Effective Modular Order Preserving Encryption on Cloud UsingMHGD
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 4
Abstract
Abstract: Cloud computing strengthens its presence in the public sector, Organizations and individuals arelooking for cloud services to improve productivity, security and reduce costs. Apart from communication, filestorage is the main requirement for common people. Traditional data centers consist of large collections ofserver farms implementing perimeter-security measures. Public cloud offersa multitenant service, in which theconcept of the network perimeter evaporates. For the former concern, data encryption before outsourcing is thesimplest way to protect data privacy. But encryption also makes deploying traditional data utilization services — a difficult. This problem on how to search encrypted data has recently gained attention and led to thedevelopment of searchable encryption techniques. In this work we are try to implement Modular OrderPreserving Encryption(MOPE), a primitive which allowing a efficient modular range queries on encrypteddocuments. This is a kind of Searchable Encryption Scheme. MOPE improves the security of OPE in the sense,as it does not leak any information about the location of plaintext, Boldyvera et.al. Main goal of this work is toimprove the security provided by the existing MOPE approaches with the help of Multivariate HypergeometricDistribution (MHGD).
Authors and Affiliations
N. Jayashri , T. Chakravarthy
Detection of Lung Cancer Stages on CT scan Images by Using Various Image Processing Techniques
Abstract: Lung cancer seems to be the common cause of death among people throughout the world. Early detection of lung cancer can increase the chance of survival among people. The overall 5-year survival rate for l...
Various Methods for Object Tracking- A Review
Abstract: The object tracking is the technique which is used to track object from the image or from the video. The video consists of multiple frames and in each frame location of that object had been predicted. To predic...
Off-Line Signature Verification Using Principal ComponentVariances
Abstract: Signature verification system is always the most sought after biometric verification system. Being abehavioral biometric feature which can always be imitated, the researcher faces a challenge in designing...
Survey of various routing approaches based on quality-of-service (QoS) criteria in MANET
Abstract: Now a day, Mobile Adhoc Networks (MANET) gained a lot of popularity in the research community. People realized that there is a commercial value in MANETs with the successful solutions of the most basic bu...
Analysis of Titles from the Questions of the Stack OverflowCommunity Using Natural Language Processing (NLP)Techniques
Abstract: Major online “Question and Answer” forums have proven to be of enormous help to programmersand developers from all parts of the world. One such important forum is the Stack Overflow community. In thispaper, we...