Achieving Privacy and Security In Multi Owner Cloud Using Novel Secure Search Protocol And AES
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 9
Abstract
Cloud computing provide benefits of individual users and organizations which minimizes investment and resource usage cost. Data owners forwarding the data to cloud servers without local data management and data users retrieving the data from cloud. Privacy and security considerations earlier research done only single owner model along with secure search. To download all the encoded information and decrypt them locally. Be that as it may, this technique is clearly unrealistic on the grounds that it will bring about a colossal measure of correspondence overhead. Positioned multi-keyword search will cause substantial calculation and capacity costs.Existing schemes are incurring more communication overhead for secure search and these are supporting only single owner model. We present multi owner model with privacy preserving ranked multi-keyword search for reencrypted cloud data by using AES 256 bit provides privacy of data, keywords and trapdoors. A novel dynamic secret key generation protocol is used to prevent attackers from secret key the fting and acting as valid user. Propose approaches minimizes computation and storage cost along with secure search.
Authors and Affiliations
V. B. T. Rajeswari| Dept. of CSE, Aditya Institute of Science & Technology, Surampalem, Kakinada, E.G.dt, AP, India, R. Srinivas| Dept. of CSE, Aditya Institute of Science & Technology, Surampalem, Kakinada, E.G.dt, AP, India
The Process to disable ADHOC wireless sensor networks by depleting power using routing protocols
The consequence of Vampire attacks on linkstate, distance-vector, source routing and geographic and beacon routing protocols as well as a logical ID-based sensor network routing protocol. Whereas this is by no means...
Restrain On Social Networks From Conjecture Attacks
Online social networks are used by many people. These Social networks allow their members to connect bymeans of various web linkes in which the We study the problem of privacy-preservation in social networks. Now-a-d...
Twitter has drew a large number of users to share and disperse most onward data, bringing about large volumes of information produced systematic. In any case, various applications in Information Retrieval (IR) and Na...
Direct Power Control Algorithm for Electric Traction Systems
In this paper presents a direct power control-based algorithm is used for general filtering and unbalance compensation scheme for electric traction systems. This method can improve the power flow exchange between the...
Improved Converter Design Use of SHE-PWM for Harmonic Immunity in VSC HVDC Transmission
The idea of multilevel inverters, presented around 20 years back involves performing power change in various voltage ventures to get enhanced force quality, lower exchanging misfortunes, better electromagnetic simila...