z-logo
open-access-imgOpen Access
A Privacy-Preserving Protocol for Verifiable File Search on the Cloud
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.f1099.0486s419
Subject(s) - cloud computing , computer science , encryption , outsourcing , verifiable secret sharing , task (project management) , key (lock) , computer security , confidentiality , documentation , protocol (science) , database , operating system , engineering , medicine , alternative medicine , set (abstract data type) , systems engineering , pathology , political science , law , programming language
Because cloud computing is increasingly popular, a great deal of documentation is outsourced to the cloud with decreased leadership costs and easy access. While encryption helps prevent user data confidentiality, it creates a difficult issue with well-functioning yet virtually efficient safe search features over encrypted information. It should always be encrypted before cloud outsourcing to preserve the privacy of personal documents that are stored in the cloud environment. Retrieving the same data on the cloud is also a still, tedious task. To obtain information, there are several methods available in which keyword-enabled data entry is one of the best methods. Most of these methods are restricted to the handling of a single keyword query. In order to improve search effectiveness and speed, a multi-key word-search method can be used to obtain a respective cloud.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here