Algorithm for Multi Keyword Search Over Encrypted Data in Cloud Environment
Citations
References
1,333 citations
"Algorithm for Multi Keyword Search ..." refers background in this paper
...Pascal Paillier, in 1999, proposed the Paillier encryption scheme [2], which is a probabilistic public-key algorithm....
[...]
...For enterprise users, company financial data, government documents, user databases are outsourced, which gives rise to security concerns [2]....
[...]
1,074 citations
"Algorithm for Multi Keyword Search ..." refers background in this paper
...Curtmola [9] proposed two different schemes that achieve optimal search time....
[...]
...In conjunctive multi-keyword search schemes [8,9,10,11,22,26], only the documents that contain all of the query keywords are returned....
[...]
...Some search schemes [8,9,10] require exact keyword matching and therefore have a huge disadvantage in terms of data usability and user compatibility....
[...]
832 citations
"Algorithm for Multi Keyword Search ..." refers background in this paper
...Goldwasser-Micali (GM) [1] proposed an encryption scheme in 1982....
[...]
...Due to these advantages, both individual users and the enterprise users are increasingly outsourcing the data to the cloud [1], instead of spending a significant amount in procuring the required hardware themselves....
[...]
800 citations
"Algorithm for Multi Keyword Search ..." refers background or methods in this paper
...Now use this Kaes to decrypt CT: CT → DecryptionAES + Kaes → PT. 3....
[...]
...The Key Generation, Encryption, and Decryption [11,12] of the data in the cloud environment and checking its integrity after the transfer of data involves three types of efficient algorithms....
[...]
...The homomorphic encryption system consists of mainly three components Key Generation Algorithm, which outputs public key, (Pk) and secret key, (Sk), Encryption Algorithm that takes the public key Pk and a message m and encrypts it to ciphertext c. Decryption Algorithm uses the secret key Sk to convert the ciphertext to message m....
[...]
...While proposing a solution for encrypting data in the cloud, we must keep in mind the various shortcomings for symmetric as well as asymmetric ciphers available [12,13,14,15]....
[...]
705 citations