Generating Content Searchable Cipher Texts with Semantic Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Many systems which uses various content distribution over the network requires access restriction, prevention from unauthorized access and hiding the identity of users. Current systems face problems there are some types of attacks are there on user privacy. Lot of work has been done on keyword searchable cipher text with public key encryption. In public key encryption to search keyword has advantage that anyone who knows the public key of receiver can upload file easily with encrypted cipher text. This technique is semantically secure and takes search time equal to number of cipher texts. But system face problems when we retrieve data from large databases.to tackle this problem searchable public-key cipher texts with hidden star like structures (SPCHS) provides fast keyword search with keeping semantic security of keyword which are encrypted. In this paper we focus on another different application of public key encryption in which we are going for content search. We are applying the same technique of semantic security by making the hidden tree structure. Such type of content search is useful while recognizing the spams which are encrypted. While doing this we are keeping focus on search complexity should be linear with the query content size. Finally, we present an architecture with a generic SPCHS construction which we got as output from anonymous identity-based encryption and collision-free full-identity adaptable Identity-Based Key Encapsulation Mechanism (IBKEM) with anonymity.
Authors and Affiliations
Pondkule Priyanka, Yadav Ashwini, Khomane Sharmila, Nale Supriya
Non Determinism of Finite Automata
The basic finite automata model has been extended over the years with different acceptancemodes (nondeterminism, alternation), new or improved devices (two-way heads, Pebbles, nested pebbles) and with cooperation. None...
THE REDREC TECHNOLOGY -Converting thoughts to visuals using infrared and recording them
having infrared being used in scanning the brain activities for unusual happenings and also been lately used for data transfers called the redtacton. We also have the latest technology of reading and recording human tho...
Efficient Dynamic Data Flow and Black Hole Detection in Manet
In Wireless networks, when data packets are being transferred between nodes from a specified node to destination, then source node checks for shortest path to reach destination. In this approach there may be a possibili...
Designing of Cleaning Robot
Automatic work is taken over the robot technology and many of the related robot appliances are being used extensively also. Here represents the technology that proposed the working of robot for Floor cleaning. All hardw...
Mining Twitter Data of Rural Area Engineering Colleges for Understanding Issues and Problems in Their Educational Experiences
Students’ informal conversations on social media such as Twitter are useful for understand their learning experiences, and feelings. Data from such social media environments can provide valuable information about studen...