Research on Decryption Methodologies and Key Aggregate Searchable Encryption for Data Security Storage in Cloud

Abstract

Numerous firm’s architectures management of data guarantees substantially alter method, gain access to maintain private commercial business. Occur additional facts protection problems. Existing statistics safety methods have limits in preventing records legal assaults, in particular these performed by utilizing companion diploma business executives to the cloud dealer to monitor data get right of entry to within the cloud and find out unusual records get right of entry to. Sorts require method of building a machine robust protection privateer’s statistic through files person team customer’s technique much documents. Not simply the encryption keys but also the search keys need to be utilized and consumers have to keep their keys resistant and disseminated. The cutting-edge current gadget the place the facts proprietor can solely share one key with the user, whether or not it is any kind of document, massive or small variety of documents, and the function of the person is to cross a lure in the cloud of overall performance checking out and safety evaluation of shared documents, which is an impenetrable and superb proposed gives schemes. And consumers are also extremely concerned about data sharing storage, inexplicable information leak in the cloud, and harmful attackers. In the article, an experiment is done to format a method for encryption for impenetrable statistics allocation.

Authors and Affiliations

Sunaina Bagga

Keywords

Related Articles

Vehicle Number Plate Identification Using a Bi-Step Region Segmentation and Classification Technique

Vehicle number plate identification (VNPI) is an imperative task for resolving the increasing traffic issues around the world. Although many studies were conducted in the past, there are still many challenges to be answe...

New Product Development through QFD Methodology - A Short Survey

This paper presents a literature review of quality function deployment (QFD). The introduction and history of survey in QFD is accounted first, followed by methodology of Quality Function Deployment. Then a categorical a...

Object Based Analysis of Remote Senssing Images

Remote sensing is the process of detecting and identifying a region's physical properties by assessing reflected but also transmitted radiation from a range. Analog pictures include aerial photography, whereas digital im...

Elevated Water Tank Design Comparison in Different Seismic Zones

Water is maintained in tall tanks as part of the public water system. Because of a shortage of water or difficulties putting out a fire after an earthquake, the collapse of these water tanks could pose major risks to peo...

Text Summarization with Sentimental Analysis

In today’s world, Modern organizations deal with terabytes of text, such as email, that often plays a significant role in their day to day operations. The user has to face a task of identifying useful information from th...

Download PDF file
  • EP ID EP747149
  • DOI 10.55524/ijircst.2021.9.6.69
  • Views 40
  • Downloads 0

How To Cite

Sunaina Bagga (2021). Research on Decryption Methodologies and Key Aggregate Searchable Encryption for Data Security Storage in Cloud. International Journal of Innovative Research in Computer Science and Technology, 9(6), -. https://europub.co.uk/articles/-A-747149