Loading

A Privacy-Preserving Protocol for Verifiable File Search on the Cloud
K Sai Keerthana1, AHarshavardhan2, D Ramesh3

1K Sai Keerthana, Assistant Professor, M.Tech Student, Department of Computer Science and Engineering, S R Engineering College, Warangal, Telangana, India.

2A Harshavardhan, Assistant Professor, Department of Computer Science and Engineering, S R Engineering College, Warangal, Telangana, India.

3D Ramesh, Assistant Professor, Department of Computer Science and Engineering, S R Engineering College, Warangal, Telangana, India.

Manuscript received on 08 April 2019 | Revised Manuscript received on 15 April 2019 | Manuscript Published on 26 July 2019 | PP: 476-479 | Volume-8 Issue-6S4 April 2019 | Retrieval Number: F10990486S419/19©BEIESP | DOI: 10.35940/ijitee.F1099.0486S419

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Because cloud computing is increasingly popular, a great deal of documentation is outsourced to the cloud with decreased leadership costs and easy access. While encryption helps prevent user data confidentiality, it creates a difficult issue with well-functioning yet virtually efficient safe search features over encrypted information. It should always be encrypted before cloud outsourcing to preserve the privacy of personal documents that are stored in the cloud environment. Retrieving the same data on the cloud is also a still, tedious task. To obtain information, there are several methods available in which keyword-enabled data entry is one of the best methods. Most of these methods are restricted to the handling of a single keyword query. In order to improve search effectiveness and speed, a multi-key word-search method can be used to obtain a respective cloud.

Keywords: File Search, Verifiability, Cloud Computing, MAC.
Scope of the Article: Computer Science and Its Applications