The algorithm is as follows. Firstly the cloud user

The searchable encryption utilizes a similar application of keyword
search provided by the

 workers
hence it could be said that the searchable encryption depends on the
availability of the keyword search application offered by the

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

workers. Multi-keyword search management
tends to be cumbersome if it is done manually. In order to automate the
multi-keyword search management we need a common syntax and a common searchable
encryption to interoperate. Here, we introduce the searchable encryption
through the Elliptical curve cryptographic method. The working of the B+ tree
search algorithm is as follows.

Firstly the cloud user will upload the contents on to the cloud.
Whenever the user wants to retrieve the data based on the user’s requirement,
the user will search through the documents with the set of keywords and
retrieves the required document. The user may input many keywords to search a
document. The set of all multi-keyword search is represented by

. The

represents the

search keyword in many keywords. The tree
structure algorithm consists of the encrypted tree data

, the encrypted keyword contents

 and the tree builder function

. The

 is
derived from both the encrypted tree data

 and the encrypted keyword contents

of the Tree Structure Algorithm (TSA).

 is the contents derived from the

 of

 by the tree builder function

. The tree builder function
extracts all the related keywords of

 present in the encrypted tree data

 of
the TSA.

The searchable encryption utilizes a similar application of keyword
search provided by the

 workers
hence it could be said that the searchable encryption depends on the
availability of the keyword search application offered by the

workers. Multi-keyword search management
tends to be cumbersome if it is done manually. In order to automate the
multi-keyword search management we need a common syntax and a common searchable
encryption to interoperate. Here, we introduce the searchable encryption
through the Elliptical curve cryptographic method. The working of the B+ tree
search algorithm is as follows.

Firstly the cloud user will upload the contents on to the cloud.
Whenever the user wants to retrieve the data based on the user’s requirement,
the user will search through the documents with the set of keywords and
retrieves the required document. The user may input many keywords to search a
document. The set of all multi-keyword search is represented by

. The

represents the

search keyword in many keywords. The tree
structure algorithm consists of the encrypted tree data

, the encrypted keyword contents

 and the tree builder function

. The

 is
derived from both the encrypted tree data

 and the encrypted keyword contents

of the Tree Structure Algorithm (TSA).

 is the contents derived from the

 of

 by the tree builder function

. The tree builder function
extracts all the related keywords of

 present in the encrypted tree data

 of
the TSA.