References
[1]. Artheeswari, S., & Chandrasekaran, R. (2016).
International Data Encryption Algorithm (IDEA) for data
security in cloud. International Journal of Technology and
Engineering, 8(1), 6-11.
[2]. Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano,
G. (2004). Public key encryption with keyword search. In
International Conference on the Theory and Applications
of Cryptographic Techniques (pp. 506-522). Springer,
Berlin, Heidelberg.
[3]. Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014).
Privacy-preserving multi-keyword ranked search over
encrypted cloud data. IEEE Transactions on Parallel and
Distributed Systems, 25(1), 222-233.
[4]. Daemen, J., & Rijmen, V. (2013). The design of
Rijndael: AES- The Advanced Encryption Standard.
Springer Science & Business Media.
[5]. Kaur, N., & Sodhi, S. (2016). Data Encryption Standard
Algorithm (DES) for Secure Data Transmission. In
International Conference on Advances in Emerging
Technology (ICAET) (pp. 31-37).
[6]. Koo, D., Hur, J., & Yoon, H. (2013). Secure and efficient
data retrieval over encrypted data using attribute-based
encryption in cloud storage. Computers & Electrical
Engineering, 39(1), 34-46.
[7]. Lu, W., Varna, A. L., & Wu, M. (2014). Confidentialitypreserving
image search: A comparative study between
homomorphic encryption and distance-preserving
randomization. IEEE Access, 2, 125-141.
[8]. Meharwade, A., & Patil, G. A. (2016). Efficient keyword
search over encrypted cloud data. Procedia Computer
Science, 78, 139-145.
[9]. Miao, Y., Ma, J., Jiang, Q., Li, X., & Sangaiah, A. K.
(2017). Verifiable keyword search over encrypted cloud
data in smart city. Computers & Electrical Engineering,
65, 90-101.
[10]. Nicolett, M., & Kavanagh, K. M. (2011). Magic
quadrant for security information and event
management. Gartner RAS Core Research Note.
[11]. Pitchay, S. A., Alhiagem, W. A. A., Ridzuan, F., &
Saudi, M. M. (2015). A proposed system concept on
enhancing the encryption and decryption method for
cloud computing. In Modelling and Simulation (UKSim),
th 2015 17 UKSim-AMSS International Conference on (pp.
201-205). IEEE.
[12]. Rane, D. D. (2016). Superiority of Twofish over
Blowfish. International Journal of Scientific Research and
Management, 4(11), 4744-4746.
[13]. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A
method for obtaining digital signatures and public-key
cryptosystems. Communications of the ACM, 21(2),
120-126.
[14]. Sahai, A., & Waters, B. (2005). Fuzzy identity-based
encryption. In Annual International Conference on the
Theory and Applications of Cryptographic Techniques
(pp. 457-473). Springer, Berlin, Heidelberg.
[15]. Song, D. X., Wagner, D., & Perrig, A. (2000). Practical
techniques for searches on encrypted data. In Security
and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE
Symposium on (pp. 44-55). IEEE.
[16]. Wang, C., Cao, N., Ren, K., & Lou, W. (2012).
Enabling secure and efficient ranked keyword search
over outsourced cloud data. IEEE Transactions on Parallel
and Distributed Systems, 23(8), 1467-1479.
[17]. Yao, H., Xing, N., Zhou, J., & Xia, Z. (2016). Secure index for resource-constraint mobile devices in cloud
computing. IEEE Access, 4, 9119-9128.
[18]. Yin, H., Qin, Z., Ou, L., & Li, K. (2017). A query privacyenhanced
and secure search scheme over encrypted
data in cloud computing. Journal of Computer and System Sciences, 90, 14-27.
[19]. Yu, J., Lu, P., Zhu, Y., Xue, G., & Li, M. (2013). Toward
secure multikeyword top-k retrieval over encrypted cloud
data. IEEE Transactions on Dependable and Secure
Computing, 10(4), 239-250.