Open Access Open Access  Restricted Access Subscription Access

Retrieval of Secure Data Using One Time Password

Himanshu verma


Characterization and taking care of the issue of viable and secure positioned catchphrase seek over scrambled cloud information. Positioned look significantly improves framework, ease of use by giving back the coordinating documents in a positioned request with respect to certain pertinence criteria (e.g., catchphrase recurrence), subsequently make one stage nearer towards down to earth organization of privacy-saving information, facilitating administrations in cloud computing. To enhance the security for the information recovery from cloud environment, the onetime password is utilized. The one time password is sent to the client mail to see the unique information. The model shows the querying process over the distributed computing base utilizing secured and encoded data, get to and ranking over the outcomes would advantage the user for the showing signs of improvement results.

Cite this Article
Himanshu Verma. Retrieval of Secure Data Using One Time Password. Recent Trends in Programming Languages. 2016; 3(2): 19–24p.


Ranked search, privacy-preserving, cloud computing, one time password, querying process

Full Text:


References Amazon S3 Availability Event. Jul 20, 2008.

Armbrust M, Fox A, Griffith R, et al. A View of Cloud Computing. Commun ACM. 2010; 53(4): 50–58p.

Arrington M. Gmail Disaster: Reports of Mass Email Deletions. Dec 2006.

Cao N, Wang C, Li M, et al. Privacy-Preserving Multi-key Word Ranked Search Over Encrypted Cloud Data. Proc.

Cloud Security Alliance. Top Threats to Cloud Computing. 2010. http://www.cloudsecurity

Curtmola R, Garay JA, Kamar S, et al. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. Proc.

Cormen TH, Leiserson CE, Rivest RL, et al. Introduction to Algorithms. MIT Press and McGraw-Hill; 2001; 856–887p.

Dubin D. The Most Influential Paper Gerard Salton Never Wrote. Libr Trends. 2004; 52(4): 748–764p.

Wang C, Cao N, Li J, et al. Secure Ranked Keyword Search Over Encrypted Cloud Data. Proc.


  • There are currently no refbacks.