Survey on Keyword Search in Encrypted Data With Privacy Preservation
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙17

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016

Survey on Keyword Search in Encrypted Data With Privacy Preservation

Sonal Rahul Jamdade, Jyoti N. Nandimath

Cloud computing is an on-demand computing. It is an Internet-based computing. In this area shared resources, data and information are provided on demand to computers and other devices. It also provides the services over the internet. In cloud computing, service providers have ability to provide storage at server according to users need. They allow users to store and retrieve the data in cloud server on demand from anywhere and on any type of device. This manipulation of data at cloud server gives rise to so many security issues because data is accessed over internet. For security purpose data is store in encrypted format. In this, client has no direct control on data once it is uploaded on cloud server. In this paper, we investigate the idea behind single search over encrypted data and also multi ranking. Cloud data owners want their documents in an encrypted form for the purpose of privacy preserving. Therefore it is necessary to develop efficient and reliable ciphertext search techniques. One challenge is that the relationship between documents will be normally concealed in the process of encryption, which will lead to significant search accuracy performance degradation

Keywords: Cloud computing, Encryption, Inner product similarity, Single Search, Multi- search, ranking

Edition: Volume 5 Issue 1, January 2016

Pages: 1162 - 1165

Share this Article

How to Cite this Article?

Sonal Rahul Jamdade, Jyoti N. Nandimath, "Survey on Keyword Search in Encrypted Data With Privacy Preservation", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV153041, Volume 5 Issue 1, January 2016, 1162 - 1165

Enter Your Registered Email Address





Similar Articles with Keyword 'Cloud computing'

Downloads: 179 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 98 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 99 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Downloads: 99 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 99 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 73 | Weekly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 93 | Weekly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Downloads: 100 | Weekly Hits: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this Article

Similar Articles with Keyword 'Inner product similarity'

Downloads: 108 | Monthly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2469 - 2472

A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data

Snehal Rahul Patil, Shiwani Sthapak

Share this Article

Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙17

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1162 - 1165

Survey on Keyword Search in Encrypted Data With Privacy Preservation

Sonal Rahul Jamdade, Jyoti N. Nandimath

Share this Article

Similar Articles with Keyword 'Single Search'

Downloads: 102 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1895 - 1898

Implementation of Intellectual Browser for User Search Goal Discovery and Reordering System

Hemlata Gaikwad, Manisha Darak

Share this Article

Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙17

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1162 - 1165

Survey on Keyword Search in Encrypted Data With Privacy Preservation

Sonal Rahul Jamdade, Jyoti N. Nandimath

Share this Article

Downloads: 127 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1621 - 1624

Achieving Efficient Multi-Keyword Ranked Search over Encrypted Cloud Data Using Bloom Filters

Sana Shaikh, Dr. Rahat Khan

Share this Article

Similar Articles with Keyword 'Multi- search'

Downloads: 116 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2044 - 2048

Multi-keyword Ranked Search Over Encrypted Cloud Data Supporting Synonym Query

Siddheshwar S. Metkari, Dr. S. B. Sonkamble

Share this Article

Downloads: 118 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1139 - 1143

Secure Data Searching and Sharing Using Third Party in Data Cloud

Ruturaj Desai, Prof. Nitin R Talhar

Share this Article

Downloads: 118 | Weekly Hits: ⮙1 | Monthly Hits: ⮙17

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1162 - 1165

Survey on Keyword Search in Encrypted Data With Privacy Preservation

Sonal Rahul Jamdade, Jyoti N. Nandimath

Share this Article

Downloads: 126 | Weekly Hits: ⮙4 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 457 - 460

Survey on Privacy Preservation for Multi-Keyword Search on Data Network

Nilima S. Kasar, Vitthal S. Phad

Share this Article

Downloads: 127 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1621 - 1624

Achieving Efficient Multi-Keyword Ranked Search over Encrypted Cloud Data Using Bloom Filters

Sana Shaikh, Dr. Rahat Khan

Share this Article

Similar Articles with Keyword 'ranking'

Downloads: 25 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1720 - 1723

Key Phrase Extraction Using Recurrent Neural Network

Aakib Jabbar, Preeti Sondhi

Share this Article

Downloads: 41 | Monthly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Downloads: 47

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1554 - 1557

Paid and Non-Paid Marketing Strategies for Search Engine Optimization

Elton D'souza; Gursheen Grewal; Divya Unnikrishnan; Neelam Phadnis

Share this Article

Downloads: 63 | Weekly Hits: ⮙1 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1615 - 1620

Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm

Premsai Cheedella

Share this Article

Downloads: 95 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1721 - 1725

A Novel Bag-of-Object Retrieval Model To Predict Image Relevance

Gouri K. Ghadge, G. J. Chhajed

Share this Article



Top