An Advanced Scheme to Support Stronger Security By Encrypting The File With Differential Privilege Keys
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
Developing Cloud is registering innovation, giving measured administration and cash putting something aside for individual Users and associations. Information proprietors are exchanging nearby delicate information to payable cloud .before Sending information to cloud it is scrambled for protection. Here presenting information seek over encoded information against plaintext keyword look. Existing work concentrated on single catchphrase inquiry or Boolean watchword look. Present works concentrated on multi keyword seek over scrambled information without protection a break is testing problem. In request to conquer this issue presenting secure knearest neighbour method for protection and Locality delicate hashing based secure record Algorithm which gives quick comparability look over cipher text information. In the long run these procedures are successful and effective regarding correspondence and calculation overhead.
Authors and Affiliations
Tanuku Satyanarayana, P. V. G. K. Jagannadha Raju
Implementation of Grid Based Distributed 3P4W System Using ANFIS Control
The increase in global energy demand and load demand, the Renewable Energy Sources (RES) are increasingly connected in the distribution systems which utilises power electronics Converters/Inverters. This paper sugges...
Improved Routing Mechanism for Enhancing Mobile Adhoc Network By Using Elliptic Curve Algorithm
In mobile adhoc network routing optimization along with security is enhancing. Mobile adhoc networks have constantly changing topologies; hence several routing protocols must satisfy the challenge of link quality, de...
Speech Controlled Automatic Slide Change
The main objective of this paper is to control the power point presentation slides through speech. Initially the commands for moving the slides are given to the computer using the microphone. The voice signals are recor...
Estimation of Complexity of the Regenerator Placement Problem in Optical Networks
Placement of regenerators in optical networks has attracted the attention of recent research works in optical networks. In this problem, we are given a network with an underlying topology of a graph and with a set o...
Securing a Network by Modeling and Containment of Worms Using Preference Scanning
Self-propagating codes, called worms. In this paper, we present an inclination branching process model for characterizing the propagation of Internet worms. Basically user knows the name and the definition of worms, b...