This paper is published in Volume 3, Issue 3, 2018
Area
Cloud Computing
Author
Baranidharan. U
Co-authors
Naveen Kumar. A, Nagaraj. G, Paulinkumar. M, S. D. Rajkumar
Org/Univ
The Kavery Engineering College, M. Kalipatti, Tamil Nadu, India
Pub. Date
16 March, 2018
Paper ID
V3I3-1170
Publisher
Keywords
Database, Range Query, Privacy Preserving, Cloud Computing

Citationsacebook

IEEE
Baranidharan. U, Naveen Kumar. A, Nagaraj. G, Paulinkumar. M, S. D. Rajkumar. Dual Cloud Secure Keyword Search Scheme with Public Key Encryption, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.

APA
Baranidharan. U, Naveen Kumar. A, Nagaraj. G, Paulinkumar. M, S. D. Rajkumar (2018). Dual Cloud Secure Keyword Search Scheme with Public Key Encryption. International Journal of Advance Research, Ideas and Innovations in Technology, 3(3) www.IJARnD.com.

MLA
Baranidharan. U, Naveen Kumar. A, Nagaraj. G, Paulinkumar. M, S. D. Rajkumar. "Dual Cloud Secure Keyword Search Scheme with Public Key Encryption." International Journal of Advance Research, Ideas and Innovations in Technology 3.3 (2018). www.IJARnD.com.

Abstract

Dual cloud database to realize convenient and low-cost applications and services. In order of services to provide sufficient functionality for SQL queries, many secure database schemes have been proposed. However, such schemes are vulnerable to privacy leakage to a cloud server. The main reason is that database is hosted and processed the cloud server, which is beyond the control of data owners. For the numerical range query (“>”, “<”, etc.), those schemes cannot provide sufficient privacy protection against practical challenges, e.g., privacy leakage of statistical properties, access pattern. Increased the number of queries will inevitably leak more information to the cloud server. dual cloud architecture for protecting the database, with a series of intersection protocols, are provided security preservation to various numeric related range queries. The secure analysis shows privacy of numerical information can strongly protect against dual cloud providers in our projects. Applying the proxy signature technique to manage the group leader can effectively grant the permission of group management to one or more chosen group members can analysis easy located from the different resource. Proxy server encryption techniques most computational operation delegated to Cloud Servers without disclosing the private information. Extensive security and performance analysis are shows that our proposed scheme is highly efficient and satisfies the could later retrieve. Security requirements for public cloud secure sharing the data. Efficient and resilient against loss malicious data modification attack and even server attacks.
Paper PDF