An Advanced Scheme to Support Stronger Security By Encrypting The File With Differential Privilege Keys
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
Developing Cloud is registering innovation, giving measured administration and cash putting something aside for individual Users and associations. Information proprietors are exchanging nearby delicate information to payable cloud .before Sending information to cloud it is scrambled for protection. Here presenting information seek over encoded information against plaintext keyword look. Existing work concentrated on single catchphrase inquiry or Boolean watchword look. Present works concentrated on multi keyword seek over scrambled information without protection a break is testing problem. In request to conquer this issue presenting secure knearest neighbour method for protection and Locality delicate hashing based secure record Algorithm which gives quick comparability look over cipher text information. In the long run these procedures are successful and effective regarding correspondence and calculation overhead.
Authors and Affiliations
Tanuku Satyanarayana, P. V. G. K. Jagannadha Raju
An approach of Regression testing for Service Oriented Architecture
Service Oriented Architecture (SOA) is an application architecture in which services are described using a description language. It has changed the way business enterprises with technology with a very fast demand of r...
Coverage Modeling For Verification Of Floating Point Arithmetic Units
Scope displaying is one of the key errands of the confirmation stream in frameworks improvement. The subsequent model is regularly used to assess the advancement and nature of the check process; it likewise gives a v...
Responsive Transmitting For Mobile Adhoc Network Routing Topology
Cooperative communication as became most important research topic for the people in wireless network. Most of the works focuses on the data link layer and physical layer where as ignorance of other layer and network...
Road Crosser Warning Signal System Using Digital Video Image Processing
Object detection is the fundamental step in video analysis in many applications. Existing motion based methods are limited to detect the moving object when coping with dynamic background and non rigid foreground motio...
Secure Group Communication by Establishing a Novel Trust Relationship Model and Detecting Malicious nodes in Peer to Peer Systems
Trust administration in P2P framework is utilized to distinguish vindictive practices and to advance legitimate and agreeable communications. The fundamental objective of the prior P2P frameworks is the capacity of c...