A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit <a rel="external noopener" href="https://www.ijcaonline.org/research/volume127/number12/arora-2015-ijca-906567.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
Analysis of Symmetric Searchable Encryption and Data Retrieval in Cloud Computing
<span title="2015-10-15">2015</span>
<i title="Foundation of Computer Science">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a>
</i>
Cloud computing is a specialised form of distributed computing that introduces utilization models for remotely provisioning scalable and measured resources. The driving motivation behind the cloud computing is to provide IT resources as a service that encapsulates other IT resources. Data service outsourcing is one of the service that is economically enabled by the cloud computing. But in order to protect data privacy sensitive data has to be encrypted before outsourcing to the commercial
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2015906567">doi:10.5120/ijca2015906567</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hbhbnk4owbguxbzaq26fjluy64">fatcat:hbhbnk4owbguxbzaq26fjluy64</a>
</span>
more »
... cloud. Data encryption protects data security to some extent, but this may lead to a compromise on the part of efficiency of storage and retrieval on the server. This paper analyzes various searchable encryption schemes where data owner itself is responsible for his data security. These searchable encryption schemes allow retrieval of encrypted data over the cloud thereby making data retrieval fast and efficient. These schemes also guarantee high security and efficiency. Keywords Data outsourcing, data encryption, searchable encryption STEP 7:In a TRSE scheme the relevance scores in the first round are sent to the user by the cloud server. STEP 8: Based on these scores the user tells the cloud server which files are required? STEP 9: In the second round only the relevant files as required are sent to the user. This overall communication between the cloud server and user takes two rounds and hence
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603153041/https://www.ijcaonline.org/research/volume127/number12/arora-2015-ijca-906567.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/c8/a1/c8a1d727a0a518c0aad17faca8562f0593328c31.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/ijca2015906567">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
Publisher / doi.org
</button>
</a>