A Novel User Revocation And Secure Multi Keyword Ranked Search Scheme Over Encrypted Data
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: Cloud Computing is an emerging technology now days in this connection in order to store and share huge volume of data over internet we required Cloud Services like IaaS (Infrastructure as a Service) where it can manage storage and share data securely with reduced cost thus sensitive data should be encrypted before outsource onto public cloud for the sake of users data privacy. As our existing system we noticed some of the privacy challenges over multi-keyword ranked search from the cloud server. i.e user revocation and lack of encryption scheme over index structure. In this paper we proposed a novel policy for user revocation for avoiding user revocation issues for dynamic updation over encrypted data by an authority i.e Trusted Key manager(TKM) which manages keys by Diffie Hellman Algorithms: This algorithm is basically used to generate keys., and Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage systems, because it gives the data owner more direct control on access policies and does not require the data owner to distribute keys. In CP-ABE scheme, there is an authority (TKM) that is responsible for key management. The data owner defines the access policies and encrypts data under the policies using SHA-1 (Symmetric ES). Each user will be issued a secret key according to its attributes. A user can decrypt the ciphertext only when its attributes satisfy the access policies under the fine grained approach scheme.
Authors and Affiliations
Beulah Rani Gorremuchu, Naga Sriharsha Mulugu
A Novel Approach for Workload Optimization and ImprovingSecurity in Cloud Computing Environments
Abstract: This paper discusses a propose cloud infrastructure that combines On-Demand allocation ofresources with improved utilization, opportunistic provisioning of cycles from idle cloud nodes to otherprocesses.B...
A Study of Image Compression Methods
Image compression is now essential for applications such as transmission and storage in data bases. In this paper we review and discuss about the image compression, need of compression, its principles, and types...
Securing Multi-Path Routing Using Trust Management in Heterogeneous Wsn
In this paper we propose a hierarchical dynamic trust management protocol for cluster-based wireless sensor networks. A highly scalable Cluster based trust Management Protocol is implemented to avoid,malicious users in s...
SMS EncryptionUsing One-Time Pad Cipher
Abstract: The content of the SMS is very crucial. It consists of an imperative information. Unknown participants can not retrieve it. To protect the SMS content, the sender must provide the unique characterbefore it is...
A Knowledge-Based HIV/AIDS Framework for Lagos State: AnEmpirical Study
Abstract: This study investigates non-clinical HIV/AIDS activities and explores the efficacy of contemporary EHealthinitiatives, including systems focusing on deployment of healthcare information, telecommunications andi...