• Published 2017

Efficient Privacy Preserving Clustering Based Multi Keyword Search

@inproceedings{Agrawal2017EfficientPP,
  title={Efficient Privacy Preserving Clustering Based Multi Keyword Search},
  author={Shital Agrawal and Prof. Bharati Dixit},
  year={2017}
}
1,2Department of Information Engineering, MIT College of Engineering. ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Recently, cloud computing become more popular, data owners shows their interest or prefer the cloud for storing their personal data, by storing data into the cloud save the economical funds and gives the great flexibility. As providing security to the data is the challenging task… CONTINUE READING

Figures from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 12 REFERENCES

Efficient privacy-preserving multi-keyword ranked search utilizing document replication and partition

  • 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)
  • 2015
VIEW 2 EXCERPTS

A hierarchical clustering method for big data oriented ciphertext search

  • 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
  • 2014
VIEW 1 EXCERPT

Privacy - preservingmultikeyword text search in the cloud supporting similaritybased ranking , ”

X. J. Zhu, P. S. Shen, J. K. Hu
  • inProc . 8 th ACM SIGSAC Symp . Inform . , Comput . Commun . Security
  • 2013

Privacy-preservingmulti-keyword text search in the cloud supporting similarity-based ranking,”inProc

W. Sun, B.Wang, +4 authors H. Li
  • 8th ACM SIGSAC Symp.Inform.,Comput. Commun.Security, Hangzhou,China,
  • 2013
VIEW 1 EXCERPT

Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data

  • IEEE Transactions on Parallel and Distributed Systems
  • 2012
VIEW 1 EXCERPT

Privacypreserving multi-keywordranked search over encrypted cloud data

N. Cao, C.Wang, M. Li, K. Ren, andW.J. Lou
  • Proc. IEEE INFOCOM,Shanghai,China, 2011, pp. 829-837.
  • 2011
VIEW 1 EXCERPT

Security analysis of authentication protocols for next-generation mobile and CE cloud services

  • 2011 IEEE International Conference on Consumer Electronics -Berlin (ICCE-Berlin)
  • 2011
VIEW 1 EXCERPT