An Efficient Encrypted Data Searching Over Out Sourced Data

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-4 Issue-10
Year of Publication : 2013
Authors : P.Rama Lakshmi , Nagabhushana Rao Chunduru , Amarendra Kothalanka

Citation 

P.Rama Lakshmi , Nagabhushana Rao Chunduru , Amarendra Kothalanka. "An Efficient Encrypted Data Searching Over Out Sourced Data". International Journal of Engineering Trends and Technology (IJETT). V4(10):4640-4644 Oct 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group.

Abstract

Searching data over Out sourcing is still an important research issue in the field of cloud computing or service oriented application ,because of retrieving the user interesting and relevant results based on the user query. Obviously the out sourced data will be encrypted form. Our approach searches keywords in the encrypted documents in optimal manner based on the file relevance score over service oriented applications

References

1. B. Bloom, Space/time trade-o®s in hash coding with allowable errors," in Communications of the ACM, Vol. 13(7), pp. 422{426, 1970.
2. M. Bellare, R. Canetti, and H. Krawczyk, Keying hash functions for message au thentication," in Proceedings of CRYPTO`96, Lecture Notes in Computer Science 1109, pp. 1{15.
3. D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search," in Proceedings of Eurocrypt 2004, Lecture Notes in Computer Science 3027, pp. 506{522.
4. K. Bennett, C. Grotho®, T. Horozov, and I. Patrascu, E±cient sharing of encrypted data," in Proceedings of ACISP 2002, Lecture Notes in Computer Science 2384, pp. 107{120.
5. O. Goldreich, Foundations of Cryptography: Basic Tools, Cambridge University Press, 2001.
[6] B. Krebs, “Payment Processor Breach May Be Largest Ever,” Online at http://voices.washingtonpost.com/securityfix/2009/01/ payment processor breach may b.html, Jan. 2009.
[7] I. H. Witten, A. Moffat, and T. C. Bell, “Managing gigabytes: Compressing and indexing documents and images,” Morgan Kaufmann Publishing, San Francisco, May 1999.
[8] D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. of IEEE Symposium on Security and Privacy’00, 2000.
[9] E.-J. Goh, “Secure indexes,” Cryptology ePrint Archive, Report 2003/216, 2003, http://eprint.iacr.org/.
[10] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Proc. of EUROCRYP’04, volume 3027 of LNCS. Springer, 2004.
[11]http://en.wikipedia.org/wiki/Advanced_Encryption_Standard