Catch You If You Lie: Search Results Verification in Cloud Computing Based on Keyword Encryption

Abstract

As an essential information use, secure Pivotal word scan again encrypted cloud information need pulled in those enthusiasm about a number scientists. This is the reason scientists expect that those cloud server is inquisitive and legitimate, where the hunt effects aren't affirmed. If cloud server act mischievously and working insincerely after that make them. Dissimilar to past scheme, recommend on novel impediment built plan. Clinched alongside verification, the cloud server can't realize which information owner, alternately the thing that amount from claiming information manager trade family information which will try for checking those cloud server’s rowdiness. Intended confirmation scheme, those cloud server can't realize which information holder information are inserted in the confirmation information buffer, or what no of information Owner's confirmation information are truly used to confirmation. All servers know that, Assuming that he acts insincerely toward amount from claiming times then he must make rebuffed. Should streamline those estimation from claiming parameters used advancement of the mystery confirmation information cushion.

Authors and Affiliations

Monika Patil, Sarika Bodake

Keywords

Related Articles

Design and Implementation of Variable Speed control For Motor Based on Temperature Pressure sensing units using PIC Controller

This project aims to propose and implementation of DC motor speed control based on the Temperature and Pressure sensing deviation. This project is mainly concerned on DC motor speed control system by using PIC 16F877A...

A Research Study on Efficient Management of Memory in Mobile Ad Hoc Network in Trust Management System Environment

The simple Mobile Ad hoc network has only limited storage capabilities. In order to construct an efficient Trust Management System in the Existing Mobile Ad hoc Network and make it perform the real time decisions based...

Impact of Sensor Equipped Grinding Wheel and its Prospects

The in-process measurement and observance of grinding forces near to the contact zone is a matter of concern in most production grinding operations. To optimize the acquisition of process forces and to compensate the la...

Efficient Spam Detection on Social Network

With the growth of social networking sites for communicating, sharing, storing and managing significant information, it is attracting cybercriminals who misuse the Web to exploit vulnerabilities for their illicit benefi...

n Implementation of Nine Level Cascaded HBridge Inverter Using Switched Capacitor

The enhancement of transmission frequency deserves more than the low or medium frequency applications. High frequency is mostly preferred now-a-days because of to reduce the size and cost of the power electronic equipme...

Download PDF file
  • EP ID EP24714
  • DOI -
  • Views 397
  • Downloads 15

How To Cite

Monika Patil, Sarika Bodake (2017). Catch You If You Lie: Search Results Verification in Cloud Computing Based on Keyword Encryption. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(6), -. https://europub.co.uk/articles/-A-24714