6112ICT Research Presentation: Multi-keyword Search on Encrypted Data

Verified

Added on  2023/03/23

|13
|653
|95
Presentation
AI Summary
This presentation outlines a research plan focused on secure multi-keyword ranked search over encrypted cloud data, addressing the growing need for data security in cloud computing environments. It delves into the background of the problem, highlighting the risks of outsourcing sensitive data and the importance of encryption. The literature review examines existing approaches, including completely-homomorphic encryption and searchable encryption schemes, noting their limitations in practicality and computational overhead. The presentation poses research questions regarding the use of cloud platforms, the sufficiency of encryption, and the application of encryption techniques for securing confidential data. It emphasizes the significance of the problem in providing insights into data storage, encryption methods, and the importance of data security. The aims of the research include designing a searchable encryption scheme that supports precise multi-keyword ranked search and dynamic document collection updates. The research strategy involves both primary and secondary research, utilizing qualitative and quantitative methodologies, and employing data gathering techniques such as interviews, questionnaires, and surveys. Finally, it addresses rigor, validity, reliability, and ethical considerations, ensuring the quality and integrity of the research while adhering to ethical principles.
Document Page
RESEARCH
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Background of the problem
Outsourcing various sensitive data to various remote services is an issue
Cloud service providers might access the data that belongs to an organization.
Encryption of data has been chosen as the most reliable way to prevent the issues.
Various researchers have mentioned that data that is not encrypted ha s high
chances to get accessed by hackers.
Document Page
Literature review showing the
relationship to previous works
Researchers have introduced various ways along with completely-homomorphic encryption.
The methods are not considered as practical because of their high computational overhead
for cloud server as well as user (Varghese & Buyya, 2018).
More practical as well as special purpose of solution like searchable encryption had been
introduced.
The schemes allow the clients to store encrypted data in cloud and carry out keyword
search.
Document Page
Research question
How cloud platform can be used by organizations?
Is encryption enough for securing data?
How can organizations use encryption techniques for securing confidential data?
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Significance of the problem
This problems gives an idea on how cloud computing can be used for the purpose of
storing data.
It provides data regarding how encryption can be done in order to secure data.
It provides data regarding why organizations must not trust cloud service providers
blindly (Dembla, Flack & Petter, 2015).
Provides a clear understanding on how cryptography can be used for the purpose of
encryption of data.
Document Page
Aims of the research
Aims in designing a searchable encryption scheme which would support precise
multi keyword ranked search as well as flexible dynamic operation on collection of
documents.
Give a detailed knowledge regarding the encryption techniques used for securing
data (Varghese & Buyya, 2018).
Provide detailed knowledge on how data can be secured in an organization.
Document Page
Contribution
Our contribution in this particular assignment is to carry out research and record
the results obtained from it.
Various research methods had been reviewed and the most reliable ones have been
selected (Dembla, Flack & Petter, 2015).
The qualitative as well as quantitative research methodology has been reviewed
and the one that has chances to produce more results has been selected.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Research strategy, approach and
methodology
The research strategy that would be used for the purpose of carrying out this
research includes primary as well as secondary research strategy.
Primary research would help in carrying out a real life research by interviewing
people and collecting data from them (Dembla, Flack & Petter, 2015).
Secondary research would be carried out by reviewing the data collected from
secondary sources.
Methodologies that would be used include qualitative as well as quantitative.
Document Page
Data gathering and analysis
techniques
Interviews
Questionnaires
Surveys
Observations
Focus group
Ethnography
Oral history and case study
Documents and records
Document Page
Rigor, validity, reliability and
ethics
Reliability and validity includes issues that has been pointed out by quantitative
researchers and advocates.
This research would ensure quality as well as rigour.
It would also apply various ethical principles (Dembla, Flack & Petter, 2015).
It ensures that principles of any individual is not harmed.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Research schedule/timeline
Document Page
References
Dembla, P., Flack, C., & Petter, S. (2015). Extending the DeLone and McLean IS
Success Model to Cloud Computing.
Varghese, B., & Buyya, R. (2018). Next generation cloud computing: New trends and
research directions. Future Generation Computer Systems, 79, 849-861.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]