An Efficient Multi keyword Search with Integrated Model

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2016 by IJETT Journal
Volume-40 Number-4
Year of Publication : 2016
Authors : G.Sonia, T.Murali Mohan

MLA 

G.Sonia, T.Murali Mohan"An Efficient Multi keyword Search with Integrated Model", International Journal of Engineering Trends and Technology (IJETT), V40(4),210-214 October 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Top k multi keyword result retrieval is an important research issue in the field of search engine optimization. because out sourced data over cloud can be encrypted for confidentiality .In this paper we propose an empirical model of top k retrieval from out sourced files which are uploaded through data owner , through service oriented application by computing the file relevance score for input multi keywords in terms of term frequency, time relevance and symmetric key encryption and every manipulation comes from the server end instead of client end every the ranking of the documents based on file relevance scores.

 References

[1] ARMBRUST, M., AND ET AL. Above the clouds: A Berkeley view of cloud computing. Tech. Rep. UCB/EECS- 2009-28, EECS Department, U.C. Berkeley, Feb 2009.
[2] M. Arrington, “Gmail disaster: Reports of mass email deletions, ”http://www.techcrunch.com/2006/12/28/gmaildisasterreports- of-mass-email-deletions/,December 2006.
[3] Amazon.com, “Amazon s3 availability event: July 20, 2008, ”http://status.aws.amazon.com/s3-20080720.html, 2008.
[4] RAWA News, “Massive information leak shakes Washington over Afghan war,”http://www.rawa.org/temp/runews/2010/08/20/massiveinformation- leak-shakeswashington-over-afghan-war.html, 2010
[5] AHN, “Romney hits Obama for security information leakage, ”http://gantdaily.com/2012/07/25/romney-hits- obama-forsecurity- information-leakage/,2012
[6] Cloud Security Alliance, “Top threats to cloud computing,” http://www.cloudsecurity alliance.org, 2010.
[7] C. Leslie, “NSA has massive database of Americans’ phone calls, ”http://usatoday30.usatoday.com/news/washington/2006-05- 10/.
[8] R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption improved definitions and efficient constructions,” in Proc. of ACM CCS, 2006.
[9] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword search over encryptedcloud data,” in Proc. of ICDCS, 2010.
[10] S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r: Top-k retrieval from aconfidential index,” in Proc. of EDBT, 2009.

Keywords
server end instead of client end every the ranking of the documents based on file relevance scores.