A privacy-preserving protocol for verifiable file search on the cloud

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Because cloud computing is increasingly popular, a great deal of documentation is outsourced to the cloud with decreased leadership costs and easy access. While encryption helps prevent user data confidentiality, it creates a difficult issue with well-functioning yet virtually efficient safe search features over encrypted information. It should always be encrypted before cloud outsourcing to preserve the privacy of personal documents that are stored in the cloud environment. Retrieving the same data on the cloud is also a still, tedious task. To obtain information, there are several methods available in which keyword-enabled data entry is one of the best methods. Most of these methods are restricted to the handling of a single keyword query. In order to improve search effectiveness and speed, a multi-key word-search method can be used to obtain a respective cloud.

Cite

CITATION STYLE

APA

Sai Keerthana, K., Harshavardhan, A., & Ramesh, D. (2019). A privacy-preserving protocol for verifiable file search on the cloud. International Journal of Innovative Technology and Exploring Engineering, 8(6 Special Issue 4), 476–479. https://doi.org/10.35940/ijitee.F1099.0486S419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free