International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Data Leak Identification And Safe Search Over Encrypted Data In Cloud Storage Services

Author :A Mustagees Shaikh, Nitin B.Raut

Article Citation :A Mustagees Shaikh ,Nitin B.Raut , (2016 ) " Data Leak Identification And Safe Search Over Encrypted Data In Cloud Storage Services " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 41-44, Volume-4, Issue-7

Abstract : As we know that cloud computing is used in big IT organization as well as IT enterprises which provide convenient, direct, indirect remote access to data storage and application services that allow users to store their private and sensitive data. In cloud computing many organization notice as well as report that important and sensitive data have been leak repeatedly in recent years in which human mistake is one of the most important reason of data loss. Hence in this paper we represent data leak identification solution to solve this problem and we identify the system requirements and challenges towards achieving privacy assured searchable outsourced cloud data services. This paper present a general methodology for this, using searchable encryption techniques, which allows encrypted data to be searched by users without leaking information about the data itself and users queries. The resulting design is able to facilitate efficient server side ranking without losing keyword privacy. Keywords- Cloud Storage, Data Owner, Data User, Data leak, Network Security, Privacy, Collection Intersection.

Type : Research paper

Published : Volume-4, Issue-7


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-5167   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 66
| Published on 2016-08-17
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY