Achieving Privacy and Security In Multi Owner Cloud Using Novel Secure Search Protocol And AES
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 9
Abstract
Cloud computing provide benefits of individual users and organizations which minimizes investment and resource usage cost. Data owners forwarding the data to cloud servers without local data management and data users retrieving the data from cloud. Privacy and security considerations earlier research done only single owner model along with secure search. To download all the encoded information and decrypt them locally. Be that as it may, this technique is clearly unrealistic on the grounds that it will bring about a colossal measure of correspondence overhead. Positioned multi-keyword search will cause substantial calculation and capacity costs.Existing schemes are incurring more communication overhead for secure search and these are supporting only single owner model. We present multi owner model with privacy preserving ranked multi-keyword search for reencrypted cloud data by using AES 256 bit provides privacy of data, keywords and trapdoors. A novel dynamic secret key generation protocol is used to prevent attackers from secret key the fting and acting as valid user. Propose approaches minimizes computation and storage cost along with secure search.
Authors and Affiliations
V. B. T. Rajeswari| Dept. of CSE, Aditya Institute of Science & Technology, Surampalem, Kakinada, E.G.dt, AP, India, R. Srinivas| Dept. of CSE, Aditya Institute of Science & Technology, Surampalem, Kakinada, E.G.dt, AP, India
Pv Based Interline Dynamic Voltage Restoring Device For Mitigation Of Power Quality Problems
Now a days the renewable energy sources importance has increased in the distribution system. In this paper an interline dynamic voltage restorer (IDVR) has proposed for the distribution systems to mitigate voltage sa...
Easing Operative User Steering through Website Construction Development
Designing well-Construction websites to facilitate Operative user Steering has long been a challenge. A primary reason is that the web developers’ understanding of how a website should be Construction can be consid...
A System for Secured Data Retrieval in Hostile Regions using CP-ABE Based in Ad Hoc Disruption- Tolerant Networks
Generally Networks operated in ad hoc mode suffer isolated network connectivity in the Hostile Military environments like battlefield. Deployment of Disruption-tolerant networks (DTN) enhances the connectivity betwee...
A Deniable Cp-Abe Scheme For An Audit-Free Cloud Storage Service
To brawl against outside coercion, we meant to build an encryption scheme that could help cloud storage providers keep away from this quandary. In our move toward, we present cloud storage providers means to create f...
An Algorithm Of Anonymous Id Assignment For Secure Data Sharing On A Network
Existing and new algorithms for assigning anonymous IDs are scrutinized with respect to tradeoffs among communication and computational requirements. An algorithm for distributed solution of certain polynomials over l...