International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 4 | Year 2013 | Article Id. IJCTT-V4I4P113 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I4P113

Ranked Keyword Search in Cloud Computing


Ramya Majeti, Mahalakshmi Tejaswi Palvadi, P. Venkata Naresh, Dr. S. Satyanarayana

Citation :

Ramya Majeti, Mahalakshmi Tejaswi Palvadi, P. Venkata Naresh, Dr. S. Satyanarayana, "Ranked Keyword Search in Cloud Computing," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 4, pp. 508-510, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I4P113

Abstract

This document provides a way towards modularized and a light weight approach towards the search engine process using the merits of cloud computing. The cloud based search architecture enables customization of search process as per requirements of the stake holders. This new approach provides effective and personalized search models using cloud platform for low cost. It overcomes the pitfalls of traditional search engine optimization and hence has a tremendous scope for future development. Ranked keyword search is an active practice of optimizing a web site by improving internal and external aspects. This paper describes all areas of ranked keyword search-from discovery of terms and phrases that will generate traffic.

Keywords

Indexing, Ranking, Multi Cloud Interactions, Web Crawling, Search Query Optimization.

References

[1] M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings,” in SecureComm’10, Sept. 2010, pp. 89–106.
[2] H. L¨ohr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health cloud,” in Proceedings of the 1st ACM International Health Informatics Symposium, ser. IHI ’10, 2010, pp. 220–229.
[3] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword search over encrypted personal health records in cloud computing,” in ICDCS ’11, Jun. 2011.
[4] “The health insurance portability and accountability act.” [Online]. Available: http://www.cms.hhs.gov/HIPAAGenInfo/01 Overview.asp
[5] “Google, microsoft say hipaa stimulus rule doesn’t apply to them,” http://www.ihealthbeat.org/Articles/2009/4/8/.
[6] “At risk of exposure – in the push for electronic medical records, concern is growing about how well privacy can be safeguarded,” 2006. [Online]. Available: http://articles.latimes.com/2006/jun/26/health/he-privacy26
[7] K. D. Mandl, P. Szolovits, and I. S. Kohane, “Public standards and patients’ control: how to keep electronic medical records accessible but private,” BMJ, vol. 322, no. 7281, p. 283, Feb. 2001.
[8] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled encryption: ensuring privacy of electronic medical records,” in CCSW ’09, 2009, pp. 103–114.
[9] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE INFOCOM’10, 2010.
[10] C. Dong, G. Russello, and N. Dulay, “Shared and searchable encrypted data for untrusted servers,” in Journal of Computer Security, 2010.
[11] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in CCS ’06, 2006, pp. 89–98.
[12] M. Li, W. Lou, and K. Ren, “Data security and privacy in wireless body area networks,” IEEEWireless Communications Magazine, Feb. 2010.