Lee, and A. O’Neill, “Order-Preserving Symmetric Encryption,” Proc. Int’l Conf. Advances in Cryptology, 2009.
[8] S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r: Top-k Retrieval from a Confidential Index,” Proc. Int’l Conf. Extending Database Technology: Advances in Database Technology (EDBT ’09), 2009.
[9] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy Keyword Search over Encrypted Data in Cloud Computing,” Proc. IEEE Infocom ’10, 2010.
[10] N. Cao, C. Wang, K. Ren, and W. Lou, “PrivacyPreserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” Proc.  IEEE Infocom ’11, 2011.
[11] C. Wang, K. Ren, S. Yu, K. Mahendra, and R. Urs, “Achieving Usable and Privacy-Assured Similarity Search over Outsourced Cloud Data,” Proc. IEEE INFOCOM, 2012. 
[12] Cong Wang, Ning Cao, Kui Ren and Wenjing Lou, “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data” IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 8, August 2012.