Algorithm for Multi Keyword Search Over Encrypted Data in Cloud Environment
Citations
References
526 citations
"Algorithm for Multi Keyword Search ..." refers methods in this paper
...The solution uses RSA to overcome limitations [20,21,22] of key exchange, AES, to efficiently encrypt a large quantity of data, which is a necessity for cloud storage and SHA-3 hashing to ensure data integrity [23,234,25]....
[...]
407 citations
"Algorithm for Multi Keyword Search ..." refers background or methods in this paper
...The solution uses RSA to overcome limitations [20,21,22] of key exchange, AES, to efficiently encrypt a large quantity of data, which is a necessity for cloud storage and SHA-3 hashing to ensure data integrity [23,234,25]....
[...]
...In conjunctive multi-keyword search schemes [8,9,10,11,22,26], only the documents that contain all of the query keywords are returned....
[...]
340 citations
329 citations
"Algorithm for Multi Keyword Search ..." refers background in this paper
...Now use this Kaes to decrypt CT: CT → DecryptionAES + Kaes → PT. 3....
[...]
...In conjunctive multi-keyword search schemes [8,9,10,11,22,26], only the documents that contain all of the query keywords are returned....
[...]
...The Key Generation, Encryption, and Decryption [11,12] of the data in the cloud environment and checking its integrity after the transfer of data involves three types of efficient algorithms....
[...]
...The homomorphic encryption system consists of mainly three components Key Generation Algorithm, which outputs public key, (Pk) and secret key, (Sk), Encryption Algorithm that takes the public key Pk and a message m and encrypts it to ciphertext c. Decryption Algorithm uses the secret key Sk to convert the ciphertext to message m....
[...]
314 citations
"Algorithm for Multi Keyword Search ..." refers methods in this paper
...While proposing a solution for encrypting data in the cloud, we must keep in mind the various shortcomings for symmetric as well as asymmetric ciphers available [12,13,14,15]....
[...]