Ensuring Semantic Security in Keyword Search using Searchable Public-Key Ciphertexts with Hidden Structures
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 7
Abstract
This paper propose searchable public key ciphertexts with inconspicuous structure for catchphrase investigate as quick as doable lacking giving up semantic security of the scrambled watchwords. In SPCHS, each one watchword searchable ciphertext are arranged by inconspicuous relative, and with the pursuit trapdoor consequent to a catchphrase, the littlest sum in succession of the relations is identify with a search for calculation as the supervision to find all comparing ciphertext capably. In SPCHS (Searchable Public-Key Ciphertexts with Hidden Structures), all catchphrase searchable ciphertexts are organized by concealed relations, and with the inquiry trapdoor relating to a watchword, the base data of the relations is revealed to a hunt calculation as the direction to locate all coordinating ciphertexts proficiently. The inquiry intricacy of our plan is reliant on the genuine number of the ciphertexts containing the questioned catchphrase, instead of the quantity of all ciphertexts. At long last, we introduce a non specific SPCHS development from mysterious character based encryption and crash free full-personality moldable Identity-Based Key Encapsulation Mechanism (IBKEM) with secrecy. We outline two impact free full-character pliant IBKEM examples, which are semantically secure and unknown, individually.
Authors and Affiliations
P Gnana Iswarya| M.Tech (CSE), Dhanekula Institute of Engineering & Technology, A.P., India, P Sunitha| Asst.Professor, Dept. of Computer Science & Engineering, Dhanekula Institute of Engineering & Technology, A.P., India
A Novel Approach For Improve Reliability Using Secure Distributed De-duplication System In Cloud
Information De-duplication strategy is utilized for wiping out the copy duplicates of rehashed information in distributed storage and to diminish the information duplication. This method is utilized to enhance stockp...
Damping Power System Oscillations Controlled By Using STATCOM
This paper manages the plan of a versatile power oscillation damping (POD) controller for a static synchronous compensator (STATCOM) outfitted with vitality stockpiling. This is accomplished utilizing a flag estimati...
Efficient Image Annotation Process Using Tag Ranking Scheme
Now a day’s number of computerized pictures are expanding which are accessible in online media .for picture matching and recovery image explanation applications are playing key part .yet existing procedures like su...
The data stored in cloud environment can be accessed from anywhere and at anytime and by anyone. Many techniques effectively provide the security for cloud storage data. During transmission of data in cloud environme...
Character segmentation from multi-oriented video words using Discrete Wavelet Transform and K-Means Clustering
The paper presents a two stage methods for the image segmentation from multi-oriented video words by using of DWT process k-means clustering. As the commercial usage of digital contents are on rise, the requirement o...