z-logo
open-access-imgOpen Access
Efficient and expressive keyword search over scrambled data in cloud
Author(s) -
B B. V. Satya Vara Prasdad,
V Abhishekh,
P Rahul Raja,
Alan Nur Aditya
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i2.7.11440
Subject(s) - computer science , encryption , word (group theory) , cloud computing , field (mathematics) , code (set theory) , prime (order theory) , theoretical computer science , bilinear interpolation , information retrieval , computer security , programming language , mathematics , operating system , geometry , set (abstract data type) , combinatorics , pure mathematics , computer vision
The term seek encryption permits directing watchword look over encoded information in the interest of the information clients without taking in the fundamental plaintexts in cloud condition. The most existing accessible encryption code word searches just help single or conjunctive watchword look, while a couple of different plans that can perform expressive catchphrase seek are computationally wasteful since they are worked from bilinear pairings over the composite-arrange gatherings. In this paper, the code word examination demon- strates the general data entries are done in a way that accessible encryption methodologies like the prime-arrange gatherings which per- mits watchword seek approaches predicates, get to structures to be communicated in conjunctive, disjunctive or any monotonic Boolean equations and accomplishes critical execution change over existing plans. A standout amongst the most imperative is Keyword exploring, based on which the exceptional yield exercises in the inquiry promoting field catchphrases can represent the deciding moment of required data from cloud site.  

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here