Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryp. Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage. Abstract: Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage.
- Avram MG (2014) Advantages and issues of adopting cloud computing from an business perspective. In: Process of the 7th global meeting interdisciplinarity in engineering, INTER-ENG 2013, vol 12. pp 529-534Search engines Scholar
- Vurukona D, Rao BT (2016) A study on data storage safety issues in cloud processing. In: Cases of 2nchemical international conference on intelligent computing, communication and convergence, ICCC-2016 kept in Bhubaneswar, Odisha, Indian, vol 92. pp 128-135Search engines Scholar
- Shekokar D, Sampat T, Chandawalla C, Shah M (2015) Implementation of fluffy keyword research over encrypted information in cloud processing. In: Proceedings of global meeting on advanced computing technology and programs (ICACTA-2015) kept in Mumbai, India, ISBN: 978-1-5108-0136-3, vol 45. pp 499-505Google College student
- Hegde G, Saritha (2014) Secure fluffy keyword research using an innovative technique over an encrypted cloud information. Int M Eng Comput Sci 3(3): 5102-5104Search engines Scholar
- Mahajan D, Patil G (2016) Study of authentication and consent in cloud processing. Int J Current Innov Styles Comput Commun 4(7):178-180Search engines College student
- Zhao Con, Chen X, Ma H, Tang Q, Zhu L (2012) A new trapdoor-indistinguishable general public key encryption with keyword lookup. J Wirel Mob Netw Ubiquitous Comput Dependable Appl (JoWUA) 3(½):72-81Google Scholar
- Kokane Meters, Jain P, Sarandhar G (2013) Data storage security in cloud computing. Int M Adv Res Comput Commun Eng 2(3):1388-1393Search engines College student
- Singh R, Kumar Beds, Agrahari SK (2012) Ensuring information storage protection in cloud computing. IOSR L Eng 2(12):17-21CrossRefGoogle College student
- Bhardwaj Beds, Jain T, Jain T (2010) Fog up processing: a study of facilities as a program (IAAS). Int M Eng Inf Technol 2(1):60-63Search engines Scholar
- Kulkarni G, Khatawkar G, Gambhir L (2011) Fog up computing-platform as a provider. Int M Eng Adv Technol (IJEAT) 1(2):115-120Search engines Scholar
- Rashmi G Sahoo, Mehfuz H (2013) Securing software as a assistance model of cloud computing: issues and options. Int L Fog up Comput Serv Archit (IJCCSA) 3(4):1-11Search engines Scholar
- Ahmed Michael, Hossain MA (2014) Cloud computing and safety issues in the cloud. Int J Netw Sec Appl (IJNSA) 6(1):25-36Google Scholar
- Barona L, Anita EAM (2017) A study on data breach issues in cloud processing protection: problems and risks. In: Essential meeting on circuit, strength and processing systems (ICCPCT-2017) kept in Kollam, Indian, ISBN: 978-1-5090-4967-7. pp 20-21Search engines College student
- Christina AA (2015) Positive methods on account hijacking in cloud computing network. Oriental L Comput Sci Technol 4(2):31-34Search engines College student
- Yusop ZM, Abawajy JH (2013) Analysis of insiders assault mitigation strategies. In: World conference on creativity, management and technology research kept in Malaysia, vol 129. pp 611-618Google College student
- Watson MR, Shirazi NH, Marnerides AK, Mauthe A new, Hutchison G (2016) Malware detection in cloud computing infrastructures. IEEE Trans Dependable Secure Comput 13(2):192-205CrossRefSearch engines Scholar
- Carlin A new, Hammoudeh Meters, Aldabbas U (2015) Defense for distributed denial of service episodes in cloud computing. In: Essential conference on advanced wireless, info, and conversation technology (AWICT-2015), vol 73. pp 490-497Search engines College student
- Wong Ur (2017) Research on data security technologies based on cloud storage. In: 13th worldwide congress on production and management, (GCMM-2016). pp 1340-1355Search engines Scholar
- Wickramasinghe SKH, Sudesh RMC, Dissanayaka DKGM, Udarini WAN, Hettiarachchi PHAI, Dhammearatchi G (2016) Fog up computing-enhancement of security with regard to encryption and secure APIs. Imp J Interdiscip Res (IJIR) 2(5):690-695Search engines Scholar
- Revalla Meters, Gupta A new, Bhuse V (2013) On delivering user-level information privacy in cloud. In: Actions of the worldwide meeting on cloud safety management, ISBN: 978-1-909507-69-2. pp 106-114Search engines Scholar
- Stallings Watts (2011) Cryptography and system safety: rule and exercise, 5th edn. Pearson, LiverpoolGoogle College student
- Song DX, Wagner Chemical, Perrig A new (2000) Practical techniques for searches on encrypted information. In: Actions of IEEE seminar on security and privacy, ISBN:0-7695-0665-8. pp 44-55Google Scholar
- Wang D, Cao D, Li L, Ren T, Lou WJ (2010) Secure rated keyword search over encrypted cloud information. In: Proceedings of IEEE 30th international meeting on dispersed computing systems (ICDCS). pp 253-262Search engines College student
- Wang Chemical, Cao D, Ren E, Lou WJ (2012) Enabling secure and efficient ranked keyword lookup over outsourced cloud information. IEEE Trans Parallel Distrib Syst 23(8):1467-1479CrossRefGoogle Scholar
- Li E, Zhang W, Yang C, Yu In (2015) Security analysis on one to-many purchase preserving encryption-based cloud data research. IEEE Trans Inf Forensics Secur 10(9):1918-1926CrossRefGoogle College student
- Boneh Chemical, Crescenzo GD, Ostrovsky R, Persiano Gary the gadget guy (2004) Community essential encryption with keyword search. In: Process of eurocrypt, LNCS 3027. pp 506-522Google Scholar
- Ballard M, Kamara T, Monrose F (2005) Attaining efficient conjunctive keyword lookups over encrypted data. In: Cases of 7th international conference on info and marketing communications protection, ICICS 2005 held in Beijing, China, vol 3783 LNCS, ISSN 03029743. pp 414-426Search engines College student
- Pang L, Shen L, Krishnan R (2010) Privacy-preserving similarity-based text message retrieval. ACM Trans Internet Technol (TOIT) 10(1):39-42CrossRefSearch engines College student
- Cao D, Wang Chemical, Li M, Ren T, Lou WJ (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud information. In: Proceedings of IEEE INFOCOM, 2011. pp 829-837Search engines Scholar
- Li M, Wang Queen, Wang Chemical, Cao In, Ren E, Lou WJ (2010) Fluffy keyword search over encrypted data in cloud processing. In: Process of IEEE INFOCOM. pp 1-5Google Scholar
- Khan N, Krishna CR, Khurana A (2014) Protected fuzzy multi-keyword search over outsourced encrypted cloud information. In: Actions of IEEE global meeting on computer and communication technologies (ICCCT). pp 241-249Google Scholar
- Chai Queen, Gong Gary the gadget guy (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud hosts. In: Procedures of IEEE international conference on marketing communications (ICC'12). pp 917-922Search engines College student
- Wang M, Ma H, Tang Queen, Li L, Zhu H, Ma T, Chen A (2012) A fresh efficient verifiable fuzzy keyword lookup scheme. J Wirel Mob Netw Ubiquitous Comput Dependable Appl 3(4):61-71Google College student
- Fu Z ., Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164-172CrossRefSearch engines Scholar
- Satapathy SK, Mishra H, Mishra N (2010) Search technique making use of wildcards or truncation: a threshold rough set clustering strategy. Int L Adv Comput Sci Appl (IJACSA) 1(4):73-77Google Scholar
- Mishra H, Satapathy SK, Mishra N (2009) Improved search technique making use of wildcards or truncation. In: Proceedings of global conference on intelligent agent amp; multi-agent techniques, IAMA 2009. pp. 1-4Google College student
- Kashyap S, Madan In (2015) A review on: network protection and cryptographic protocol. Int L Adv Res Comput Sci Softw Eng 5(4):1414-1418Google Scholar
- P. Krithika, G. Dilipan and Michael. Shobana (2015) Enhancing cloud processing security for information spreading within group associates. IOSR M Comput Eng (IOSR-JCE) 17(2):110-114Search engines College student
- Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES, and RSA for safety. Glob L Comput Sci Technol Netw Web Sec 13(15):15-22Search engines College student
- Preetha M, Nithya Meters (2013) A research and overall performance analysis of RSA criteria. Int M Comput Sci Mob Comput (IJCSMC) 2(6):126-139Google Scholar