logo

Research Proposal

   

Added on  2023-04-10

6 Pages1282 Words232 Views
Running head: RESEARCH PROPOSAL
Research Proposal
[Name of the Student]
[Name of the University]
[Author note]
Research Proposal_1
1RESEARCH PROPOSAL
Two Key Researchers and Their paper and the reason behind why they are
leading:
The first paper “DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User
Environments” by “Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, and Xiang
Zhang” has been associated with discussing the fact that Dynamic Proof of the storage is very
much useful cryptographic primitive which is generally associated with enabling the users in
becoming capable of checking the integrity of the outsources files and for effective updating of
the files in the cloud servers.
The Second paper that has been selected is “A Secure and Dynamic Multi-keyword
Ranked Search Scheme over Encrypted Cloud Data” by “Zhihua Xia, Xinhui Wang, Xingming
Sun and Qian Wang” has been associated with depicting the fact that because of the increased
popularity of the cloud computing technology, more and more people are associating themselves
with this technology.
Importance of the papers:
The first paper has been associated with depicting the fact that there exists many other
proposals by other researchers related to the numerous dynamic PoS schemes which exists in a
single user environment and besides this the problem generally exists in the multi-user
environments which lacks sufficient investigation. So it is very much essential to make sure that
the practical multi-user cloud storage system needs the secure client side cross-user duplication
technique. This in turn would be associated with allowing the users in skipping the process of
uploading and obtaining of the best ownership of the file immediately whenever the other owners
of the same file are associated with uploading those files to the cloud servers. Besides this from
Research Proposal_2
2RESEARCH PROPOSAL
the paper it can be concluded that there exists no such existing dynamic PoSs that is capable of
supporting the technique. Besides this the paper has also been associated with introducing the
concept of de- duplicatable dynamic proof of the storage and has been associated with proposing
a construction which is efficient and it is known as the DeyPoS. This was mainly proposed for
the purpose of achieving the dynamic PoS and for simultaneous securing of the cross-user
duplication. In addition to all this The challenges has also been considered that are faced by the
structure diversity and the private tag generation, so as to exploit one of the novel tool which is
also known as the Homomorphic Authenticated Tree or the HAT. The paper have been
associated with proving the fact that the security of the construction of the researchers along with
the theoretical analysis and the experimental results are associated with showing the fact that the
construction is very much efficient in practice.
The second paper has been associated with depicting the fact that the data owners are also
motivated for outsourcing their data to the cloud servers so as to achieve great convenience and
for reducing the cost related to managing the data. But despite of all this the data which are
sensitive needs to eb encrypted before they are outsourced for the concerns related to privacy.
This in turn is associated with making the data utilization obsolete such as the keyword-based
retrieval of the document. The paper is also associated with presenting a secure search scheme
which is multi-keyword ranked and this is generally done over the encrypted cloud data which is
simultaneously associated with supporting the dynamic update operations such as the deletion
and the insertion of the documents. The paper has specially emphasized upon the vector space
model along with the TF*IDF model which is the most widely used. These models have been
combined in the construction of the index and for generating the query. Along with all this the
research paper has been associated with the construction of a special tree-based index structure
Research Proposal_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Critical Analysis and Problem Definition Report on Research Methods in IT
|11
|2896
|335

POS Technology: Integrity of Collected Data Research Paper 2022
|15
|4057
|19

Internet of Things in Healthcare: Literature Review and Annotated Bibliography
|9
|2470
|133

International Journal of Computer Science & Information Technology Assignment 2022
|8
|4012
|30

Implementation of Cloud Security for Mobile Computing Environment
|16
|2709
|322

Uber Data Breach Analysis | IT Impact on Business
|8
|2535
|22