The wide adoption of cloud computing is raising several concerns about treatment of data in the cloud. Now a day's Cloud computing is a buzz word and it is still in its infancy in terms of its implementation at all levels due the limitations it suffers. Most of the security schemes require a basic level of trust between the data owner and cloud provider, when this trust is breached either intentionally or unintentionally it is the data and its owner that suffers. Thus, we suggest a scheme where the trust from service provider is not required. The security of data will be in control of the data owner solely. It would mainly contain a tool that would allow the owner of the data to decide about the access rights of his/her data, revocation if any, and notification if any security breaches are in place. This paper also allows a user to search their files in an encrypted database with the help of ranked keyword search which is an improvement over conventional searching techniques.
Toka ShahienAmany SarhanMahmoud A. M. Alshewimy
Geong Sen PohVishnu Monn BaskaranJi‐Jian ChinMoesfa Soeheila MohamadKay Win LeeDharmadharshni ManiamMuhammad Reza Z’aba