SlideShare a Scribd company logo
Enviar búsqueda
Cargar
Iniciar sesión
Registrarse
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
Denunciar
IRJET Journal
Seguir
Fast Track Publications
19 de Jan de 2021
•
0 recomendaciones
•
11 vistas
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
19 de Jan de 2021
•
0 recomendaciones
•
11 vistas
IRJET Journal
Seguir
Fast Track Publications
Denunciar
Ingeniería
https://www.irjet.net/archives/V7/i3/IRJET-V7I31122.pdf
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
1 de 3
Descargar ahora
1
de
3
Recomendados
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
30 vistas
•
5 diapositivas
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
32 vistas
•
4 diapositivas
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
56 vistas
•
8 diapositivas
Data integrity proof techniques in cloud storage
IAEME Publication
829 vistas
•
5 diapositivas
Efficient Privacy Preserving Clustering Based Multi Keyword Search
IRJET Journal
38 vistas
•
7 diapositivas
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
11 vistas
•
4 diapositivas
Más contenido relacionado
La actualidad más candente
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
34 vistas
•
4 diapositivas
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
31 vistas
•
3 diapositivas
Secure Data Self-Destructing with Time Constraint in Clouds
IRJET Journal
34 vistas
•
4 diapositivas
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
31 vistas
•
4 diapositivas
Survey on Data Security with Time Constraint in Clouds
IRJET Journal
23 vistas
•
4 diapositivas
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
30 vistas
•
3 diapositivas
La actualidad más candente
(19)
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
•
34 vistas
A Survey on Efficient Privacy-Preserving Ranked Keyword Search Method
IRJET Journal
•
31 vistas
Secure Data Self-Destructing with Time Constraint in Clouds
IRJET Journal
•
34 vistas
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
•
31 vistas
Survey on Data Security with Time Constraint in Clouds
IRJET Journal
•
23 vistas
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
•
30 vistas
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
•
38 vistas
Data Access Control Schemes in Cloud Computing: A Review
IRJET Journal
•
36 vistas
IJARCCE 20
Nahan Rahman
•
211 vistas
H1803035056
IOSR Journals
•
149 vistas
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Fuzzy keyword search over
IEEEMEMTECHSTUDENTPROJECTS
•
450 vistas
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
•
151 vistas
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
•
297 vistas
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
•
526 vistas
An efficient, secure deduplication data storing in cloud storage environment
eSAT Journals
•
134 vistas
Efficient Similarity Search over Encrypted Data
IRJET Journal
•
37 vistas
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
•
297 vistas
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET Journal
•
2 vistas
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
•
69 vistas
Similar a IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
M.E Computer Science Cloud Computing Projects
Vijay Karan
741 vistas
•
15 diapositivas
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
211 vistas
•
15 diapositivas
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
1.3K vistas
•
15 diapositivas
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
0 vistas
•
5 diapositivas
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
6 vistas
•
2 diapositivas
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
102 vistas
•
4 diapositivas
Similar a IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
(20)
M.E Computer Science Cloud Computing Projects
Vijay Karan
•
741 vistas
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
•
211 vistas
M.Phil Computer Science Cloud Computing Projects
Vijay Karan
•
1.3K vistas
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
•
0 vistas
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
•
6 vistas
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
•
102 vistas
Cloud java titles adrit solutions
Adrit Techno Solutions
•
246 vistas
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
•
14 vistas
C04932125
IOSR-JEN
•
362 vistas
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
•
341 vistas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
•
35 vistas
A Novel Method of Directly Auditing Integrity On Encrypted Data
IRJET Journal
•
49 vistas
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
•
524 vistas
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
IRJET Journal
•
4 vistas
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
•
12 vistas
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
•
55 vistas
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
•
162 vistas
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
•
41 vistas
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
•
25 vistas
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
•
41 vistas
Más de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
6 vistas
•
7 diapositivas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
3 vistas
•
7 diapositivas
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
3 vistas
•
5 diapositivas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
2 vistas
•
11 diapositivas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
3 vistas
•
6 diapositivas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
3 vistas
•
5 diapositivas
Más de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
6 vistas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
3 vistas
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
3 vistas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
2 vistas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
3 vistas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
3 vistas
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
2 vistas
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
2 vistas
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 vistas
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
2 vistas
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
2 vistas
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
5 vistas
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
6 vistas
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
2 vistas
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
2 vistas
Understanding the Nature of Consciousness with AI
IRJET Journal
•
2 vistas
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
4 vistas
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
2 vistas
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
2 vistas
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
2 vistas
Último
1st Ansys Technology Day in Athens, Agenda
SIMTEC Software and Services
229 vistas
•
2 diapositivas
UNII II ELECTRICAL SYSTEMS IN BUILDINGS
karthi keyan
32 vistas
•
59 diapositivas
Chapter 9. Classification Advanced Methods.ppt
Subrata Kumer Paul
13 vistas
•
78 diapositivas
Master's Encyclopedia Mohammad Mahdi Farshadian.pdf
Educational Group Mohammad Farshadian
15 vistas
•
1 diapositiva
Airbus A320 Flight Crew Operating Manual.Part 1.pdf
TahirSadikovi
22 vistas
•
921 diapositivas
Building a Digital Thread
TaylorDuffy11
59 vistas
•
54 diapositivas
Último
(20)
1st Ansys Technology Day in Athens, Agenda
SIMTEC Software and Services
•
229 vistas
UNII II ELECTRICAL SYSTEMS IN BUILDINGS
karthi keyan
•
32 vistas
Chapter 9. Classification Advanced Methods.ppt
Subrata Kumer Paul
•
13 vistas
Master's Encyclopedia Mohammad Mahdi Farshadian.pdf
Educational Group Mohammad Farshadian
•
15 vistas
Airbus A320 Flight Crew Operating Manual.Part 1.pdf
TahirSadikovi
•
22 vistas
Building a Digital Thread
TaylorDuffy11
•
59 vistas
Reinforced earth structures notes.pdf
RamyaNarasimhan5
•
93 vistas
UNIT III PRINCIPLES OF ILLUMINATION
karthi keyan
•
25 vistas
A review of IoT-based smart waste level monitoring system for smart cities
nooriasukmaningtyas
•
31 vistas
Introduction to Data Science.pptx
Anusuya123
•
24 vistas
Ansys Technology Day in Budapest, Agenda
SIMTEC Software and Services
•
185 vistas
gdsc info session .pptx
Thestarsahil
•
221 vistas
impulse-and-load-test-rig.pptx
Neometrix_Engineering_Pvt_Ltd
•
15 vistas
DCES_Classroom_Building_100_CDs.pdf
RoshelleStahl1
•
36 vistas
VFD DRIVES TROUBLESHOOTING.pptx
CONTROLS SYSTEMS
•
17 vistas
Google Cloud Study Jam | GDSC NCU
Shivam254129
•
18 vistas
Master's Transcript Mohammad Mahdi Farshadian.pdf
Educational Group Mohammad Farshadian
•
34 vistas
Chapter 8. Classification Basic Concepts.ppt
Subrata Kumer Paul
•
18 vistas
INDIAN KNOWLEDGE SYSTEM PPT chp-1.pptx
RuchiSharma494176
•
48 vistas
Bricks.pptx
SubhamSharma20947
•
15 vistas
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5557 Efficient and Verifiable Queries over Encrypted Data in Cloud Sudha L1, Manoj R2, Prasanth B4, Praveen A4 1 Assistant Professor, Dept. of Computer Science Engineering, S.A.Enginnering college, TN, India 2 Student, Dept. of Computer Science Engineering, S.A.Enginnering college, TN, India 3 Student, Dept. of Computer Science Engineering, S.A.Enginnering college, TN, India 4 Student, Dept. of Computer Science Engineering, S.A.Enginnering college, TN, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -In pursuit ofsecurestrategiesoverencodedcloud data enable an approved client to inquiry information documents of enthusiasm by submitting scrambled question catchphrases to the cloud server in a protection safeguarding way. Practically, the returned question results might be deficient in the exploitative cloud condition. The cloud server may prevent some qualified outcomes to spare computational assets and correspondence overhead. In this manner, a well- functioning Safe Inquiry framework ought to give a question comes about check system that enables the information client to confirm comes about. we outline a protected, effectively incorporated, and fine-grained question comes about confirmation instrument, by which, given an encoded inquiry comes about set, the question client not exclusively can check the rightness of every information record in the set yet in addition can additionally check what number of or which qualified information documents are not returned if the set is inadequate before unscrambling. We accomplishtheobjective by building secure check question for scrambled cloud information. Key Words: searchable symmetric encryption, encrypted cloud data, verification, data dynamic, symmetric-key cryptography. 1.INTRODUCTION Cloud computing provides a way to access applications on the Internet as applications. Itallowsyoutocreate,configure and customize applications online. Public cloudsystemsand services allow for easy access to the public. Public cloudmay be less secure due to its openness, e.g., email. Private Cloud allows you to access systems and services within an organization. It offers increased security due to its unique nature. Community cloud allows organizations and services to access systems and services. Hybrid Cloud is a combination of public and private cloud. However, critical operations are performed using private cloud, while non- critical operations are performed using public cloud. Risks Although Cloud Computing is a great innovationinthe world of computing, therearedownsidestocloudcomputing.Some of them are discussed below: SECURITY & PRIVACY: It is the biggest problem in cloud computing. As data and infrastructure management in cloud is provided by third- party, it is always a risk to handover sensitiveinformation to such providers. Although cloud computing vendors ensure more secure protected accounts, any sign of security breach would result in loss of clients and businesses. LOCK-IN: It is very difficult for the customers to switch from one Cloud Service Provider (CSP) to another. It results in dependency on a particular CSP. ISOLATION FAILURE: This involves the failure of isolation mechanismthatisolatesstorage,memory, routing between the different end users. In a searchprocess, for returned query results that contain multiple encrypted data files, a data user may want to check the correctness of each encrypted data file (thus, he wants to check howmany) or any valid data files on the earth have not been returned if the cloud server deliberately omits some query results, removing the wrong results and retaining the correct ones. This information can be viewed as a hard evidencetopunish the cloud server. Because querying and verification are implemented in an encrypted environment, achieving elegant verification is challenging.Weproposeda secureand elegant query result verification scheme by creating a validation object for encrypted outsourced data files. 2. RELATED WORKS In this paper [8], the authors investigate the searchable encryption problem in the presence of a malicious server, which requires verifiable search to provide users with the ability to detect potential malpractices. Verifiable and dynamically fuzzy keyword search (VDFS) Secure Fuzzy Keyword Search, Program to Provide Update the outsource document collection and authenticity of search results. In this paper [9], a new scheme a novel verifiable fuzzy keyword search scheme over encrypted cloud data is proposed. The Authors construct a linked list for each keyword and generate a fuzzy keyword set. To decrease the computation cost and the storage space, they generate one index vector for each fuzzy keyword set, instead of each fuzzy keyword. Security analysis and experimentevaluation are made to show that the proposed schemes are secureand efficient. In this paper [10], the authors devised a basic cryptographic primitive called as attribute-based keyword search over hierarchical data (ABKS-HD) scheme by using the ciphertext-policy attribute-based encryption (CP-ABE) technique, they also proposed two improved schemes (ABKS-HD-I,ABKS-HD-II) for supporting multi-keyword search and user revocation. General security analysis confirms that these schemes are more secure against both chosen-plaintext attack (CPA) and chosen-keyword attack (CKA). In this paper [11], the authors focus on the aspect of
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5558 cloud storage auditing. They investigate howtodecreasethe damage of the client’s key exposureincloudstorageauditing They redefine the security model of auditing protocol with key-exposure resilience. They developed the binary tree structure and the pre-order traversal technique to update the secret keys for the client. They also develop a novel authenticator construction to support the security. The security and performance results show that the proposed protocol is more secure and efficient. In this paper [12], the authors aim to verify the correctness of the retrieved data in case of fault in cloud server that leads to computational error. This is achieved by designing a new scheme Verifiable Privacy-preserving keyword Search scheme, by integrating homomorphic MAC technique with a privacy-preserving multi-keyword search scheme. This enables the end user to verify the correctness of search result efficiently. In this paper [13], attribute-based encryption is a technique for fine-grained access control of encrypted data in a cloud storage. However, decryption is usually too expensive for end users. So as to reduce overhead involved in decrytion, Green et al. provided a suggestion to outsource the major part of the decryption work without revealing the data or private keys. They proposed a key blinding technique to outsource the decryption without leaking data or secret keys. This paper proposes a method to overcome the above issue by reducing the computational cost and bandwidth to nearly half. In this paper [14], the authors propose publicly auditable cloud data storage canhelpwiththis newcloud the economy is fully established. A trusted company with public auditing skills the expertise and skills that data owners lack are a external audit party to assess the risk of outsourced data when needed. We describe the approaches and system requirements that must be brought consider, and outline such publicly addressedchallengesanauditablesecurecloud storage service is a reality. In this paper [15], the authors propose a Verifiable Ranked Searchable Symmetric Encryption (VRSSE) scheme that allows a user to perform best-K searches on a dynamic file collection while verifying the correctness of the results. VRSSE isconstructedbasedon the ranked inverted index, which has multiple inverted lists that connect sets of file nodes relating the exact keyword. More experiments on real data sets show the efficiency and effectiveness of this proposed scheme. In this paper [6], the author addresses the challenging problem of privacy- protecting multi-core data search on cloud computing (MRSE) encrypted data. We choose the effective harmonic level of "cohesiveness" in a number of different key terms. They first propose a basic idea for MRSE based on secure internal product computation, and then offer two MRSE programs that are significantly improved to meet different stringent privacy requirements in two different threat models. To further enhancethesearchexperienceofthedata search service, these two programs are further expanded to support the search engine. In this paper [7], the author propose a multi-phrase search on encrypted cloud data, which also supports dynamic update functions such as adding or deleting files. The relevant scoreevaluationmodel is used in the search process on the client side to sort the results and protect the privacy of the appropriate data. In this paper [5], the author proposes a seamless, integrated, machine-readable, semantic representation of cloud services, forms, equipment, and their combinations. Portability and portability issues often arise, and this can only worsen if customers choose to use services from different providers. In this study, we propose a seamless, integrated, machine-readable, semantic representation of cloud services, forms, equipment and their combinations. In this paper [4], it is very difficult for Cloud Service Providers (CSPs) to detect and remove such excesses withoutaffecting the quality of service (QoS) because they do not know the actual performance of the business service, but only on IT services. therefore have advanced analytics to solve problems and accelerate real-time cloud adoption for large corporations in the context of meeting (or exceeding) business service level objectives (SLOs) and reducing cloud subscription cost (OPEX) for businesses. In this paper [3], the author offers a verifiable privacy-protecting multi-key text search (MTS) program with similarity-based data to solve this problem. To support multiple keyword searches and search result ranking, we propose to build a time frequency and vector space model based on the cosine similarity measure to achieve higher search result accuracy. In this paper [2], the author proposes a global transformation that will transform any anonymousidentity- based encryption (IBE) program into a secure PEFKS program. Following the general construction, if the main space space is a polynomial scale, we instantiate the first PEFKS program that is proven safe under the KGA. In this Paper [1], the author first identify the difficulties and security problems of live extensions with fully updated data updates from previous works, and then show how to create an elegant verification scheme for seamless integration of these two key features in our protocol design. 3. PROPOSED SYSTEM Secure and elegant query results verification scheme by creating a validation object for encrypted outsourced data files. When the query ends, the query results set together with the corresponding validation object are returned together, by which the query user can accurately verify: 1. The correctness of each encrypted data fileinthe results set, 2. How many eligible data files were not returned and 3. Which eligible data files were not retrieved. Furthermore, our proposed verification scheme is Concrete Safe Query Plans are lightweight and loose-fittingandcan be easily fitted into any secure query program for cloud computing. ADVANTAGE • We propose a verifiablesecuresearchsystemmodel and threat model and design a simple query results verification scheme for secure keyword search in encrypted cloud data.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5559 • We propose a short signature technique based on certified low-key cryptography to ensure the validity of verification objects. • We provide a systematic safety definition and proofand conduct comprehensive performance tests to evaluate the accuracy and effectiveness of our proposed project. 4. CONCLUSIONS We propose a secure, easily integrated, and elegant query results verification scheme for secure search in encrypted cloud data. Different from previous works, our program can verify the correctness of each encrypted query result, or more accurately determine how or what credible data files are returned by a trusted cloud server. A short signature technique is designed to ensure the validity of the verification object. Furthermore, We are designing a secure verification object request mechanism so that the cloud server knows what verification object data is requested by the user and is actually being returned by the user and is actually being returned by the cloud server. Performance and accuracy tests also prove the validity of our propose scheme. REFERENCES [1] Qian Wang, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing” in IEEETRANSACTIONSON PARALLEL ANDDISTRIBUTED SYSTEMS, VOL. 22, NO. 5, MAY 2011. [2] Peng Xu, Hai Jin, “Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack” in IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 11, NOVEMBER 2013. [3] Wenhai Sun, “Verifiable Privacy-Preserving Multi- Keyword Text SearchintheCloudSupportingSimilarity- Based Ranking” in IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 11, NOVEMBER 2014. [4] Jyotiska Nath Khasnabish, Mohammad Firoj Mithani, “Tier-Centric Resource Allocation in Multi-Tier Cloud Systems” DOI: 10.1109/TCC.2015.2424888, IEEE Transactions on Cloud Computing 2015. [5] Beniamino Di Martino, AntonioEspositoandGiuseppina Cretella, “Semantic Representation of Cloud Patterns and Services with Automated Reasoning to support Cloud Application Portability”, DOI: 10.1109/TCC.2015.2433259, IEEE Transactions on Cloud Computing 2015. [6] Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou “Privacy-Preserving Multi KeywordRankedSearchover Encrypted Cloud Data” in IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTEDSYSTEMS,VOL.25,NO.1, JANUARY 2014. [7] C. Guo, X. Chen, Y. M. Jie, Z. J. Fu, M. C. Li and B. Feng, “Dynamic Multi-phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption,” in IEEE Transations on Services Computing, vol. 99, No. 1939, pp. 1-1, 2017. [8] X. Y. Zhu, Q. Liu and G. J. Wang, “A Novel Verifiable and Dynamic Fuzzy KeywordSearchSchemeoverEncrypted Data in Cloud Computing,” presented at the IEEE Trustcom/BigDataSE/ISPA, pp. 845-851, 2017. [9] X. R. Ge, J. Yu, C. Y. Hu, H. L. Zhang and R. Hao, “Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing,” in IEEE Access, vol. 6, pp. 45725-45739, 2018. [10] Y. B. Miao, J. F. Ma, X. M. Liu, X. H. Li, Q. Jiang and J. W. Zhang, “Attribute-based keyword search over hierarchical data in cloud computing,” in IEEE Transactions on Services Computing, doi:10.1109/TSC.2017.2757467, 2017.. [11] Jia Yu, Kui Ren and Vijay Varadharajan “Enabling Cloud Storage Auditing with Key-Exposure Resistance,” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. , NO. , 2014. [12] Zhiguo Wan and Robert H. Deng, “VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data,” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 15, NO. 6, NOVEMBER/DECEMBER 2018 [13] Suqing Lin, Rui Zhang, Hui Ma, and Mingsheng Wang, “Revisiting Attribute-Based Encryption WithVerifiable Outsourced Decryption,” IEEE TRANSACTIONS ON INFORMATION FORENSICSANDSECURITY,VOL.10,NO. 10, OCTOBER 2015 [14] Cong Wang and Kui Ren, Wenjing Lou,Jin Li, “Toward Publicly Auditable Secure Cloud Data Storage Services,” IEEE Network , July/August 2010 [15] Qin Liu, Xiaohong Nie, Xuhui Liu, Tao Peng, and Jie Wu, “VerifiableRankedSearchOverDynamicEncryptedData in Cloud Computing,” 978-1-5386-2704-4/17/$31.00 ©2017 IEEE.