A secure searchable encryption scheme for cloud using hash-based indexing
Cloud service for data outsourcing has triggered security and privacy needs that can be
satisfied by encrypting data prior to outsourcing to the cloud. Searchable Encryption that …
satisfied by encrypting data prior to outsourcing to the cloud. Searchable Encryption that …
[PDF][PDF] Secure data sharing in cloud computing: a comprehensive review
PM Reddy, SH Manjula, KR Venugopal - International Journal of …, 2017 - core.ac.uk
Cloud Computing is an emerging technology, which relies on sharing computing resources.
Sharing of data in the group is not secure as the cloud provider cannot be trusted. The …
Sharing of data in the group is not secure as the cloud provider cannot be trusted. The …
Multi-keyword ranked searchable encryption scheme with access control for cloud storage
With the advent of cloud computing, data owners are motivated to outsource their data to
public clouds for decreasing the cost of management systems. For protecting data privacy …
public clouds for decreasing the cost of management systems. For protecting data privacy …
Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing
Data owners are used to transmit the data using cloud computing in a low cost. The cloud
computing is a popular technology to transmit the data through internet and will also act as …
computing is a popular technology to transmit the data through internet and will also act as …
MSIGT: Most significant index generation technique for cloud environment
Cloud Computing is a computing paradigm for delivering computational power, storage and
applications as services via Internet on a pay-as-you-go basis to consumers. The data …
applications as services via Internet on a pay-as-you-go basis to consumers. The data …
pbins: private bins for top-k semantic search over encrypted data using transformers
JP Arockiasamy, I Sabarimuthu, LE Benjamin… - International Journal of …, 2025 - Springer
Traditional searchable encryption constructions are often based on Term-Frequency and
Inverse Document Frequency (TF-IDF) to retrieve relevant documents. These vectors are …
Inverse Document Frequency (TF-IDF) to retrieve relevant documents. These vectors are …
[PDF][PDF] Survey on data storage and retrieval techniques over encrypted cloud data
S Raghavendra, CS Reddy… - International …, 2016 - jarrett.cis.unimelb.edu.au
Cloud Computing is an ever evolving field of tech-nology. In the simplest terms, cloud
computing means storing and accessing data and programs over the Internet instead of your …
computing means storing and accessing data and programs over the Internet instead of your …
Index generation and secure multi-user access control over an encrypted cloud data
S Raghavendra, K Meghana… - Procedia Computer …, 2016 - Elsevier
Cloud computing provides economical and effective solution for sharing data among cloud
users with low maintenance cost. The security of data and identity confidentiality while …
users with low maintenance cost. The security of data and identity confidentiality while …
IGSK: index generation on split keyword for search over cloud data
S Raghavendra, S Girish, CM Geeta… - … on Computing and …, 2015 - ieeexplore.ieee.org
Storage as a Service (Saas) of cloud computing has become an alternative option for data
owners of various organizations to store their data into the cloud. Usually sensitive data is …
owners of various organizations to store their data into the cloud. Usually sensitive data is …
Split keyword fuzzy and synonym search over encrypted cloud data
A substitute solution for various organizations of data owners to store their data in the cloud
using storage as a service (SaaS). The outsourced sensitive data is encrypted before …
using storage as a service (SaaS). The outsourced sensitive data is encrypted before …