Survey on Privacy Preservation for Multi-Keyword Search on Data Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 126

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016

Survey on Privacy Preservation for Multi-Keyword Search on Data Network

Nilima S. Kasar, Vitthal S. Phad

In recent years, growth of private and semi-private information has grown rapidly on information network so, mechanisms to search such information have failed in privacy preservation. In todays emerging information networks, it is essential to find a solution for accessing the data from large number of providers while maintaining a privacy. So, there is a strong need to develop a technique which provides user required information in ranked order while preserving the users privacy. This paper analyzes different methods concerning about privacy of data in the public and private networks and also, analyzes a system based on public cloud platform where data sharing is takes place between public and private systems on a network through authentication and encryption. This system works on local private server which controls multiple systems. This paper is motivated by the lack of tools for an access controlled multi- search of data on the public and private network.

Keywords: Encryption, Decryption, Ranking algorithm

Edition: Volume 5 Issue 1, January 2016

Pages: 457 - 460

Share this Article

How to Cite this Article?

Nilima S. Kasar, Vitthal S. Phad, "Survey on Privacy Preservation for Multi-Keyword Search on Data Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152679, Volume 5 Issue 1, January 2016, 457 - 460

Enter Your Email Address




Similar Articles with Keyword 'Encryption'

Downloads: 1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 9 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 94

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1709 - 1712

A Business Framework for Securing Data Storage over Cloud Environment using ECC Crypto System

Nara Venkata Surendra Reddy, DLS Reddy

Share this Article

Similar Articles with Keyword 'Decryption'

Downloads: 1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 9 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Similar Articles with Keyword 'Ranking algorithm'

Downloads: 63

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1615 - 1620

Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm

Premsai Cheedella

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1580 - 1582

Personalized Web Search using Ontology and Page Ranking

A. N. R. Latha Kumari

Share this Article

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 969 - 973

Improved Indexing and Advanced Relevance Ranking Score for Multi-Keyword Search over Encrypted Cloud Data

Amol D. Sawant, M. D. Ingle

Share this Article

Downloads: 110

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2048 - 2051

An Efficient Product Aspect Ranking and its Application: A Review

Shahuraj Patil, Jyoti Raghatwan

Share this Article

Downloads: 110

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 1740 - 1742

Efficient Hybrid Usage-Based Ranking Model

Kanchanmala D. Talekar, Prof. Mayank Bhatt

Share this Article



Top