A new method for secure kNN algorithm to guarantee the security of the outsourced data maintaining its searchability

V. Srinivas, P Radhika Krupalini

Abstract


Distributed computing is a promising IT framework that can make a ton out of IT resources in a profitable and versatile manner. Continuously different associations plan to move their close by information the board systems to the cloud and store and manage their item information on cloud servers. A going with challenge is the way to guarantee the security of the monetarily mystery information while keeping up the capacity to look through the information. In this paper, a security protecting information search plan is suggested that can support both the identifier-based and include based item look. Specifically, two novel rundown trees are created and encoded that can be looked without knowing the plaintext information.


References


www.100EC.cn. 2016 Monitoring Report on the Data of China's Ecommerce Market [EB/OL]. http://www.100ec.cn/zt/16jcbg/,2017- 05-24

Amazon. Amazon S

http://aws.amazon.com/s3/ [3] Windows azure. http://www.microsoft.com/windowsazure/

Apple i Cloud. http://www.icloud.com/

Google App Engine. http://appengine.google.com/

Golle P.Staddon J,Waters B. Secure Conjunctive Keyword Search over Data[C]. Springer, 2004.

Song D X,Wanger D.Perrig A. Practical Techniques for Searched on Encrypted Data[C].IEEE,2000.

Boneh D,Di Crescenzo G,Ostrovsky R. et al. Public Key Encryption with Keyword Search: EUROCRYPT[C].Springer,2004.

Rhee H S.Park J K,Susilo W. et al. Trapdoor Security in A Searchable Public-Key Encryption Scheme with A Designated Tester[J].Journal of Systems and Software,2010,83(5):763-771

Ren, Kui, Cong Wang, and Qian Wang. "Security challenges for the public cloud." IEEE Internet Computing 16.1 (2012): 69-73.

Song, Dawn Xiaoding, David Wagner, and Adrian Perrig. "Practical techniques for searches on encrypted data." Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on. IEEE, 2000.

Goh, Eu-Jin. "Secure indexes." IACR Cryptology ePrint Archive 2003 (2003): 216.

Curtmola, Reza, et al. "Searchable symmetric encryption: improved definitions and efficient constructions." Journal of Computer Security 19.5 (2011): 895-934

Swaminathan, Ashwin, et al. "Confidentiality-preserving rankordered search." Proceedings of the 2007 ACM workshop on Storage security and survivability. ACM, 2007.

Wang, Cong, et al. "Enabling secure and efficient ranked keyword search over outsourced cloud data." IEEE Transactions on parallel and cloud systems 23.8 (2012):

-1479.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.