International Journal on Computer Science and Technology (IJCST)
As cloud computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow users to securely search over encrypted data through keywords, these techniques support only Boolean search, without capturing any relevance of data files. This approach suffers from two main drawbacks when directly applied in the context of cloud computing.