Efficient Phrase Search Based on Bloom Filters in Cloud

Mc Priyanka, A. Saritha .

Abstract


cloud computing has produced much enthusiasm for the examination group as of late for its numerous points of interest, however has additionally raise security and protection concerns. The capacity and access of private reports have been distinguished as one of the focal issues in the territory. Specifically, numerous specialists explored answers for look over encoded archives put away on remote cloud servers. While numerous plans have been proposed to perform conjunctive watchword look, less consideration has been noted on more particular seeking systems. In this paper, we show an expression seek system in view of Bloom channels that is essentially speedier than existing arrangements, with comparative or better stockpiling and correspondence cost. Our procedure utilizes a progression of n-gram channels to help the usefulness. The plan shows an exchange off amongst capacity and false positive rate, and is versatile to shield against incorporation connection assaults. An outline approach in light of an application's objective false positive rate is likewise portrayed.

Full Text:

PDF

References


D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,

B. Waters, D. Balfanz, G. Durfee, and D. K. Smetters, “Building an encrypted and searchable audit log,”

M. Ding, F. Gao, Z. Jin, and H. Zhang, “An efficient public key encryption with conjunctive keyword search scheme based on pairings,”

F. Kerschbaum, “Secure conjunctive keyword searches for unstructured text,”

C. Hu and P. Liu, “Public key encryption with ranked multikeyword search,”

Z. Fu, X. Sun, N. Linge, and L. Zhou, “Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query,”

C. L. A. Clarke, G. V. Cormack, and E. A. Tudhope, “Relevance ranking for one to three term queries,”

H. Tuo and M. Wenping, “An effective fuzzy keyword search scheme in cloud computing,”

M. Zheng and H. Zhou, “An efficient attack on a fuzzy keyword search scheme over encrypted data,”

S. Zittrower and C. C. Zou, “Encrypted phrase searching in the cloud”


Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.