User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 14
 Downloands 2
An Authorized and Efficient Searching Mechanism based on Keywords in Cloud Computing
2022
Journal:  
Turkish Online Journal of Qualitative Inquiry
Author:  
Abstract:

Cloud hosting becomes the main way to store and share information for corporate customers. The ideal method to safeguard trade secrets is to encrypt information before it is downloaded into the cloud, but regular operations such as cloud searching are not feasible. Moreover, since workers have various architectural layers, a high-level employee should be able to see lower-level employee data to see whether such users are violating the law without alerting the employees. The PEKS is a well-known cryptography basis which enables keywords in cryptosystem configurations to be searched without decryption, making it appropriate for safe cloud storage. Unfortunately, no known PEKS scheme allows the monitoring feature without sender permission. We are proposing a hierarchy cryptographically search encoding (HPEKS), as well as PEKS variants, as well as a semi-generic architecture based on PKTree and PEKS plans to solve this problem. We have developed an excellent HPEKS technique called DHPEKS, which combines public and symmetrical key encryption with safe keyword search, to better fit business private data exchange. We show that our DHPEKS technology is safe using the random oracle safety criteria. It guarantees the security of external offline keywords and the transparency property, in order to transmission encrypted data to the organisation, the sender does not need to know the internal hierarchical structure of a company. Theoretical evaluations and detailed testing show that with existing PEKS systems, our DHPEKS system has comparable efficiency.

Keywords:

0
2022
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles












Turkish Online Journal of Qualitative Inquiry

Field :   Eğitim Bilimleri

Journal Type :   Uluslararası

Metrics
Article : 4.283
Cite : 1.091
2023 Impact : 0.002
Turkish Online Journal of Qualitative Inquiry