User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 28
 Downloands 4
Secured Multikeyword Search over Encrypted Cloud Data Based On Quality and Usability
2021
Journal:  
Turkish Journal of Computer and Mathematics Education
Author:  
Abstract:

Searchable encryption permits to upload encrypted documents to a remote honest-but-suspicious server and query that data at the server without the papers having to be decrypted first. With the advent of cloud computing, data owners are encouraged to move their sophisticated data management systems from local sites to commercial public clouds for greater flexibility and cost savings. However, in order to safeguard data privacy, sensitive data must be encrypted before being outsourced, rendering traditional data utilization based on plaintext keyword search outdated. As a result, implementing an encrypted cloud data search service is critical. Given the huge number of data users and documents in the cloud, it is critical for the search service to support multi-keyword queries and result similarity ranking in order to meet the effective data retrieval requirement. In this paper propose the Secured Multikeyword Search over Encrypted Cloud Data, which is based On Quality and Usability of cloud data transmission and storage. Further we used triple DES (Data Encryption Standard) Algorithm of encryption and decryption key for secure authentication process. Here we used different key sizes are used in cryptographic process. Our analysis shows that the suggested approach is secure against adaptive chosen-keyword attacks. This solution is highly efficient and ready to be applied in real-world cloud storage systems, and it also achieves better encryption and decryption execution speed. .

Keywords:

0
2021
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles












Turkish Journal of Computer and Mathematics Education

Journal Type :   Uluslararası

Metrics
Article : 1.706
Cite : 106
2023 Impact : 0.071
Turkish Journal of Computer and Mathematics Education