Filters








52,138 Hits in 3.7 sec

A Competent Multi-Keyword Exploration Scheme over Encrypted Data in Cloud

Saranya K, Manohari J, Haripriya H
2018 International Journal of Trend in Scientific Research and Development  
Cloud computing is an emerging technology in the present scenario which enhances enormous data storage and its processing. Various issues are present in maintaining the cloud environment.  ...  Cloud computing is an emerging technology in the scenario which enhances enormous data storage and its processing. Various issues are present in maintaining the cloud environment.  ...  The prime activity done by the admin is outsourcing his data on to the cloud storage.  ... 
doi:10.31142/ijtsrd11243 fatcat:qjlgmunearddzk4wnse5wktbey

BST-MRPAS: Binary Search Tree based Multi Replica for Public Cloud Auditing System

Savita Vishwakarma, Rudresh Shah
2019 International Journal of Computer Applications  
With the growing awareness of data privacy, more and more cloud users choose to encrypt their sensitive data before outsourcing them to the cloud.  ...  Data integrity and storage efficiency are two essential needs for cloud storage.  ...  The proposed system proves the authentication and integrity with improving the data auditing and replication for cloud data storage.  ... 
doi:10.5120/ijca2019918396 fatcat:kk53uxzydfblfgx4vlahx2pku4

EFURMS: An Efficient Scheme for File Upload and Ranked Multi-Keyword Search over Encrypted Data in Cloud

Bhavya M, Thriveni J, Venugopal K R
2021 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
To protect data from leakage, the widely used technique is to encrypt the data before uploading into cloud storage servers.  ...  Therefore many data owners are interested to outsource their data to cloud storage servers due to their huge advantage in data processing.  ...  Shows the time consumed to retrieve documents with various size from the cloud storage by the data owner/ user.  ... 
doi:10.35940/ijitee.d8464.0210421 fatcat:nwtlnbev4rhahncxykd7jtmdgm

A Survey on Storage Techniques in Cloud Computing

Samson Akintoye, Antoine Bagula, Yacine Djemaiel, Noureddine Bouriga
2017 International Journal of Computer Applications  
vulnerabilities in the cloud storage.  ...  This paper provides a survey of some proposed cloud storage methods and techniques, their advantages and drawbacks and makes stress on the current requirements for storage techniques in cloud computing  ...  The last method is a Correlation-Based Scheme which monitors user activities and tries to allocate the same subset of storage nodes to the users who tend to use the cloud storage system simultaneously.  ... 
doi:10.5120/ijca2017913472 fatcat:joak5sjqajfqzg74xq5hzivyee

A Visual Exploratory Meta Data Search Engine Solution based on Cloud Computing

Mohammed NajahMahdi, Abdul Rahim Ahmad, Roslan Ismail
2014 International Journal of Computer Applications  
With the rapid upsurge of web use and internet connectivity (Access), the traditional search engines face significant challenges in the contemporary searches, response speed and the storage of bulk pages  ...  The search engine contained in the cloud can help alleviate the identified shortcomings. This is simply because cloud computing is advantageous in mass data processing and storage.  ...  INTRODUCTION Cloud based storage enables massive online storage of data. In the cloud storage, a full text search engine is critical for finding documents.  ... 
doi:10.5120/18223-9354 fatcat:ygmi4lt3p5cl5amt7tqejcslje

Revisiting Asymmetric Classifier Fuzzy Keyword Search with Performance Isolated Intertenant Storage Clusters in Public Cloud

Shyamala Devi Munisamy, Arun Chokkalingam
2015 Indian Journal of Science and Technology  
Our implementation outcome have shown that our proposed searching scheme minimizes searching time on the cloud storage server by utilizing the data effectively with high availability and predictable performance  ...  Applications/Improvements: This facilitates the cloud service provider to hold back the time to serve multiple customers as the searching time is absolutely diminished.  ...  Efficiency of Misspelled Keywords with and without Classifier Search Server, Storage improved search time due to the presence of classifier search server and Performance Isolated Intertenant Storage Cluster  ... 
doi:10.17485/ijst/2015/v8i35/83118 fatcat:g3jhohdmpzetll46rub6ej7v3e

Construction of Collaborative Learning Environment Supported by Cloud-Computing

Lin Na Huang, Chun Li Liu
2014 Applied Mechanics and Materials  
Based on the analysis of the cloud-computing influence on collaborative learning, this paper puts forward the construction strategy of collaborative learning environment supported by cloud-computing and  ...  the specific application case, which will provide reference for cloud-computing application in education informatization and social network learning.  ...  The dispatch of the team members with complementary form can improve the effect of collaborative learning.  ... 
doi:10.4028/www.scientific.net/amm.543-547.3581 fatcat:73u6ccag3bh4ziqf4ueiytgq3m

ENSURING PRIVACY ON E- MEDICAL HEALTH CARE USING TRIPLE-DES ALGORITHM

2017 International Journal of Recent Trends in Engineering and Research  
On account of using PRE method in the active system, plaintext attacks occur.  ...  Cloud assisted health data considerably facilitates secure and efficient patient treatment.  ...  Admin monitor the activities of both users and doctors, also monitoring the keys which are entered by user in the search box.  ... 
doi:10.23883/ijrter.2017.3068.zfrnx fatcat:le5qj3ci5bhvbfhl3nuy4fffrm

Alleviating Malicious Insider in Cloud Through Offensive Decoy Technology

B Ankayarkanni
2014 International Journal on Information Sciences and Computing  
This process alleviates the malicious insider from the cloud storage area who uses offensive technique for attacking.  ...  They also can misuse real user data which evidences the level of data security provided in cloud security. In this model we propose approach for securing data using fog computing.  ...  Usually the cloud user data provides storage for clouds for users from different parts where once the user can log information from their account with given user name and password.  ... 
doi:10.18000/ijisac.50145 fatcat:7fxmccwcl5aodkjrrkdgjpvosi

Enhanced Privacy with Multiple Search Over Cloud Data using EPSS

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Every user wants to store the sensitive data to cloud storage. In this paper, the Enhanced Privacy and Secure Storage data (EPSS) can be searched with the multiple keywords.  ...  For the searching of multiple keywords the Enhanced Keyword Search (EKS) which retrieve the data very fast and with multiple records.  ...  The Enhanced Multi-Keyword search with secure data storage is implemented with advanced encryption and decryption algorithm.  ... 
doi:10.35940/ijitee.b7485.129219 fatcat:bdipcpafffcm5njgrk2a6zoyjq

AN INTEROPERABLE CLOUD-BASED GEOPORTAL FOR DISCOVERY AND MANAGEMENT OF EARTH OBSERVATIONPRODUCTS

Dante D. Sánchez-Gallegos, J.L. Gonzalez-Compean, Victor J. SosaSosa, Heidy M. Marin-Castro, José Tuxpan-Vargas
2018 Figshare  
/delivering, in advance, products matching with end-user preferences.  ...  A search microservice that analyses the preferences of end-users (settings of spatiotemporal and polygon shapes) and builds clusters of users sharing preferences was included into the geoportal for recommending  ...  ACKNOWLEDGEMENTS This work was partially supported by the sectoral fund of research, technological development and innovation in space activities of the Mexican National Council of Science and Technology  ... 
doi:10.6084/m9.figshare.6949187.v1 fatcat:6gkuf3q5nnernawsgmshwvb6bi

Current State of Enterprise 2.0 Knowledge Management

Dimiter Velev, Plamena Zlateva
2012 International Journal of Trade, Economics and Finance  
Index Terms-Web 2.0, Enterprise 2.0, Knowledge Management, Cloud Computing.  ...  The classical definition of knowledge management is presented which is further related with its position in the area of Enterprise 2.0.  ...  Information is readily available and with suitable search engines, the users can locate the information they need.  The technology adopts an approach that is user-centric and facilitates developing and  ... 
doi:10.7763/ijtef.2012.v3.208 fatcat:v62h7iipr5debc3aztpncwxuwa

Implementation of User Centric SSE for Privacy-Preserving and Enhancing Searching Efficiency in Cloud Environment

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
With its wide advantages, cloud computing has emerged as fast emergent segments of the IT. Hence data security is a major concern for cloud users.  ...  One solution to this is that user can apply encryption techniques on data before sending it to the cloud server. But encrypted data limits the server's capability to make plaintext keyword search.  ...  The implementation further improves searching mechanism by enabling the user to perform a search over the encrypted cloud data.  ... 
doi:10.35940/ijitee.j9625.0881019 fatcat:cysd2mm3ebbezho2onn7rx2cpe

Redefining tactical operations for MER using cloud computing

Joseph C. Joswig, Khawaja S. Shams
2011 2011 Aerospace Conference  
We then detail the motivations behind our move to cloud based computing services and as well as our system design and implementation.  ...  move to distributed operations as mission scientists returned to their places of work in the summer of 2004, but they would still came together via teleconference and connected software to plan rover activities  ...  C is empirically observed to be significantly smaller with the Cloud based implementation and the reason for our improvement.  ... 
doi:10.1109/aero.2011.5747555 fatcat:5a7sp5bkh5dspnnes3dykhekje

An Analytical Survey of Privacy Preserving Schemes in Cloud Computing

Saima Majeed
2017 International Journal for Research in Applied Science and Engineering Technology  
However, there are multifaceted issues with respect to privacy and security of data in a cloud environment.  ...  The cloud maintains and manages the data within various deployment models. Outsourcing the data gives a big relief for storage of data in local machines.  ...  To authenticate a user to cloud services, an active bundle interacts on behalf of a user with it using privacy policies of a user [1] . D.  ... 
doi:10.22214/ijraset.2017.4081 fatcat:mz4bvjoyaneuljkrvtdnzhnohy
« Previous Showing results 1 — 15 out of 52,138 results