{"title":"A secure and searchable data storage in Cloud computing","authors":"S. Gupta, S. Satapathy, P. Mehta, A. Tripathy","doi":"10.1109/IADCC.2013.6514203","DOIUrl":null,"url":null,"abstract":"The wide adoption of cloud computing is raising several concerns about treatment of data in the cloud. Now a day's Cloud computing is a buzz word and it is still in its infancy in terms of its implementation at all levels due the limitations it suffers. Most of the security schemes require a basic level of trust between the data owner and cloud provider, when this trust is breached either intentionally or unintentionally it is the data and its owner that suffers. Thus, we suggest a scheme where the trust from service provider is not required. The security of data will be in control of the data owner solely. It would mainly contain a tool that would allow the owner of the data to decide about the access rights of his/her data, revocation if any, and notification if any security breaches are in place. This paper also allows a user to search their files in an encrypted database with the help of ranked keyword search which is an improvement over conventional searching techniques.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 3rd IEEE International Advance Computing Conference (IACC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IADCC.2013.6514203","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
The wide adoption of cloud computing is raising several concerns about treatment of data in the cloud. Now a day's Cloud computing is a buzz word and it is still in its infancy in terms of its implementation at all levels due the limitations it suffers. Most of the security schemes require a basic level of trust between the data owner and cloud provider, when this trust is breached either intentionally or unintentionally it is the data and its owner that suffers. Thus, we suggest a scheme where the trust from service provider is not required. The security of data will be in control of the data owner solely. It would mainly contain a tool that would allow the owner of the data to decide about the access rights of his/her data, revocation if any, and notification if any security breaches are in place. This paper also allows a user to search their files in an encrypted database with the help of ranked keyword search which is an improvement over conventional searching techniques.