An effective encryption algorithm for multi-keyword-based top-K retrieval on cloud data

Indian Journal of Science and Technology 9 (48):1-5 (2016)
  Copy   BIBTEX

Abstract

Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in CSP Data Security Contrivance to convert the cipher text using a secret-key block cipher of 64-bits. This system is designed to increase security and to improve the transmission performance. Storage-cheating attack model and Privacy-cheating attack model are implemented to protect the data on cloud. Findings: This system increases security and improves transmission performance. The blowfish algorithm is secure against unauthorized attacks and runs faster than the popular existing algorithms. Storage-cheating attack model and Privacy-cheating attack model provides the data confidentiality for data stored in the cloud in higher way. Improvements: The system can be implemented in real cloud system in the future

Other Versions

No versions found

Links

PhilArchive

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
Secure Cloud Storage with Machine Learning-Optimized Attribute-Based Access Control Protocols.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):420-435.
Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
Machine Learning for Optimized Attribute-Based Data Management in Secure Cloud Storage.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-450.

Analytics

Added to PP
2025-02-15

Downloads
42 (#589,244)

6 months
42 (#110,498)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Predicting Insurance Charges Using Machine Learning (14th edition).Vivek Vishwakarma Smith Gholap - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (2):1460-1463.
Cloud Architecture Design Patterns: Best Practices for Scalable and Secure Systems.Nivisha Govindaraj Ram Nivas Duraisamy - 2025 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 12 (3):691-697.
Enhancing Interpretability in Distributed Constraint Optimization Problems.M. Bhuvana Chandra C. Anand - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (1):361-364.
Speech Emotion Recognition using Machine Learning and Librosa.Sivashree S. Pavithra J. - 2025 - International Journal of Advanced Research in Education and Technology 12 (1):224-228.
The Evolution of Immersive Technology: A Comparative Study of Augmented Reality (AR) and Virtual Reality (VR).A. Dhekane Onkar - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (2):1099-1106.

View all 61 citations / Add more citations

References found in this work

No references found.

Add more references