SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
SECURED MULTIPLE KEYWORD RANKED SEARCH OVER
ENCRYPTED DATABASES
P. Chaitanya1
, [7382536866}
. K. Kishore kumar [9160993047]
1
M.Tech., PG Scholar, Dept of CSE, Korm College of Engineering, Kadapa,Andhra Pradesh.
2
Assistant Professor, Dept of CSE,Korm College of Engineering, Kadapa, Andhra Pradesh.
Abstract: Information offering is an imperative usefulness in distributed storage. In this article, we demonstrate to
safely, productively, and adaptably impart information to others in distributed storage. We depict new open key
cryptosystems which deliver steady size cipher-texts such that productive designation of unscrambling rights for
any arrangement of cipher-texts are conceivable. The oddity is that one can total any arrangement of mystery keys
and make them as conservative as a solitary key, yet incorporating the force of every last one of keys being amassed.
As such, the mystery key holder can discharge a steady size total key for adaptable decisions of cipher-text set in
distributed storage; however the other scrambled records outside the set stay private. This reduced total key can be
helpfully sent to others or be put away in a shrewd card with extremely restricted secure stockpiling. We give formal
security investigation of our plans in the standard model. We likewise depict other utilization of our plans.
Specifically, our plans give the first open key patient-controlled encryption for adaptable progression, which was
yet to be known.
I. INTRODUCTION
Distributed storage is a stockpiling of information
online in cloud which is available from different and
joined assets. Cloud capacity can give great openness
and unwavering quality, solid assurance, debacle
recuperation, and least cost. Distributed storage
having essential usefulness i.e. safely, productively,
adaptably imparting information to others. New open
–key encryption which is called as Key-total
cryptosystem (KTC) is presented. Key-total
cryptosystem produce steady size cipher-texts such
that effective assignments of decoding rights for any
arrangement of cipher-text are conceivable. Any
arrangement of mystery keys can be accumulated and
make the m as single key, which includes force of
every last one of keys being accumulated. This total
key can be sent to the others for decoding of cipher-
text set and staying scrambled records outside the set
are stays classified Cloud Storage is these days
exceptionally famous capacity framework. Distributed
storage is putting away of information off - site to the
physical stockpiling which is kept up by outsider.
Distributed storage is sparing of computerized
information in coherent pool and physical stockpiling
compasses numerous servers which are oversee by
outsider. Outsider is in charge of keeping information
accessible and open and physical environment ought
to be ensured and running at untouched. As opposed
to putting away
Information to the hard commute or whatever other
neighborhood stockpiling, we spare information to
Remote stockpiling which is available from anyplace
and at whatever time. It lessens endeavors of
conveying physical stockpiling to all over. By utilizing
cloud capacity we can get to data from any PC through
web which precluded confinement of getting to data
from same PC where it is put away. While considering
information security, we can't depend on customary
procedure of confirmation, in light of the fact that
sudden benefit acceleration will uncover all
information. Arrangement is to encode information
before transferring to the server with client's own
particular key. Information imparting is again
imperative usefulness of distributed storage, in light of
the fact that client can impart information from
anyplace and at whatever time to anybody. For
instance, association y stipend authorization to get to
a piece of delicate information to their workers.
Anyway difficult undertaking is that how to impart
scrambled information. Customary way is client can
download the encoded information from capacity,
decode that information and send it to impart to others,
however it loses the significance of distributed
storage. Cryptography system can be connected in a
two noteworthy ways one is symmetric key encryption
and other is deviated key encryption. In symmetric key
encryption, same keys are utilized for encryption and
decoding. By complexity, in halter kilter key
encryption distinctive keys are utilized, open key for
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 20161
encryption and private key for decoding. Utilizing
awry key encryption is more adaptable for our
methodology. This can be outlined by taking after
case.
Assume Alice put all information on Box.com and she
would like to open her information to everybody.
Because of information spillage conceivable outcomes
she does not trust on protection component gave by
Box.com, so she scrambles all information before
transferring to the server. On the off chance that Bob
ask her to impart some information then Alice
utilization offer capacity of Box.com. Be that as it may
issue now is that how to offer encoded information.
There are two extreme ways: 1. Alice encode
information with single mystery key and offer that
mystery key specifically with the Bob. 2. Alice can
scramble information with unmistakable keys and
send Bob comparing keys to Bob through secure
channel. In first approach, undesirable information
likewise get open to the Bob, which is insufficient. In
second approach, no. of keys is the same number of as
no. of imparted records, which may be hundred or
thousand and also exchanging these keys oblige secure
channel and storage room which can be extravagant.
Subsequently best answer for above issue is Alice
scrambles information with particular open keys, yet
send single unscrambling key of steady size to Bob.
Since the decoding key ought to be sent through secure
channel and kept mystery little size is always lucky.
To plan an effective open key encryption plan which
underpins adaptable appointment as in any subset of
the cipher-texts(produced by the encryption scheme)
is decrypt able by a constant-size decryption key
(generated by the owner of the master-secret key). II.
RELATED STUDY
Encryption key strategy An encryption plan which is
initially proposed for briefly transmitting huge number
of keys in telecast situation. The development is basic
and we quickly survey its key inference handle here
for a cement depiction of what are the alluring
properties we need to attain to. The deduction of the
key for an arrangement of classes (which is a subset of
all conceivable cipher-text classes) is as takes after. A
composite modulus is picked where p and q are two
vast irregular primes. An expert mystery key is picked
at arbitrary. Every class is connected with a particular
prime. All these prime numbers can be placed in the
general population framework parameter. A consistent
size key for set can be produced. For the individuals
who have been assigned the entrance rights for Sˈ can
be created. In any case, it is planned for the symmetric-
key setting. The content supplier needs to get the
relating mystery keys to encode information, which is
not suitable for some applications. Since strategy is
utilized to produce mystery esteem as opposed to a
couple of open/mystery keys, it is vague how to apply
this thought for open key encryption plan. At long last,
we take note of that there are plans which attempt to
lessen the key size for accomplishing confirmation in
symmetric-key encryption, On the other hand, offering
of decoding force is not a worry in these plans.
IBE with compact key Identity based encryption (IBE)
is an open key encryption in which the general popul
ation key of a client can be set as an personality string
of the client (e.g., an email address, portable number).
There is a private key generator (PKG) in IBE which
holds a expert mystery key and issues a mystery key
to every client with deference to the client personality.
The content supplier can take general society
parameter and a client personality to scramble a
message. The beneficiary can decode this cipher-text
by his mystery key. To manufacture IBE with key
conglomeration. In their plans, key accumulation is
obliged as in all keys to be accumulated must
originated from diverse ―identity divisions. While
there are an exponential number of characters and
subsequently mystery keys, just a polynomial number
of them can be aggregated This altogether builds the
expenses of putting away and transmitting cipher-
texts, which is illogical by and large, for example,
imparted distributed storage. As another approach to
do this is to apply hash capacity to the string indicating
the class, and continue hashing over and again until a
prime is acquired as the yield of the hash function we
specified, our plans highlight steady cipher-text size,
and their security holds in the standard model. In fluffy
IBE one single minimized mystery key can decode
cipher-texts encoded under numerous personalities
which are shut in a certain metric space, however not
for a discretionary arrangement of characters
furthermore, subsequently it doesn't coordinate with
our concept of key to key.
III. ROBUST KEY AGGREGATE
CRYPTOSYSTEMS
In Robust key-Aggregate cryptosystem (RKAC),
clients scramble a message under an open key, as well
as under an identifier of cipher-text called class. That
implies the cipher-texts will be further classified into
distinctive classes. The key holder holds an expert
mystery called expert mystery key, which can be
utilized to concentrate mystery keys for distinctive
classes. More essentially, the extricated key have can
be a total key which is as minimal as a mystery key
for a solitary class; however totals the force of
numerous such keys, i.e., the decoding force for any
subset of cipher-text classes. With our illustration,
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 20162
Alice can send Bob a solitary total key through a safe
email. Sway can download the scrambled
photographs from Alice’s Box.com space and
afterward utilize this total key to unscramble these
encoded information. The sizes of cipher-text, open
key, expert mystery key Also, total key in RKAC plans
are all of consistent size. General society framework
parameter has size direct in the quantity of cipher-text
classes, at the same time just a little piece of it is
required every time and it can be brought on interest
from substantial (non -private) distributed storage.
The information that is transmitted through the total
box will be encrypted.
IV. SCHEME OF ROBUST KEY AGGREGATE
CRYPTO SYSTEMS (KRAC)
The information manager makes general society
framework parameter through Setup and produces an
open/expert mystery key match through KeyGen.
Information can be encoded by means of Encrypt by
any individual who additionally chooses what cipher-
text class is connected with the plaintext message to
be encoded. The information manager can utilize the
expert mystery key pair to create a total unscrambling
key for an arrangement of cipher-text classes through
Extract. The produced keys can be gone to delegates
safely through secure messages or secure gadgets
finally, any client with a total key can unscramble any
cipher-text gave that the cipher-text's class is
contained in the total key by means of Unscramble.
Key total encryption plans comprise of five
polynomial time calculations as takes after An
authoritative utilization of KAC is information
offering. The key total property is particularly helpful
when we anticipate that assignment will be proficient
and adaptable. the KAC plans empower a substance
supplier to impart her information in a secret and
particular path, with an altered also, little cipher-text
development, by appropriating to every approved
client a solitary and little total key. Information
partaking in distributed storage utilizing KAC,
showed in Figure 1. Assume Alice needs to impart
her information m1, m2,....,mn on the server. She first
performs Setup (1λ , n) to get param and execute
KeyGen to get people in general/expert mystery key
pair (pk, msk). The framework parameter param and
open key pk can be made open and expert mystery
key msk ought to be kept mystery by Alice. Anybody
can then encode every mi by Ci = Encrypt (pk, i, mi).
The encoded Schematic Rules for Robust Key
Aggregate Cryptosystems 1. Setup (1λ,n) : The
Information owner establishes a parameter for public
systems via Setup. On input of a security level
parameter 1λ and number of cipher-text classes n, it
outputs the public system parameter param 2.
KeyGen: It is executed by information owner to
randomly generate a public/M Secret key (Pk,msk)
3. Encyprt (Pk,i,m): It is executed by data owner and
for message m and index i, it computes the cipher-
text as C 4. Extract (msk,S): It is executed by
information owner for attending the decrypting power
for a particular set of cipher-text classes and it outputs
the aggregate key for set S denoted by Ks 5. Decrypt
(Ks,S,I,C): It is executed by a delegate who received,
an random key Ks, created by extract. On input Ks,
set S, an index I denoting the cipher-text class cipher-
text to and output is decrypted result information are
transferred to the server. With param and pk,
individuals who participate with Alice can upgrade
Alice's information on the server. When Alice is
willing to impart a set S of her information with a
companion Bob, she can process the total key KS for
Bob by performing Extract (msk, S). Since KS is
simply a consistent size key, it is anything but
difficult to be sent to Bob through a protected email.
In the wake of getting the total key, Bob can
download the information he is approved to get to.
That is, for every i ϵ S, Bob downloads Ci from the
server. With the total key KS, Bob can decode every
Ci by Decrypt (KS, S, i, Ci) for every example.
V.CONCLUSION
Clients information protection is a focal inquiry of
distributed storage. Pack mystery enters in broad
daylight key cryptosystems which bolster
assignment of mystery keys for distinctive figure
content classes in cloud capacity. Regardless of
which one among the force set of classes, the
delegate can simply get a total key of steady size. In
distributed storage, the quantity of figure messages
for the most part becomes quickly with no
limitations. So we have to save enough figure content
classes for the future augmentation. Else, we have to
grow general society key. Despite the fact that the
parameter can be downloaded with figure writings,
it would be better in the event that its size is free of
the greatest number of figure content classes.
VI. REFERENCES
[1] Cheng-Kang Chu ,Chow, S.S.M, Wen-
GueyTzeng, Jianying Zhou, and Robert H. Deng , ―
Key-Aggregate Cryptosystem forScalable Data
Sharing in Cloud Storage‖ , IEEE Transactions on
Parallel and Distributed Systems. Volume: 2 5, Issue:
2. Year :2014.
[2] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter,
―Patient Controlled Encryption: Ensuring Privacy of
Electronic Medical Records,‖ in Proceedings of ACM
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 20163
Workshop on Cloud Computing Security (CCSW
’09). ACM, 2009, pp. 103–114
[3] J. Benaloh, ―Key Compression and Its
Application to Digital Fingerprinting,‖ Microsoft
Research, Tech. Rep., 2009.
[4] B. Alomair and R. Poovendran, ―Information
Theoretically Secure Encryption with Almost Free
Authentication,‖ J. UCS, vol. 15, no. 15, pp. 2937–
2956, 2009.
[5] D. Boneh and M. K. Franklin, ―Identity-Based
Encryption from the Weil Pairing,‖ in Proceedings of
Advances in Cryptology –CRYPTO ’01, ser. LNCS,
vol. 2139. Springer, 2001, pp. 213–229.
[6] A. Sahai and B. Waters, ―Fuzzy Identity-Based
Encryption,‖ in Proceedings of Advances in
Cryptology - EUROCRYPT ’05, ser. LNCS, vol.
3494. Springer, 2005, pp. 457–473.
[7] S. S. M. Chow, Y. Dodis, Y. Rouselakis, and B.
Waters, ―Practical Leakage-Resilient Identity-Based
Encryption from Simple Assumptions,‖ in ACM
Conference on Computer and Communications
Security, 2010, pp. 152–161.
[8] F. Guo, Y. Mu, and Z. Chen, ―Identity-Based
Encryption: How to Decrypt Multiple Cipher-texts
Using a Single Decryption Key,‖ in Proceedings of
Pairing-Based Cryptography (Pairing ’07), ser.
LNCS, vol. 4575. Springer, 2007, pp. 392–406. [9]
F. Guo, Y. Mu, Z. Chen, and L. Xu, ―Multi-Identity
Single-Key Decryption without Random Oracles,‖ in
Proceedings of Information Security and Cryptology
(Inscrypt ’07), ser. LNCS, vol. 4990. Springer, 2007,
pp. 384–398.
ISBN-13: 978-1537584836
www.iaetsd.in
Proceedings of ICAER-2016
©IAETSD 20164

Más contenido relacionado

La actualidad más candente

Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloudkrprashant94
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYTuhin_Das
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKIRabei Hassan
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionPvrtechnologies Nellore
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pkiPrabhat Goel
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption SystemsChristopher Frenz
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageShruthi Iyer
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSSURBHI SAROHA
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
 

La actualidad más candente (20)

Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
 
Cryptography and PKI
Cryptography and PKICryptography and PKI
Cryptography and PKI
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
Searchable Encryption Systems
Searchable Encryption SystemsSearchable Encryption Systems
Searchable Encryption Systems
 
Encryption
EncryptionEncryption
Encryption
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
82 86
82 8682 86
82 86
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 

Destacado

Iaetsd nano robotics in cancer
Iaetsd nano robotics in cancerIaetsd nano robotics in cancer
Iaetsd nano robotics in cancerIaetsd Iaetsd
 
iaetsd Second level security using intrusion detection and avoidance system
iaetsd Second level security using intrusion detection and avoidance systemiaetsd Second level security using intrusion detection and avoidance system
iaetsd Second level security using intrusion detection and avoidance systemIaetsd Iaetsd
 
IIirdem mri brain tumour extraction by multi modality magnetic resonance imag...
IIirdem mri brain tumour extraction by multi modality magnetic resonance imag...IIirdem mri brain tumour extraction by multi modality magnetic resonance imag...
IIirdem mri brain tumour extraction by multi modality magnetic resonance imag...Iaetsd Iaetsd
 
Iaetsd emergency recovery control unit using microcontroller
Iaetsd emergency recovery control unit using microcontrollerIaetsd emergency recovery control unit using microcontroller
Iaetsd emergency recovery control unit using microcontrollerIaetsd Iaetsd
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environmentIaetsd Iaetsd
 
iaetsd Easy tax a user friendly mobile application
iaetsd Easy tax   a user friendly mobile applicationiaetsd Easy tax   a user friendly mobile application
iaetsd Easy tax a user friendly mobile applicationIaetsd Iaetsd
 
4 iaetsd detecting linear structures within the aster satellite image by effe...
4 iaetsd detecting linear structures within the aster satellite image by effe...4 iaetsd detecting linear structures within the aster satellite image by effe...
4 iaetsd detecting linear structures within the aster satellite image by effe...Iaetsd Iaetsd
 
iaetsd Modern e aid to dementia patients
iaetsd Modern e  aid to dementia patientsiaetsd Modern e  aid to dementia patients
iaetsd Modern e aid to dementia patientsIaetsd Iaetsd
 
iaetsd Vehicle monitoring and security system
iaetsd Vehicle monitoring and security systemiaetsd Vehicle monitoring and security system
iaetsd Vehicle monitoring and security systemIaetsd Iaetsd
 
Iirdem screen less displays – the imminent vanguard
Iirdem screen less displays – the imminent vanguardIirdem screen less displays – the imminent vanguard
Iirdem screen less displays – the imminent vanguardIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...Iaetsd Iaetsd
 
Iaetsd experimental investigation on self compacting fiber reinforced concret...
Iaetsd experimental investigation on self compacting fiber reinforced concret...Iaetsd experimental investigation on self compacting fiber reinforced concret...
Iaetsd experimental investigation on self compacting fiber reinforced concret...Iaetsd Iaetsd
 
Iaetsd io t based advanced smart health care system
Iaetsd io t based advanced smart health care systemIaetsd io t based advanced smart health care system
Iaetsd io t based advanced smart health care systemIaetsd Iaetsd
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
Business Studies (Marketing Management) Project Class 12th CBSE
Business Studies (Marketing Management) Project Class 12th CBSE      Business Studies (Marketing Management) Project Class 12th CBSE
Business Studies (Marketing Management) Project Class 12th CBSE Dheeraj Kumar
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd Iaetsd
 

Destacado (17)

Iaetsd nano robotics in cancer
Iaetsd nano robotics in cancerIaetsd nano robotics in cancer
Iaetsd nano robotics in cancer
 
iaetsd Second level security using intrusion detection and avoidance system
iaetsd Second level security using intrusion detection and avoidance systemiaetsd Second level security using intrusion detection and avoidance system
iaetsd Second level security using intrusion detection and avoidance system
 
IIirdem mri brain tumour extraction by multi modality magnetic resonance imag...
IIirdem mri brain tumour extraction by multi modality magnetic resonance imag...IIirdem mri brain tumour extraction by multi modality magnetic resonance imag...
IIirdem mri brain tumour extraction by multi modality magnetic resonance imag...
 
Iaetsd emergency recovery control unit using microcontroller
Iaetsd emergency recovery control unit using microcontrollerIaetsd emergency recovery control unit using microcontroller
Iaetsd emergency recovery control unit using microcontroller
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
iaetsd Easy tax a user friendly mobile application
iaetsd Easy tax   a user friendly mobile applicationiaetsd Easy tax   a user friendly mobile application
iaetsd Easy tax a user friendly mobile application
 
4 iaetsd detecting linear structures within the aster satellite image by effe...
4 iaetsd detecting linear structures within the aster satellite image by effe...4 iaetsd detecting linear structures within the aster satellite image by effe...
4 iaetsd detecting linear structures within the aster satellite image by effe...
 
iaetsd Modern e aid to dementia patients
iaetsd Modern e  aid to dementia patientsiaetsd Modern e  aid to dementia patients
iaetsd Modern e aid to dementia patients
 
iaetsd Vehicle monitoring and security system
iaetsd Vehicle monitoring and security systemiaetsd Vehicle monitoring and security system
iaetsd Vehicle monitoring and security system
 
Iirdem screen less displays – the imminent vanguard
Iirdem screen less displays – the imminent vanguardIirdem screen less displays – the imminent vanguard
Iirdem screen less displays – the imminent vanguard
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
 
Iaetsd experimental investigation on self compacting fiber reinforced concret...
Iaetsd experimental investigation on self compacting fiber reinforced concret...Iaetsd experimental investigation on self compacting fiber reinforced concret...
Iaetsd experimental investigation on self compacting fiber reinforced concret...
 
Iaetsd io t based advanced smart health care system
Iaetsd io t based advanced smart health care systemIaetsd io t based advanced smart health care system
Iaetsd io t based advanced smart health care system
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Business Studies (Marketing Management) Project Class 12th CBSE
Business Studies (Marketing Management) Project Class 12th CBSE      Business Studies (Marketing Management) Project Class 12th CBSE
Business Studies (Marketing Management) Project Class 12th CBSE
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
 

Similar a iaetsd Secured multiple keyword ranked search over encrypted databases

ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
F018133640.key aggregate paper
F018133640.key aggregate paperF018133640.key aggregate paper
F018133640.key aggregate paperIOSR Journals
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storageswathi78
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storageswathi78
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storagechennaijp
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...ASAITHAMBIRAJAA
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...CloudTechnologies
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageMugesh Mukkandan
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudSravan Narra
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Adz91 Digital Ads Pvt Ltd
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...IRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via  deniable attribute based encryptionAudit free cloud storage via  deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryptionMano Sriram
 
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...INFOGAIN PUBLICATION
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search overIEEEFINALSEMSTUDENTPROJECTS
 

Similar a iaetsd Secured multiple keyword ranked search over encrypted databases (20)

ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
F018133640.key aggregate paper
F018133640.key aggregate paperF018133640.key aggregate paper
F018133640.key aggregate paper
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...Ieeepro techno solutions   2014 ieee dotnet project -key-aggregate cryptosyst...
Ieeepro techno solutions 2014 ieee dotnet project -key-aggregate cryptosyst...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Audit free cloud storage via deniable attribute based encryption
Audit free cloud storage via  deniable attribute based encryptionAudit free cloud storage via  deniable attribute based encryption
Audit free cloud storage via deniable attribute based encryption
 
Data encryption
Data encryptionData encryption
Data encryption
 
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
2014 IEEE DOTNET CLOUD COMPUTING PROJECT Fuzzy keyword search over
 

Más de Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 
iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...Iaetsd Iaetsd
 
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...Iaetsd Iaetsd
 

Más de Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 
iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...
 
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
iaetsd Effect of superconducting fault current limiter (sfcl) on triumphant i...
 

Último

PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 

Último (20)

PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 

iaetsd Secured multiple keyword ranked search over encrypted databases

  • 1. SECURED MULTIPLE KEYWORD RANKED SEARCH OVER ENCRYPTED DATABASES P. Chaitanya1 , [7382536866} . K. Kishore kumar [9160993047] 1 M.Tech., PG Scholar, Dept of CSE, Korm College of Engineering, Kadapa,Andhra Pradesh. 2 Assistant Professor, Dept of CSE,Korm College of Engineering, Kadapa, Andhra Pradesh. Abstract: Information offering is an imperative usefulness in distributed storage. In this article, we demonstrate to safely, productively, and adaptably impart information to others in distributed storage. We depict new open key cryptosystems which deliver steady size cipher-texts such that productive designation of unscrambling rights for any arrangement of cipher-texts are conceivable. The oddity is that one can total any arrangement of mystery keys and make them as conservative as a solitary key, yet incorporating the force of every last one of keys being amassed. As such, the mystery key holder can discharge a steady size total key for adaptable decisions of cipher-text set in distributed storage; however the other scrambled records outside the set stay private. This reduced total key can be helpfully sent to others or be put away in a shrewd card with extremely restricted secure stockpiling. We give formal security investigation of our plans in the standard model. We likewise depict other utilization of our plans. Specifically, our plans give the first open key patient-controlled encryption for adaptable progression, which was yet to be known. I. INTRODUCTION Distributed storage is a stockpiling of information online in cloud which is available from different and joined assets. Cloud capacity can give great openness and unwavering quality, solid assurance, debacle recuperation, and least cost. Distributed storage having essential usefulness i.e. safely, productively, adaptably imparting information to others. New open –key encryption which is called as Key-total cryptosystem (KTC) is presented. Key-total cryptosystem produce steady size cipher-texts such that effective assignments of decoding rights for any arrangement of cipher-text are conceivable. Any arrangement of mystery keys can be accumulated and make the m as single key, which includes force of every last one of keys being accumulated. This total key can be sent to the others for decoding of cipher- text set and staying scrambled records outside the set are stays classified Cloud Storage is these days exceptionally famous capacity framework. Distributed storage is putting away of information off - site to the physical stockpiling which is kept up by outsider. Distributed storage is sparing of computerized information in coherent pool and physical stockpiling compasses numerous servers which are oversee by outsider. Outsider is in charge of keeping information accessible and open and physical environment ought to be ensured and running at untouched. As opposed to putting away Information to the hard commute or whatever other neighborhood stockpiling, we spare information to Remote stockpiling which is available from anyplace and at whatever time. It lessens endeavors of conveying physical stockpiling to all over. By utilizing cloud capacity we can get to data from any PC through web which precluded confinement of getting to data from same PC where it is put away. While considering information security, we can't depend on customary procedure of confirmation, in light of the fact that sudden benefit acceleration will uncover all information. Arrangement is to encode information before transferring to the server with client's own particular key. Information imparting is again imperative usefulness of distributed storage, in light of the fact that client can impart information from anyplace and at whatever time to anybody. For instance, association y stipend authorization to get to a piece of delicate information to their workers. Anyway difficult undertaking is that how to impart scrambled information. Customary way is client can download the encoded information from capacity, decode that information and send it to impart to others, however it loses the significance of distributed storage. Cryptography system can be connected in a two noteworthy ways one is symmetric key encryption and other is deviated key encryption. In symmetric key encryption, same keys are utilized for encryption and decoding. By complexity, in halter kilter key encryption distinctive keys are utilized, open key for ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 20161
  • 2. encryption and private key for decoding. Utilizing awry key encryption is more adaptable for our methodology. This can be outlined by taking after case. Assume Alice put all information on Box.com and she would like to open her information to everybody. Because of information spillage conceivable outcomes she does not trust on protection component gave by Box.com, so she scrambles all information before transferring to the server. On the off chance that Bob ask her to impart some information then Alice utilization offer capacity of Box.com. Be that as it may issue now is that how to offer encoded information. There are two extreme ways: 1. Alice encode information with single mystery key and offer that mystery key specifically with the Bob. 2. Alice can scramble information with unmistakable keys and send Bob comparing keys to Bob through secure channel. In first approach, undesirable information likewise get open to the Bob, which is insufficient. In second approach, no. of keys is the same number of as no. of imparted records, which may be hundred or thousand and also exchanging these keys oblige secure channel and storage room which can be extravagant. Subsequently best answer for above issue is Alice scrambles information with particular open keys, yet send single unscrambling key of steady size to Bob. Since the decoding key ought to be sent through secure channel and kept mystery little size is always lucky. To plan an effective open key encryption plan which underpins adaptable appointment as in any subset of the cipher-texts(produced by the encryption scheme) is decrypt able by a constant-size decryption key (generated by the owner of the master-secret key). II. RELATED STUDY Encryption key strategy An encryption plan which is initially proposed for briefly transmitting huge number of keys in telecast situation. The development is basic and we quickly survey its key inference handle here for a cement depiction of what are the alluring properties we need to attain to. The deduction of the key for an arrangement of classes (which is a subset of all conceivable cipher-text classes) is as takes after. A composite modulus is picked where p and q are two vast irregular primes. An expert mystery key is picked at arbitrary. Every class is connected with a particular prime. All these prime numbers can be placed in the general population framework parameter. A consistent size key for set can be produced. For the individuals who have been assigned the entrance rights for Sˈ can be created. In any case, it is planned for the symmetric- key setting. The content supplier needs to get the relating mystery keys to encode information, which is not suitable for some applications. Since strategy is utilized to produce mystery esteem as opposed to a couple of open/mystery keys, it is vague how to apply this thought for open key encryption plan. At long last, we take note of that there are plans which attempt to lessen the key size for accomplishing confirmation in symmetric-key encryption, On the other hand, offering of decoding force is not a worry in these plans. IBE with compact key Identity based encryption (IBE) is an open key encryption in which the general popul ation key of a client can be set as an personality string of the client (e.g., an email address, portable number). There is a private key generator (PKG) in IBE which holds a expert mystery key and issues a mystery key to every client with deference to the client personality. The content supplier can take general society parameter and a client personality to scramble a message. The beneficiary can decode this cipher-text by his mystery key. To manufacture IBE with key conglomeration. In their plans, key accumulation is obliged as in all keys to be accumulated must originated from diverse ―identity divisions. While there are an exponential number of characters and subsequently mystery keys, just a polynomial number of them can be aggregated This altogether builds the expenses of putting away and transmitting cipher- texts, which is illogical by and large, for example, imparted distributed storage. As another approach to do this is to apply hash capacity to the string indicating the class, and continue hashing over and again until a prime is acquired as the yield of the hash function we specified, our plans highlight steady cipher-text size, and their security holds in the standard model. In fluffy IBE one single minimized mystery key can decode cipher-texts encoded under numerous personalities which are shut in a certain metric space, however not for a discretionary arrangement of characters furthermore, subsequently it doesn't coordinate with our concept of key to key. III. ROBUST KEY AGGREGATE CRYPTOSYSTEMS In Robust key-Aggregate cryptosystem (RKAC), clients scramble a message under an open key, as well as under an identifier of cipher-text called class. That implies the cipher-texts will be further classified into distinctive classes. The key holder holds an expert mystery called expert mystery key, which can be utilized to concentrate mystery keys for distinctive classes. More essentially, the extricated key have can be a total key which is as minimal as a mystery key for a solitary class; however totals the force of numerous such keys, i.e., the decoding force for any subset of cipher-text classes. With our illustration, ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 20162
  • 3. Alice can send Bob a solitary total key through a safe email. Sway can download the scrambled photographs from Alice’s Box.com space and afterward utilize this total key to unscramble these encoded information. The sizes of cipher-text, open key, expert mystery key Also, total key in RKAC plans are all of consistent size. General society framework parameter has size direct in the quantity of cipher-text classes, at the same time just a little piece of it is required every time and it can be brought on interest from substantial (non -private) distributed storage. The information that is transmitted through the total box will be encrypted. IV. SCHEME OF ROBUST KEY AGGREGATE CRYPTO SYSTEMS (KRAC) The information manager makes general society framework parameter through Setup and produces an open/expert mystery key match through KeyGen. Information can be encoded by means of Encrypt by any individual who additionally chooses what cipher- text class is connected with the plaintext message to be encoded. The information manager can utilize the expert mystery key pair to create a total unscrambling key for an arrangement of cipher-text classes through Extract. The produced keys can be gone to delegates safely through secure messages or secure gadgets finally, any client with a total key can unscramble any cipher-text gave that the cipher-text's class is contained in the total key by means of Unscramble. Key total encryption plans comprise of five polynomial time calculations as takes after An authoritative utilization of KAC is information offering. The key total property is particularly helpful when we anticipate that assignment will be proficient and adaptable. the KAC plans empower a substance supplier to impart her information in a secret and particular path, with an altered also, little cipher-text development, by appropriating to every approved client a solitary and little total key. Information partaking in distributed storage utilizing KAC, showed in Figure 1. Assume Alice needs to impart her information m1, m2,....,mn on the server. She first performs Setup (1λ , n) to get param and execute KeyGen to get people in general/expert mystery key pair (pk, msk). The framework parameter param and open key pk can be made open and expert mystery key msk ought to be kept mystery by Alice. Anybody can then encode every mi by Ci = Encrypt (pk, i, mi). The encoded Schematic Rules for Robust Key Aggregate Cryptosystems 1. Setup (1λ,n) : The Information owner establishes a parameter for public systems via Setup. On input of a security level parameter 1λ and number of cipher-text classes n, it outputs the public system parameter param 2. KeyGen: It is executed by information owner to randomly generate a public/M Secret key (Pk,msk) 3. Encyprt (Pk,i,m): It is executed by data owner and for message m and index i, it computes the cipher- text as C 4. Extract (msk,S): It is executed by information owner for attending the decrypting power for a particular set of cipher-text classes and it outputs the aggregate key for set S denoted by Ks 5. Decrypt (Ks,S,I,C): It is executed by a delegate who received, an random key Ks, created by extract. On input Ks, set S, an index I denoting the cipher-text class cipher- text to and output is decrypted result information are transferred to the server. With param and pk, individuals who participate with Alice can upgrade Alice's information on the server. When Alice is willing to impart a set S of her information with a companion Bob, she can process the total key KS for Bob by performing Extract (msk, S). Since KS is simply a consistent size key, it is anything but difficult to be sent to Bob through a protected email. In the wake of getting the total key, Bob can download the information he is approved to get to. That is, for every i ϵ S, Bob downloads Ci from the server. With the total key KS, Bob can decode every Ci by Decrypt (KS, S, i, Ci) for every example. V.CONCLUSION Clients information protection is a focal inquiry of distributed storage. Pack mystery enters in broad daylight key cryptosystems which bolster assignment of mystery keys for distinctive figure content classes in cloud capacity. Regardless of which one among the force set of classes, the delegate can simply get a total key of steady size. In distributed storage, the quantity of figure messages for the most part becomes quickly with no limitations. So we have to save enough figure content classes for the future augmentation. Else, we have to grow general society key. Despite the fact that the parameter can be downloaded with figure writings, it would be better in the event that its size is free of the greatest number of figure content classes. VI. REFERENCES [1] Cheng-Kang Chu ,Chow, S.S.M, Wen- GueyTzeng, Jianying Zhou, and Robert H. Deng , ― Key-Aggregate Cryptosystem forScalable Data Sharing in Cloud Storage‖ , IEEE Transactions on Parallel and Distributed Systems. Volume: 2 5, Issue: 2. Year :2014. [2] J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, ―Patient Controlled Encryption: Ensuring Privacy of Electronic Medical Records,‖ in Proceedings of ACM ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 20163
  • 4. Workshop on Cloud Computing Security (CCSW ’09). ACM, 2009, pp. 103–114 [3] J. Benaloh, ―Key Compression and Its Application to Digital Fingerprinting,‖ Microsoft Research, Tech. Rep., 2009. [4] B. Alomair and R. Poovendran, ―Information Theoretically Secure Encryption with Almost Free Authentication,‖ J. UCS, vol. 15, no. 15, pp. 2937– 2956, 2009. [5] D. Boneh and M. K. Franklin, ―Identity-Based Encryption from the Weil Pairing,‖ in Proceedings of Advances in Cryptology –CRYPTO ’01, ser. LNCS, vol. 2139. Springer, 2001, pp. 213–229. [6] A. Sahai and B. Waters, ―Fuzzy Identity-Based Encryption,‖ in Proceedings of Advances in Cryptology - EUROCRYPT ’05, ser. LNCS, vol. 3494. Springer, 2005, pp. 457–473. [7] S. S. M. Chow, Y. Dodis, Y. Rouselakis, and B. Waters, ―Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions,‖ in ACM Conference on Computer and Communications Security, 2010, pp. 152–161. [8] F. Guo, Y. Mu, and Z. Chen, ―Identity-Based Encryption: How to Decrypt Multiple Cipher-texts Using a Single Decryption Key,‖ in Proceedings of Pairing-Based Cryptography (Pairing ’07), ser. LNCS, vol. 4575. Springer, 2007, pp. 392–406. [9] F. Guo, Y. Mu, Z. Chen, and L. Xu, ―Multi-Identity Single-Key Decryption without Random Oracles,‖ in Proceedings of Information Security and Cryptology (Inscrypt ’07), ser. LNCS, vol. 4990. Springer, 2007, pp. 384–398. ISBN-13: 978-1537584836 www.iaetsd.in Proceedings of ICAER-2016 ©IAETSD 20164