Skip navigation


Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/2098
Title: Encrypted graph based Keyword searching Technique
Issue Date: 1-Dec-2018
Abstract: In this era cloud computing is widely used by many users, so the computing and storage services are moving from cloud to edges. In edge computing, data is processed by the device itself or by a local computer or server, rather than being transmitted to a data centre. To deal with this problem the proposed system provides solutions of data encryption at data owner side before outsourcing. If data owner is valid then cloud service provider will send the tokens to data owner and data owner will be able to outsource the data. Also, user can find appropriate file by using keyword search rather than searching by file name. The proposed system provides a searching technique called K-Nearest Keyword searching algorithm to search the file keyword instead of file name. If any user wants to read or access the data, the user will send request to data owner. At the time of registration user will be authenticated by service provider using K-Map method. After the confirmation of valid user, service provider sends request to data owner for accessing data and approval will be given by data owner.Then user will be able to download the original data by using K-Map secret key. Index term: Keyword searching, edge computing, K-Map
URI: http://192.168.3.232:8080/jspui/handle/123456789/2098
ISSN: 2278-8719
Appears in Collections:2019

Files in This Item:
File Description SizeFormat 
IT_paper2.pdf255.93 kBUnknownView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.