{"title":"Blockchain for Achieving Accountable Outsourcing Computations in Edge Computing","authors":"Karthi P., Menaka S.R., Singaravel G.","doi":"10.9756/bijsesc/v14i1/bij24002","DOIUrl":"https://doi.org/10.9756/bijsesc/v14i1/bij24002","url":null,"abstract":"Since the emergence of cloud computing, data owners are being driven to move their intricate data management systems from on-site locations to private cloud providers in order to take advantage of increased flexibility and cost savings. However, sensitive data must be encrypted before being outsourced in order to safeguard data privacy. This renders outdated the conventional method of using data, which relies on plaintext keyword searches. It is therefore crucial to activate an encrypted cloud data search service. In order to meet the effective data retrieval, need, search services must support multi-keyword queries and offer result similarity rating, given the volume of data users and documents stored in cloud storage. Similar works on searchable encryption seldom distinguish between search results and concentrate on single keyword or Boolean keyword search. I define and solve the difficult problem of privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE) for the first time in this work. I also outline a tight set of privacy requirements that must be met in order for such a safe cloud data utilization system to be implemented.","PeriodicalId":442961,"journal":{"name":"Bonfring International Journal of Software Engineering and Soft Computing","volume":"34 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139385411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Raguman, M. Santhakumar, Thomas X.P, M. Revathi
{"title":"3D Adventure Game Using Unity","authors":"R. Raguman, M. Santhakumar, Thomas X.P, M. Revathi","doi":"10.9756/BIJSESC.9015","DOIUrl":"https://doi.org/10.9756/BIJSESC.9015","url":null,"abstract":"","PeriodicalId":442961,"journal":{"name":"Bonfring International Journal of Software Engineering and Soft Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122314594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Big Data Security and Related Techniques to Improve Security","authors":"R. Gowsalya, Thirumoorthy Dr.P","doi":"10.9756/BIJSESC.9011","DOIUrl":"https://doi.org/10.9756/BIJSESC.9011","url":null,"abstract":"","PeriodicalId":442961,"journal":{"name":"Bonfring International Journal of Software Engineering and Soft Computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122780028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamics User Identification Using Pairwise Client Coupling","authors":"D. Tejaswi, R. Rangasamy","doi":"10.9756/BIJSESC.9023","DOIUrl":"https://doi.org/10.9756/BIJSESC.9023","url":null,"abstract":"","PeriodicalId":442961,"journal":{"name":"Bonfring International Journal of Software Engineering and Soft Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131869137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Block Chain Technology for Privacy Protection for Cloudlet-based Medical Data Sharing","authors":"M. Divya, S. Dr.G.","doi":"10.9756/BIJSESC.9021","DOIUrl":"https://doi.org/10.9756/BIJSESC.9021","url":null,"abstract":"","PeriodicalId":442961,"journal":{"name":"Bonfring International Journal of Software Engineering and Soft Computing","volume":"C-31 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Data Mining Classification Techniques","authors":"S. Gowtham, S. Karuppusamy","doi":"10.9756/BIJSESC.9013","DOIUrl":"https://doi.org/10.9756/BIJSESC.9013","url":null,"abstract":"","PeriodicalId":442961,"journal":{"name":"Bonfring International Journal of Software Engineering and Soft Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115691555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prakritee Dev, Jolly Valour Syiemiong, Olbanisha Lawphniaw, Rinchen D. Bhutia
{"title":"IOT based Accident Preventing and Reporting System","authors":"Prakritee Dev, Jolly Valour Syiemiong, Olbanisha Lawphniaw, Rinchen D. Bhutia","doi":"10.9756/BIJSESC.9014","DOIUrl":"https://doi.org/10.9756/BIJSESC.9014","url":null,"abstract":"","PeriodicalId":442961,"journal":{"name":"Bonfring International Journal of Software Engineering and Soft Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126464892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Data Storage Security Issues in Cloud Computing","authors":"P. Malathi, D. Vanathi","doi":"10.9756/BIJSESC.9012","DOIUrl":"https://doi.org/10.9756/BIJSESC.9012","url":null,"abstract":"","PeriodicalId":442961,"journal":{"name":"Bonfring International Journal of Software Engineering and Soft Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126596411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pollution Monitoring and Controlling System Using Global System for Mobile Communication Network","authors":"S. Kavitha, Dr. S. Sutha","doi":"10.9756/BIJSESC.9020","DOIUrl":"https://doi.org/10.9756/BIJSESC.9020","url":null,"abstract":"","PeriodicalId":442961,"journal":{"name":"Bonfring International Journal of Software Engineering and Soft Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122988805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}