Security Model for Preserving Privacy over Encrypted Cloud ComputingReport as inadecuate




Security Model for Preserving Privacy over Encrypted Cloud Computing - Download this document for free, or read online. Document in PDF available to download.

In our today’s life, it is obvious that cloud computing is one of the new and most important innovations in the field of information technology which constitutes the ground for speeding up the development in great size storage of data as well as the processing and distribution of data on the largest scale. In other words, the most important interests of any data owner nowadays are related to all of the security as well as the privacy of data, especially in the case of outsourcing private data on a cloud server publicly which has not been one of the well-trusted and reliable domains. With the aim of avoiding any leakage or disclosure of information, we will encrypt any information important or confidential prior to being uploaded to the server and this may lead to an obstacle which encounters any attempt to support any efficient keyword query to be and ranked with matching results on such encrypted data. Recent researches conducted in this area have focused on a single keyword query with no proper ranking scheme in hand. In this paper, we will propose a new model called Secure Model for Preserving Privacy Over Encrypted Cloud Computing SPEC to improve the performance of cloud computing and to safeguard privacy of data in comparison to the results of previous researches in regard to accuracy, privacy, security, key generation, storage capacity as well as trapdoor, index generation, index encryption, index update, and finally files retrieval depending on access frequency.

KEYWORDS

Cloud Computing, Multi-Keyword Query, Ranked Query, Trapdoor, Privacy Preserving, Encrypted Cloud Data, Top-K Query, Cloud Security

Cite this paper

Mlgheit, J. , Houssein, E. and Zayed, H. 2017 Security Model for Preserving Privacy over Encrypted Cloud Computing. Journal of Computer and Communications, 5, 149-165. doi: 10.4236-jcc.2017.56009.





Author: Jassim R. Mlgheit1, Essam H. Houssein2, Hala H. Zayed1

Source: http://www.scirp.org/



DOWNLOAD PDF




Related documents