A Survey on Encrypted String Search Using Hash Chain Technique
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 9 Issue 2, February 2020

A Survey on Encrypted String Search Using Hash Chain Technique

Syeda Deema Quadri, Dr. Asma Parveen

A growing cloud services has made it possible to consider a third-party server as private storage. When cloud storage is used as a document archive, it is useful to provide functionality in which users can find the documents which contains a specified string as a substring. This can be obtained by using an efficient and easier-to-implement Symmetric Searchable Encryption Scheme (SSE) for string search, which takes one round of communication, O (n) times of computations over n documents.

Keywords: Cloud storage, Searchable encryption, hash-chain, multi keyword search

Edition: Volume 9 Issue 2, February 2020

Pages: 965 - 967

Share this Article

How to Cite this Article?

Syeda Deema Quadri, Dr. Asma Parveen, "A Survey on Encrypted String Search Using Hash Chain Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20212194259, Volume 9 Issue 2, February 2020, 965 - 967

89 PDF Views | 84 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud storage'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2712 - 2714

Privacy Preserving DAC for Data in Cloud

Pankaj R. Chandre, Swati S. Gore

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2098 - 2102

Public Auditing System with Auto-Data Recovery System on Cloud Scheme

Dhane Sachin V., Joshi P.

Share this Article

Similar Articles with Keyword 'Searchable encryption'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 969 - 973

Improved Indexing and Advanced Relevance Ranking Score for Multi-Keyword Search over Encrypted Cloud Data

Amol D. Sawant, M. D. Ingle

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 859 - 862

Searching Keyword Using Public-Key Ciphertexts with Hidden Structures

K. Maheshwari, S. Nithya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 1109 - 1112

Combined Security and Service Overloading Fusion Model for Cloud Environment

Ramesh Prasad Vishwakarma, Dr. Sitendra Tamrakar, Rishi Kumar Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1137 - 1140

An Efficient Search in Cloud Computing Using Ranked Keyword Search Algorithm

R. Aravind

Share this Article

Similar Articles with Keyword 'hash-chain'

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 4 Issue 1, January 2015

Pages: 1608 - 1617

Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography

Mustafa AL-Fayoumi, Mohammed Nababteh, Mohammad Sh. Daoud, Mohammad Alhawarat

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020

Pages: 965 - 967

A Survey on Encrypted String Search Using Hash Chain Technique

Syeda Deema Quadri, Dr. Asma Parveen

Share this Article

Similar Articles with Keyword 'multi keyword search'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 410 - 412

Multi Keyword Searching Techniques over Encrypted Cloud Data

P. Shanmuga Priya, R. Sugumar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020

Pages: 965 - 967

A Survey on Encrypted String Search Using Hash Chain Technique

Syeda Deema Quadri, Dr. Asma Parveen

Share this Article
Top