Skip to main content
Erschienen in: Wireless Personal Communications 2/2016

01.09.2016

Searchable Encrypted Data File Sharing Method Using Public Cloud Service for Secure Storage in Cloud Computing

verfasst von: R. Pitchai, S. Jayashri, J. Raja

Erschienen in: Wireless Personal Communications | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data owners are used to transmit the data using cloud computing in a low cost. The cloud computing is a popular technology to transmit the data through internet and will also act as third party users. Data owners outsource the data through the cloud server, which have to encrypt the data before outsourcing due to the security and privacy issues. After encrypting the data, users have to find out the respective data using the private key. All information has to be stored in the cloud storage unit. To optimize the cloud storage unit, safety transmission, minimize the cost and searching time, here we have proposed a new scheme as searchable encrypted data file sharing technique. This technique will allocate a keyword for every data during the encryption based on which the keyword matching will accept the data of respective users. The multi keyword search is been proposed for keyword searching. Experimental results analyze the overall performance and the proposed scheme has not only increased the efficiency but also decreased the searching time.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abolfazli, S., Sanaei, Z., Tabassi, A., Rosen, S., Gani, A., & Khan, S. U. (2015). Cloud adoption in Malaysia: Trends, opportunities, and challenges. Cloud Computing, IEEE, 2(1), 60–68.CrossRef Abolfazli, S., Sanaei, Z., Tabassi, A., Rosen, S., Gani, A., & Khan, S. U. (2015). Cloud adoption in Malaysia: Trends, opportunities, and challenges. Cloud Computing, IEEE, 2(1), 60–68.CrossRef
2.
Zurück zum Zitat Akgün, M., Bayrak, A. O., Ozer, B., & Sağıroğlu, M. Ş. (2015). Privacy preserving processing of genomic data: A survey. Journal of Biomedical Informatics, 56, 103–111.CrossRef Akgün, M., Bayrak, A. O., Ozer, B., & Sağıroğlu, M. Ş. (2015). Privacy preserving processing of genomic data: A survey. Journal of Biomedical Informatics, 56, 103–111.CrossRef
3.
Zurück zum Zitat Gajra, N., Khan, S. S., & Rane, P. (2015). Private cloud security: Secured user authentication by using enhanced hybrid algorithm. In 2015 IEEE Electrical insulation conference (EIC) (pp. 1–6). IEEE, 2015. Gajra, N., Khan, S. S., & Rane, P. (2015). Private cloud security: Secured user authentication by using enhanced hybrid algorithm. In 2015 IEEE Electrical insulation conference (EIC) (pp. 1–6). IEEE, 2015.
4.
Zurück zum Zitat Guo, C., Song, Q., Zhuang, R., & Feng, B. (2015). RSAE: Ranked keyword search over asymmetric encrypted cloud data. In 2015 IEEE fifth international conference on big data and cloud computing (BDCloud) (pp. 82–86). IEEE, 2015. Guo, C., Song, Q., Zhuang, R., & Feng, B. (2015). RSAE: Ranked keyword search over asymmetric encrypted cloud data. In 2015 IEEE fifth international conference on big data and cloud computing (BDCloud) (pp. 82–86). IEEE, 2015.
5.
Zurück zum Zitat Hasan, R., & Zawoad, S. (2015). Privacy in the cloud. In S. Zeadally, B. Mohamad (Eds.), Privacy in a digital, networked world, USA: Springer. Hasan, R., & Zawoad, S. (2015). Privacy in the cloud. In S. Zeadally, B. Mohamad (Eds.), Privacy in a digital, networked world, USA: Springer.
6.
Zurück zum Zitat Hu, Y., Peng, C., & Bai, G. (2015). Sharing health data through hybrid cloud for self-management. In 2015 IEEE international conference on multimedia and expo workshops (ICMEW) (pp. 1–6). IEEE, 2015. Hu, Y., Peng, C., & Bai, G. (2015). Sharing health data through hybrid cloud for self-management. In 2015 IEEE international conference on multimedia and expo workshops (ICMEW) (pp. 1–6). IEEE, 2015.
7.
Zurück zum Zitat Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., & Wong, D. S. (2015). L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing. Knowledge-Based Systems, 79, 18–26.CrossRef Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., & Wong, D. S. (2015). L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing. Knowledge-Based Systems, 79, 18–26.CrossRef
8.
Zurück zum Zitat Liu, Z., Weng, J., Li, J., Yang, J., Fu, C., & Jia, C. (2015). Cloud-based electronic health record system supporting fuzzy keyword search. Soft Computing, 1–13. Liu, Z., Weng, J., Li, J., Yang, J., Fu, C., & Jia, C. (2015). Cloud-based electronic health record system supporting fuzzy keyword search. Soft Computing, 1–13.
9.
Zurück zum Zitat Magalhães, D., Calheiros, R. N., Buyya, R., & Gomes, D. G. (2015). Workload modeling for resource usage analysis and simulation in cloud computing. Computers & Electrical Engineering, 47, 69–81.CrossRef Magalhães, D., Calheiros, R. N., Buyya, R., & Gomes, D. G. (2015). Workload modeling for resource usage analysis and simulation in cloud computing. Computers & Electrical Engineering, 47, 69–81.CrossRef
10.
Zurück zum Zitat Ohmann, C., Canham, S., Danielyan, E., Robertshaw, S., Legré, Y., Clivio, L., & Demotes, J. (2015). ‘Cloud computing’ and clinical trials: report from an ECRIN workshop. Trials, 16(1), 1–4.CrossRef Ohmann, C., Canham, S., Danielyan, E., Robertshaw, S., Legré, Y., Clivio, L., & Demotes, J. (2015). ‘Cloud computing’ and clinical trials: report from an ECRIN workshop. Trials, 16(1), 1–4.CrossRef
11.
Zurück zum Zitat Popescu, C. (2015). Autonomous systems for telemedicine. In 2015 Ninth international conference on complex, intelligent, and software intensive systems (CISIS) (pp. 297–301). IEEE, 2015. Popescu, C. (2015). Autonomous systems for telemedicine. In 2015 Ninth international conference on complex, intelligent, and software intensive systems (CISIS) (pp. 297–301). IEEE, 2015.
12.
Zurück zum Zitat Preethi, B., Shahin, M., & RamaDevi, K. (2015). Synonym query using multi-keyword search using cloud computing. International Journal of Advanced Engineering, 1(3), 192–195. Preethi, B., Shahin, M., & RamaDevi, K. (2015). Synonym query using multi-keyword search using cloud computing. International Journal of Advanced Engineering, 1(3), 192–195.
13.
Zurück zum Zitat Ranjan, R., Buyya, R., Nepal, S., & Georgakopulos, D. (2015). A note on resource orchestration for cloud computing. Concurrency and Computation: Practice and Experience, 27(9), 2370–2372.CrossRef Ranjan, R., Buyya, R., Nepal, S., & Georgakopulos, D. (2015). A note on resource orchestration for cloud computing. Concurrency and Computation: Practice and Experience, 27(9), 2370–2372.CrossRef
14.
Zurück zum Zitat Raghavendra, S., Geeta, C. M., Shaila, K., Buyya, R., Venugopal, K. R., Iyengar, S. S., & Patnaik, L. M. (2015). MSSS: Most significant single-keyword search over encrypted cloud data. In 6th annual international conference on ICT: Big data, cloud and security (ICT-BDCS 2015) (pp. 43–48). Raghavendra, S., Geeta, C. M., Shaila, K., Buyya, R., Venugopal, K. R., Iyengar, S. S., & Patnaik, L. M. (2015). MSSS: Most significant single-keyword search over encrypted cloud data. In 6th annual international conference on ICT: Big data, cloud and security (ICT-BDCS 2015) (pp. 43–48).
15.
Zurück zum Zitat Samad, J., Loke, S.W., Reed. K. (2015) Mobile Cloud Computing. In da Fonseca N. L. S. & Boutaba. R (Eds.), Cloud Services, Networking, and Management, John Wiley & Sons: Hoboken, NJ. Samad, J., Loke, S.W., Reed. K. (2015) Mobile Cloud Computing. In da Fonseca N. L. S. & Boutaba. R (Eds.), Cloud Services, Networking, and Management, John Wiley & Sons: Hoboken, NJ.
16.
Zurück zum Zitat Shankarwar, M. U. & Pawar, A. V. (2015). Security and privacy in cloud computing: A survey. In Proceedings of the 3rd international conference on frontiers of intelligent computing: Theory and applications (FICTA) 2014 (pp. 1–11). Springer. Shankarwar, M. U. & Pawar, A. V. (2015). Security and privacy in cloud computing: A survey. In Proceedings of the 3rd international conference on frontiers of intelligent computing: Theory and applications (FICTA) 2014 (pp. 1–11). Springer.
17.
Zurück zum Zitat Xia, Q., Ni, J., Kanpogninge, A. J. B. A., & Gee, J. C. (2015). Searchable public-key encryption with data sharing in dynamic groups for mobile cloud storage. Journal of Universal Computer Science, 21(3), 440–453. Xia, Q., Ni, J., Kanpogninge, A. J. B. A., & Gee, J. C. (2015). Searchable public-key encryption with data sharing in dynamic groups for mobile cloud storage. Journal of Universal Computer Science, 21(3), 440–453.
18.
Zurück zum Zitat Xu, Y., Li, M., Hu, X., Wang, Y., & Zhang, H. (2016) Survey on privacy preserving for intelligent business recommendation in cloud In Q.-A. Zeng (Ed.,) Wireless communications, networking and applications, India: Springer. Xu, Y., Li, M., Hu, X., Wang, Y., & Zhang, H. (2016) Survey on privacy preserving for intelligent business recommendation in cloud In Q.-A. Zeng (Ed.,) Wireless communications, networking and applications, India: Springer.
19.
Zurück zum Zitat Xue, H., Inati, S., Sørensen, T. S., Kellman, P., & Hansen, M. S. (2015). Distributed MRI reconstruction using gadgetron-based cloud computing. Magnetic Resonance in Medicine, 73(3), 1015–1025.CrossRef Xue, H., Inati, S., Sørensen, T. S., Kellman, P., & Hansen, M. S. (2015). Distributed MRI reconstruction using gadgetron-based cloud computing. Magnetic Resonance in Medicine, 73(3), 1015–1025.CrossRef
20.
Zurück zum Zitat Zickau, S., Beierle, F., & Denisow, I. (2015). Securing mobile cloud data with personalized attribute-based meta information. In 2015 3rd IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud) (pp. 205–210). IEEE, 2015. Zickau, S., Beierle, F., & Denisow, I. (2015). Securing mobile cloud data with personalized attribute-based meta information. In 2015 3rd IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud) (pp. 205–210). IEEE, 2015.
Metadaten
Titel
Searchable Encrypted Data File Sharing Method Using Public Cloud Service for Secure Storage in Cloud Computing
verfasst von
R. Pitchai
S. Jayashri
J. Raja
Publikationsdatum
01.09.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2016
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3273-1

Weitere Artikel der Ausgabe 2/2016

Wireless Personal Communications 2/2016 Zur Ausgabe

Neuer Inhalt