{"title":"SK-IR:云端传感器数据的安全关键字检索","authors":"M. Sumalatha, K. Praveenraj, C. Selvakumar","doi":"10.1109/ICRTIT.2013.6844227","DOIUrl":null,"url":null,"abstract":"The sensor data are collected in regular interval and securely stored in cloud. In order to provide security this research work aims in proposing SK-IR: secured keyword based retrieval. In security mechanism the symmetric key encryption scheme AES is being used to secure the sensor data. The data are retrieved from cloud based on its keywords, scores and file location which are available in the posting list. The hash function is implemented to the posting list to enhance the security. The posting lists are stored in unknown cloud server location and it protects the data from getting hacked. In this paper we studied the performance of encryption methodology over unstructured database by choosing Hbase/Hadoop platform. Since HBase can handle the huge volume, variety, and complexity of data used on the Hadoop platform.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"SK-IR: Secured keyword based retrieval of sensor data in cloud\",\"authors\":\"M. Sumalatha, K. Praveenraj, C. Selvakumar\",\"doi\":\"10.1109/ICRTIT.2013.6844227\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The sensor data are collected in regular interval and securely stored in cloud. In order to provide security this research work aims in proposing SK-IR: secured keyword based retrieval. In security mechanism the symmetric key encryption scheme AES is being used to secure the sensor data. The data are retrieved from cloud based on its keywords, scores and file location which are available in the posting list. The hash function is implemented to the posting list to enhance the security. The posting lists are stored in unknown cloud server location and it protects the data from getting hacked. In this paper we studied the performance of encryption methodology over unstructured database by choosing Hbase/Hadoop platform. Since HBase can handle the huge volume, variety, and complexity of data used on the Hadoop platform.\",\"PeriodicalId\":113531,\"journal\":{\"name\":\"2013 International Conference on Recent Trends in Information Technology (ICRTIT)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Recent Trends in Information Technology (ICRTIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRTIT.2013.6844227\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRTIT.2013.6844227","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SK-IR: Secured keyword based retrieval of sensor data in cloud
The sensor data are collected in regular interval and securely stored in cloud. In order to provide security this research work aims in proposing SK-IR: secured keyword based retrieval. In security mechanism the symmetric key encryption scheme AES is being used to secure the sensor data. The data are retrieved from cloud based on its keywords, scores and file location which are available in the posting list. The hash function is implemented to the posting list to enhance the security. The posting lists are stored in unknown cloud server location and it protects the data from getting hacked. In this paper we studied the performance of encryption methodology over unstructured database by choosing Hbase/Hadoop platform. Since HBase can handle the huge volume, variety, and complexity of data used on the Hadoop platform.