International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 9 Issue 2, February 2020

A Survey on Encrypted String Search Using Hash Chain Technique

Syeda Deema Quadri, Dr. Asma Parveen

A growing cloud services has made it possible to consider a third-party server as private storage. When cloud storage is used as a document archive, it is useful to provide functionality in which users can find the documents which contains a specified string as a substring. This can be obtained by using an efficient and easier-to-implement Symmetric Searchable Encryption Scheme (SSE) for string search, which takes one round of communication, O (n) times of computations over n documents.

Keywords: Cloud storage, Searchable encryption, hash-chain, multi keyword search

Edition: Volume 9 Issue 2, February 2020

Pages: 965 - 967


How to Cite this Article?

Syeda Deema Quadri, Dr. Asma Parveen, "A Survey on Encrypted String Search Using Hash Chain Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20212194259, Volume 9 Issue 2, February 2020, 965 - 967

25 PDF Views | 19 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud storage'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2762 - 2766

Large Scale Data Shared by Peer to Peer Based System in Shared Network

Bhavsar Harshada V., Dr. S. V. Gumaste, Prof. Deokate Gajanan S.

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1728 - 1730

A Trusted Framework for Data Security in Cloud Environment

Mannem Sindhuja, Punugoti Pavan Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1491 - 1494

DCT Image Compression and Secure Deduplication with Efficient Convergent Key Management

Soofiya MS, Sreetha V Kumar

Share this article

Similar Articles with Keyword 'Searchable encryption'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 988 - 992

A Survey on Attribute Based Encryption to Improve Efficiency in Semantic Search Over Cloud Data

Vina M. Lomte, Gauri S. Patil

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 969 - 973

Improved Indexing and Advanced Relevance Ranking Score for Multi-Keyword Search over Encrypted Cloud Data

Amol D. Sawant, M. D. Ingle

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1137 - 1140

An Efficient Search in Cloud Computing Using Ranked Keyword Search Algorithm

R. Aravind

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1793 - 1797

Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

Smital Erande, V. S. Ranmalkar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2704 - 2706

Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption

Minakshi B. Shingan, Sanchika A. Bajpai

Share this article

Similar Articles with Keyword 'hash-chain'

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 4 Issue 1, January 2015

Pages: 1608 - 1617

Dynamic Authentication Protocol for Mobile Networks Using Public-Key Cryptography

Mustafa AL-Fayoumi, Mohammed Nababteh, Mohammad Sh. Daoud, Mohammad Alhawarat

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020

Pages: 965 - 967

A Survey on Encrypted String Search Using Hash Chain Technique

Syeda Deema Quadri, Dr. Asma Parveen

Share this article

Similar Articles with Keyword 'multi keyword search'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 410 - 412

Multi Keyword Searching Techniques over Encrypted Cloud Data

P. Shanmuga Priya, R. Sugumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020

Pages: 965 - 967

A Survey on Encrypted String Search Using Hash Chain Technique

Syeda Deema Quadri, Dr. Asma Parveen

Share this article

Top