A Novel User Revocation And Secure Multi Keyword Ranked Search Scheme Over Encrypted Data
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: Cloud Computing is an emerging technology now days in this connection in order to store and share huge volume of data over internet we required Cloud Services like IaaS (Infrastructure as a Service) where it can manage storage and share data securely with reduced cost thus sensitive data should be encrypted before outsource onto public cloud for the sake of users data privacy. As our existing system we noticed some of the privacy challenges over multi-keyword ranked search from the cloud server. i.e user revocation and lack of encryption scheme over index structure. In this paper we proposed a novel policy for user revocation for avoiding user revocation issues for dynamic updation over encrypted data by an authority i.e Trusted Key manager(TKM) which manages keys by Diffie Hellman Algorithms: This algorithm is basically used to generate keys., and Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage systems, because it gives the data owner more direct control on access policies and does not require the data owner to distribute keys. In CP-ABE scheme, there is an authority (TKM) that is responsible for key management. The data owner defines the access policies and encrypts data under the policies using SHA-1 (Symmetric ES). Each user will be issued a secret key according to its attributes. A user can decrypt the ciphertext only when its attributes satisfy the access policies under the fine grained approach scheme.
Authors and Affiliations
Beulah Rani Gorremuchu, Naga Sriharsha Mulugu
I++Mapreduce: Incremental Mapreduce for Mining the Big Data
Abstract: Data mining is an interdisciplinary area of computer engineering. Incremental processing is a challenging approach to refreshing mining results and it uses saved states to avoid the cost of re computation from...
Cryptanalysis of Efficient Unlinkable Secret Handshakes forAnonymous Communications
Abstract: Several unlinkable secret handshakes schemes have been proposed in recent years. As performingthe successful secret handshakes is essentially equivalent to computing a common key between two interactiveme...
Electricity, Computers, Innovation, Environment and Capacity Building: A Statistical Review
Abstract : The objective was to examine the frameworks needed to foster innovations and to mobilize innovation towards co - creating computers in the context of developing countries’ challenge of unreliable energ...
Real-time Moving Object Detection using SURF
Abstract: Tracking and traffic monitoring are main application of moving Object detection in video. This paperpresents SURF (Speed-Up Robust Features) algorithm and real-time detection of objects using frame difference.T...
Multipath Routing in Wireless Sensor Networks: A Survey and Analysis
Abstract: Due to restricted communication range and high density of sensor nodes in wireless sensor network, forwarding packets is an important field of research in sensor networks. Nowadays, multipath routing appr...