|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
Abstract
Since approximately two decades ago, the term "cloud computing" has become widely used among IT professionals. The advantages of cloud services have no boundaries. Users can gain from cloud computing in several ways, including the flexibility to pay as they go and the availability of computer resources as needed. For customers, it is quite convenient to receive data and information whenever they need it. Only what they utilise must be paid for. The costs for cloud computing and storage services should be transparent to users and enterprises. These services provide a range of data processing and storage options. Besides this, customers have a very tough time locating the best cloud services for keeping various options of usage. In this research, we have considered the problem of security and privacy while receiving data from the data owner. The process includes multiple algorithms for securing data, accessing keys and transferring data to the data user.Security of data is enhanced with the AES encryption model for sets of n-gram words. The set is maintained with an index to obtain the sequence of data along with its key. The doc is encrypted to maintain privacy while sending and storing it on the cloud server. Parameters of comparison like a list of fuzzy keywords, multi keywords and asingle keyword are demonstrated.
Keyword
cryptography, encryption schemes, fuzzy keywords,Keyword Search,privacy, trapdoor
PDF Download (click here)
|
|
|
|
|