Open Access   Article Go Back

Enhancing Security and Efficiency In Cloud Computing Users Using Multi-keyword Ranking Model

S.M.Manimalathi 1 , A.Senthilkumar 2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-11 , Page no. 139-145, Nov-2015

Online published on Nov 30, 2015

Copyright © S.M.Manimalathi , A.Senthilkumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.M.Manimalathi , A.Senthilkumar, “Enhancing Security and Efficiency In Cloud Computing Users Using Multi-keyword Ranking Model,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.139-145, 2015.

MLA Style Citation: S.M.Manimalathi , A.Senthilkumar "Enhancing Security and Efficiency In Cloud Computing Users Using Multi-keyword Ranking Model." International Journal of Computer Sciences and Engineering 3.11 (2015): 139-145.

APA Style Citation: S.M.Manimalathi , A.Senthilkumar, (2015). Enhancing Security and Efficiency In Cloud Computing Users Using Multi-keyword Ranking Model. International Journal of Computer Sciences and Engineering, 3(11), 139-145.

BibTex Style Citation:
@article{_2015,
author = {S.M.Manimalathi , A.Senthilkumar},
title = {Enhancing Security and Efficiency In Cloud Computing Users Using Multi-keyword Ranking Model},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2015},
volume = {3},
Issue = {11},
month = {11},
year = {2015},
issn = {2347-2693},
pages = {139-145},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=751},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=751
TI - Enhancing Security and Efficiency In Cloud Computing Users Using Multi-keyword Ranking Model
T2 - International Journal of Computer Sciences and Engineering
AU - S.M.Manimalathi , A.Senthilkumar
PY - 2015
DA - 2015/11/30
PB - IJCSE, Indore, INDIA
SP - 139-145
IS - 11
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2298 2227 downloads 2259 downloads
  
  
           

Abstract

The venture defines and understand the issue of multi-catchphrase positioned seek over scrambled cloud Information (MRSE) while saving strict framework insightful assurance in the cloud processing paradigm. Information proprietors are motivated to outsource their complex Information administration frameworks from neighborhood sites to the business open cloud for awesome adaptability and monetary savings. But for ensuring Information privacy, delicate Information have to be scrambled before outsourcing, which obsoletes customary Information usage based on plain content catchphrase search. Thus, enabling a scrambled cloud Information seek administration is importance. Considering the vast number of Information clients and archives in the cloud, it is vital to allow numerous catchphrases in the seek demand and return archives in the request of their significance to these keywords. Related works on searchable encryption center on single catchphrase seek or Boolean catchphrase search, and rarely sort the seek results. Among diverse multi-catchphrase semantics, choosing the proficient likeness measure of “coordinate matching,” i.e., as numerous matches as possible, to catch the significance of Information archives to the seek query. Specifically, here use the “internal item similarity” i.e., the number of inquiry catchphrases appearing in a document, to quantitatively assess such likeness measure of that archive to the seek query. Amid the file construction, each archive is related with a twofold vector as a sub file where each bit represents whether relating catchphrase is contained in the document. The seek inquiry is too depicted as a twofold vector where each bit implies whether relating catchphrase appears in this seek request, so the likeness could be precisely measured by the internal item of the inquiry vector with the Information vector. However, straightforwardly outsourcing the Information vector or the inquiry vector will damage the file assurance or the seek privacy. The vector space model helps to give sufficient seek accuracy, and the DES encryption empowers clients to include in the positioning while the majority of processing work is done on the server side by operations just on figure text. As a result, Information spillage can be eliminated and Information security is ensured. Intensive security and execution investigation appear that the proposed scheme ensures high security and practical efficiency.

Key-Words / Index Term

MRSE, OTP, Cloud, Item similarity

References

[1] Karapakula, A.; Puramchand, M.; Rafi, G.M."Coordinate matching for effective capturing the similarity between query keywords and outsourced documents", Published in: Sustainable Energy and Intelligent Systems (SEISCON 2012), IET Chennai 3rd International on, Date of Conference:27-29 Dec. 2012Page(s):1- 7.
[2] Laveti, G.; Dept. of E.C.E, Sangivalasa, Visakhapatnam, India; Sasibhushana Rao, G.; Kumar, M.N.V.S.S.; Goswami, R. ,” A Novel TOA measurement based global evolutionary search estimator for defence applications”, Published in: Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015 International Conference on, Date of Conference:24-25 Jan. 2015, Page(s):1 – 4
[3] Zhiyong Xu; Shenzhen Inst. of Adv. Technol., Shenzhen, China; Wansheng Kang; Ruixuan Li; Kinchoong Yow ,“ Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud”, Published in:Parallel and Distributed Systems (ICPADS), 2012 IEEE 18th International Conference on, Date of Conference:17-19 Dec. 2012,Page(s):244 – 251.
[4] Mantel, C.; Dept. of Photonics Eng., Tech. Univ. of Denmark, Lyngby, Denmark; Ferchiu, S.C.; Forchhammer, S.,” Comparing subjective and objective quality assessment of HDR images compressed with JPEG-XT“,Published in: Multimedia Signal Processing (MMSP), 2014 IEEE 16th International Workshop on, Date of Conference:22-24 Sept. 2014, Page(s):1 – 6
[5] Woan Yun Hsiao; Inst. of Electron. Eng., Nat. Tsing-Hua Univ., Hsinchu, Taiwan; Chin Yu Mei; Wen Chao Shen; Tzong Sheng Chang ,” A high density Twin-Gate OTP cell in pure 28nm CMOS process “,Published in: VLSI Technology, Systems and Application (VLSI-TSA), Proceedings of Technical Program - 2014 International Symposium on ,Date of Conference:28-30 April 2014 Page(s):1 – 2.
[6] Chang-Lung Tsai; Dept. of Comput. Sci. & Inf. Eng., Chinese Culture Univ., Taipei, Taiwan; Chun-Jung Chen; Deng-Jie Zhuang,” Secure OTP and Biometric Verification Scheme for Mobile Banking“,Published in:Mobile, Ubiquitous, and Intelligent Computing (MUSIC), 2012 Third FTRA International Conference on ,Date of Conference:26-28 June 2012 ,Page(s):138 - 141
[7] Chao-Hsi Huang; Inst. of Comput. Sci. & Inf. Eng., Nat. Ilan Univ., Ilan, Taiwan; Shih-Chih Huang,” RFID systems integrated OTP security authentication design“,Published in:Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2013 Asia-Pacific, Date of Conference:Oct. 29 2013-Nov. 1 2013, Page(s):1 – 8.
[8] Wenge, O.; Multimedia Commun. Lab. (KOM) Tech., Univ. Darmstadt, Darmstadt, Germany; Schuller, D.; Steinmetz, R.,” Towards Establishing Security-Aware Cloud Markets”, Published in:Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on, Date of Conference:15-18 Dec. 2014, Page(s):1027 – 1032
[9] Nagalakshmi, N.; Rajalakshmi, S.,” Enabled security based on elliptic curve cryptography with optimal resource allocation schema in cloud computing environment”, Published in:Computing, Communication and Information Systems (NCCCIS), 2015 IEEE Seventh National Conference on, Date of Conference:13-14 Feb. 2015,Page(s):17 – 22.
[10] Khanna, P.; Inst. of Eng. & Technol., JK Lakshmipat Univ., Jaipur, India; Jain, S.; Babu, B.V.,” Cloud Broker: Working in federated structures“,Published in:Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on, Date of Conference:24-27 Sept. 2014,Page(s):1273 – 1278.
[11] Yefei Zha; Sch. of Comput. Sci. & Eng., Southeast Univ., Nanjing, China; Yuqing Zhai,” An Improved Collaborative Filtering Model Considering Item Similarity“,Published in:Information Science and Cloud Computing Companion (ISCC-C), 2013 International Conference on, Date of Conference:7-8 Dec. 2013,Page(s):428 – 434.
[12] Wang Weijie; Dept. of Comput. Sci. & Technol., East China Normal Univ., Shanghai, China; Yang Jing; He Liang,” An Improved Collaborative Filtering Based on Item Similarity Modified and Common Ratings”, Published in: Cyberworlds (CW), 2012 International Conference on, Date of Conference:25-27 Sept. 2012,Page(s):231 – 235.
[13] Bai Juan; Dept. of Inf. Eng., North China Univ. of Water Conservancy & Electron. Power, Zhengzhou, China,” Collaborative filtering recommendation algorithm based on semantic similarity of item”, Published in:Advanced Computational Intelligence (ICACI), 2012 IEEE Fifth International Conference on, Date of Conference:18-20 Oct. 2012, Page(s):452 – 454.
[14] Feng Xie; Dept. of Autom., Tsinghua Univ., Beijing, China; Zhen Chen; Jiaxing Shang; Wenliang Huang ,” Item Similarity Learning Methods for Collaborative Filtering Recommender Systems”, Published in:Advanced Information Networking and Applications (AINA), 2015 IEEE 29th International Conference on, Date of Conference:24-27 March 2015, Page(s):896 – 903.