Catch You If You Lie: Search Results Verification in Cloud Computing Based on Keyword Encryption

Abstract

As an essential information use, secure Pivotal word scan again encrypted cloud information need pulled in those enthusiasm about a number scientists. This is the reason scientists expect that those cloud server is inquisitive and legitimate, where the hunt effects aren't affirmed. If cloud server act mischievously and working insincerely after that make them. Dissimilar to past scheme, recommend on novel impediment built plan. Clinched alongside verification, the cloud server can't realize which information owner, alternately the thing that amount from claiming information manager trade family information which will try for checking those cloud server’s rowdiness. Intended confirmation scheme, those cloud server can't realize which information holder information are inserted in the confirmation information buffer, or what no of information Owner's confirmation information are truly used to confirmation. All servers know that, Assuming that he acts insincerely toward amount from claiming times then he must make rebuffed. Should streamline those estimation from claiming parameters used advancement of the mystery confirmation information cushion.

Authors and Affiliations

Monika Patil, Sarika Bodake

Keywords

Related Articles

Embedding Iris Image Watermark in Hand Vein Image to Improve Biometric Security

Biometric acknowledgment is a noteworthy technique for acknowledgment of individual as of late. Here, a typical concern is biometric security which is the protection issues gotten from capacity and abuses of the format...

Efficient Dynamic Data Flow and Black Hole Detection in Manet

In Wireless networks, when data packets are being transferred between nodes from a specified node to destination, then source node checks for shortest path to reach destination. In this approach there may be a possibili...

Artificial Neural Network for Development of Intrusion Detection System

In this digital age, information security is very challenging task to protect the information from suspicious person. All word has to become digital and information is been store in digital format. Today, there is great...

Review of Home Based Security Mechanism Using Paired Key for Sensor to Cloud Communication

Iot-related health care system are based on the vital description of the iot as a network of devices that connect directly with each other to capture and share important data through a secure service layer as ssl that c...

Effect of Crosstalk in Optical Component

Optical networks have emerged as a solution to the rapidly increasing demands. Now, the optical data is transmitted over long distances without the need for O-E-O conversion as the data is directly transferred in the fi...

Download PDF file
  • EP ID EP24714
  • DOI -
  • Views 391
  • Downloads 15

How To Cite

Monika Patil, Sarika Bodake (2017). Catch You If You Lie: Search Results Verification in Cloud Computing Based on Keyword Encryption. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(6), -. https://europub.co.uk/articles/-A-24714