2015 IEEE International Conference on Communications (ICC) 2015
DOI: 10.1109/icc.2015.7249517
|View full text |Cite
|
Sign up to set email alerts
|

Achieving authorized and ranked multi-keyword search over encrypted cloud data

Abstract: In emerging cloud computing, a central application is to outsource the files and record belonging to its user, to outer cloud servers for adaptable information storage. The outsourced documents and files should be encrypted because of the protection and secrecy worries of their proprietor. As there is large amount data present in the cloud it is very important to have a multi-keyword search over the encrypted data. Essentially huge amount of data is present on cloud and providing it for any time on demand requ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 38 publications
(28 citation statements)
references
References 10 publications
0
28
0
Order By: Relevance
“…In searchable encryption, clients store data into encrypted form to the cloud server and keyword searching can be perform on ciphertext. Searchable encryption (SE) techniques [4], [5], [6], [7], [13], [14], [15], [16], [17] can partially fulfill the need for secure outsourced data search. Secure search over encrypted cloud data reduces the computation and storage cost.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
See 1 more Smart Citation
“…In searchable encryption, clients store data into encrypted form to the cloud server and keyword searching can be perform on ciphertext. Searchable encryption (SE) techniques [4], [5], [6], [7], [13], [14], [15], [16], [17] can partially fulfill the need for secure outsourced data search. Secure search over encrypted cloud data reduces the computation and storage cost.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Later, several multi-keyword search schemes were proposed [4], [5], [6], [7], [11], [12], [14]. When huge amount of data owners [2], [8] are involved then they generate trapdoors simultaneously which affect the flexibility and usability of search system.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…7: When user acquires the˜from the cloud server, calculating the values of ( , * ) and value respectively according to the . (12). Then sends the as Epck( ) to cloud server.…”
Section: A Confidentiality Of Observed Valuesmentioning
confidence: 99%
“…This makes file-level fine-grained authoriza-tion a problem. Existing solutions such as Sun's [3] and Li's [4] have some drawbacks. Sun's scheme cannot achieve ranking search and needs a large computational overhead.…”
Section: Introductionmentioning
confidence: 99%