• Publications
    • Current Issue
    • Volume I
      • issue i
      • issue ii
      • issue iii
      • issue iv
    • Volume II
      • issue i
      • issue ii
      • issue iii
      • issue iv
    • Volume III
      • issue i
      • issue ii
      • issue iii
      • issue iv
    • Volume IV
      • issue i
      • issue ii
      • issue iii
      • issue iv
    • Volume V
      • issue i
      • issue ii
      • issue iii
      • issue iv
    • Volume VI
      • issue i
      • issue ii
      • issue iii
      • issue iv
  • Submission
    • Procedure
    • Downloads
    • Payment
    • Support
  • Editors
  • Home
  • Contact Us
  • Publications
    • Current Issue
    • Volume I
      • issue i
      • issue ii
      • issue iii
      • issue iv
    • Volume II
      • issue i
      • issue ii
      • issue iii
      • issue iv
    • Volume III
      • issue i
      • issue ii
      • issue iii
      • issue iv
    • Volume IV
      • issue i
      • issue ii
      • issue iii
      • issue iv
    • Volume V
      • issue i
      • issue ii
      • issue iii
      • issue iv
    • Volume VI
      • issue i
      • issue ii
      • issue iii
      • issue iv
  • Submission
    • Procedure
    • Downloads
    • Payment
    • Support
  • Editors
  • Home
  • Contact Us
Toggle panel Social icons
issue iii

Paper 02

by LogicInside in issue iii

Paper-02 | Reg. No.:20161202|DOI:V5I3P02

Search over Encrypted Data in Synonym Based Keyword Form

Prof. Siddhesh Vaidya,Prof. Sanjay Shimpi,Prof. Vijay Patil -Vidyalankar Polytechnic
Mumbai, India

Cloud computing has many attractive countenance, because of those countenance; it has become much easier to store large amount of data on it. Hence, preserving the data on cloud helps user to access the data from any place whenever it is needed. Thus due to the vast data, a very big concern emerges i.e. security and privacy. Encryption helps user to prevent their data from illegal access and thus it improves effectualness, but also convolutes some of the fundamental features. In this study, we propose an effectual scheme for similarity search and semantic search over encrypted data.

 

Download

LogicInsidePost author

Click here to cancel reply.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

XHTML: You can use these tags <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

All Publications

  • Volume I (47)
    • issue i (11)
    • issue ii (11)
    • issue iii (10)
    • issue iv (15)
  • Volume II (54)
    • issue i (8)
    • issue ii (12)
    • issue iii (9)
    • issue iv (25)
  • Volume III (39)
    • issue i (13)
    • issue ii (9)
    • issue iii (9)
    • issue iv (8)
  • Volume IV (43)
    • issue i (8)
    • issue ii (7)
    • issue iii (17)
    • issue iv (11)
  • Volume V (31)
    • issue i (9)
    • issue ii (5)
    • issue iii (3)
    • issue iv (14)
  • Volume VI (4)
    • issue i (2)
    • issue iii (1)
    • issue iv (1)
Popular
Recent
Paper 01

Paper 09

Paper 08

Paper 07

Paper 06

Paper 01

Paper 01

Paper 01

Paper 02

Paper 01

Quick Links

  • Procedure
  • Downloads
  • Payment
  • Support

Facebook Page

Published By

About Us

LogicInside techno lab. is a Technical Eductional Institute. It is Serving Engineering Students Since 2002. It is Well Known for It's Quality Education and Hence is ISO 9001:2008 Certified.

Contact Us

229-Ecstasy Business Park, Mulund(W), Mumbai, Maharashtra 400080

+919820589783, +919820889793

E-Mail: logicinside@gmail.com

© Copyright 2017 : LogicInside techno lab.