Loading

Cloud Server Misbehavior Detection Using Ranked Keyword Search Results Verification
A Shiny1, Jayanth Das2, M Venkat Aravind3, C A Anirudh Srivatsaa4, M Rahul5

1A Shiny, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
2Jayanth Das, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
3M Venkat Aravind, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
4C A Anirudh Srivatsaa, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
5M Rahul, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.

Manuscript received on 18 April 2019 | Revised Manuscript received on 25 April 2019 | Manuscript published on 30 April 2019 | PP: 109-111 | Volume-8 Issue-4, April 2019 | Retrieval Number: D6355048419/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: With the rising use and demand of cloud computing, more and more people tend to outsource their data to many cloud servers. Hence data security has become a huge necessity recently. Data owners who store their data in cloud servers must be securely able to manage and distribute their data without any hindrances. Introducing a secure and efficient verification scheme for ranked keyword search by adopting Searchable Symmetric Encryption can efficiently bring about a change in the cloud server environment. This is done so as to manage “honest but curious” cloud servers where doubt of misbehaving is relatively higher. To do this the data verification system is optimized by implementing a searchable symmetric encryption scheme. Now, with a secure exchange gateway the cloud server has less room for misbehaving. The cloud server is only aware that if it’s unscrupulous conduct is recognized, it would be found with a high likelihood.
Keywords: Cloud Security, Data Outsourcing, Data Verification, Encryption.

Scope of the Article: Cloud Security