International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 132

Survey Paper | Information Technology | India | Volume 6 Issue 1, January 2017


Verification of Ranked Keyword Search in Cloud Computing

Monika Patil, S. V. Bodake


Abstract: In the recent era of cloud computing, Many people move towards the outsource their information to the cloud. As a fundamental data use, secure search over encrypted cloud data has attracted the interest of many researchers recently. This is the reason researchers assume that the cloud server is curious and honest, where the search results are not confirmed. In this paper we describe that if cloud server misbehave and working dishonestly then catch them. Base on this model, we investigate the issue of result verification for the secure ranked search. Not the same as past information verification schemes, we propose a novel obstacle based scheme. With our carefully devised verification data, the cloud server can't know which data owner, or what number of data owner exchange anchor data which will be utilized for verifying the cloud server's misbehavior. With our methodically designed verification construction, the cloud server can't know which Data Owner data are embedded in the verification data buffer, or what no of Data Owner's verification data are really utilized for verification. All cloud server knows that, if he acts dishonestly at number of times then he must be punished. we propose to optimize the estimation of parameters utilized as a part of the development of the secret verification data buffer At last, with careful investigation and extensive experiments, we confirm the accuracy and efficiency of our proposed schemes.


Keywords: Cloud computing, dishonest cloud server, data verification, deterrent


Edition: Volume 6 Issue 1, January 2017,


Pages: 177 - 179


How to Cite this Article?

Monika Patil, S. V. Bodake, "Verification of Ranked Keyword Search in Cloud Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20164006, Volume 6 Issue 1, January 2017, 177 - 179

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Cloud computing'

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Downloads: 101

Research Paper, Information Technology, India, Volume 5 Issue 9, September 2016

Pages: 1751 - 1754

Re-encryption based Attribute Revocation in Data Access Control for Multiauthority Cloud Storage

Kalyani G. Ktangale, Milind Penurkar

Share this Article

Similar Articles with Keyword 'Cloud'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Similar Articles with Keyword 'computing'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Similar Articles with Keyword 'cloud'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 83

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1598 - 1602

An Approach to Storage of Data on Cloud Computing and Challenges Involved

Pranshu Prenam, Rahul Chawda

Share this Article

Similar Articles with Keyword 'server'

Downloads: 97

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2568 - 2570

Survey on NMS Supporting Network Elements implementing Heterogeneous Protocols

Sheik Nousheen Taj, Dr. Sagar B M

Share this Article

Downloads: 99

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1635 - 1639

Developing Firefox add-on for DOM vulnerability Assessment

Saranraj Ilangovan, Geogen George

Share this Article

Similar Articles with Keyword 'data'

Downloads: 322 | Weekly Hits: ⮙1 | Monthly Hits: ⮙6

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Similar Articles with Keyword 'verification'

Downloads: 112

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this Article

Downloads: 112

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2430 - 2432

Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform

Rishi Kumar Gupta, G. Sujatha

Share this Article
Top