SlideShare a Scribd company logo
Enviar búsqueda
Cargar
Efficient and Empiric Keyword Search Using Cloud
Denunciar
Compartir
IRJET Journal
Fast Track Publications
Seguir
•
0 recomendaciones
•
0 vistas
Ingeniería
https://www.irjet.net/archives/V9/i6/IRJET-V9I617.pdf
Leer más
Efficient and Empiric Keyword Search Using Cloud
•
0 recomendaciones
•
0 vistas
IRJET Journal
Fast Track Publications
Seguir
Denunciar
Compartir
Ingeniería
https://www.irjet.net/archives/V9/i6/IRJET-V9I617.pdf
Leer más
Efficient and Empiric Keyword Search Using Cloud
1 de 5
Descargar ahora
Recomendados
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i... por
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
103 vistas
•
4 diapositivas
C017421624 por
C017421624
IOSR Journals
137 vistas
•
9 diapositivas
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud por
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
12 vistas
•
3 diapositivas
IRJET- Secure Cloud Data Using Attribute Based Encryption por
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
20 vistas
•
5 diapositivas
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr... por
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
11 vistas
•
5 diapositivas
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou... por
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
526 vistas
•
9 diapositivas
Más contenido relacionado
Similar a Efficient and Empiric Keyword Search Using Cloud
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey por
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
49 vistas
•
3 diapositivas
Secure Data Sharing In an Untrusted Cloud por
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
294 vistas
•
6 diapositivas
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud por
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
64 vistas
•
4 diapositivas
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage por
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
22 vistas
•
2 diapositivas
Enhanced security framework to ensure data security in cloud using security b... por
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
137 vistas
•
5 diapositivas
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. por
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
423 vistas
•
6 diapositivas
Similar a Efficient and Empiric Keyword Search Using Cloud
(20)
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey por IRJET Journal
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
•
49 vistas
Secure Data Sharing In an Untrusted Cloud por IJERA Editor
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
•
294 vistas
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud por IRJET Journal
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
IRJET Journal
•
64 vistas
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage por IJERA Editor
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
•
22 vistas
Enhanced security framework to ensure data security in cloud using security b... por eSAT Journals
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
•
137 vistas
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. por IJCERT JOURNAL
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
IJCERT JOURNAL
•
423 vistas
Enhanced security framework to ensure data security por eSAT Publishing House
Enhanced security framework to ensure data security
eSAT Publishing House
•
367 vistas
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur... por ijsrd.com
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
•
162 vistas
Towards Achieving Efficient and Secure Way to Share the Data por IRJET Journal
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
•
26 vistas
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security por Editor IJMTER
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
•
299 vistas
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In... por IRJET Journal
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
•
14 vistas
H1803035056 por IOSR Journals
H1803035056
IOSR Journals
•
149 vistas
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou... por IRJET Journal
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
•
62 vistas
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT por IJNSA Journal
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
IJNSA Journal
•
3 vistas
Accessing secured data in cloud computing environment por IJNSA Journal
Accessing secured data in cloud computing environment
IJNSA Journal
•
348 vistas
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp... por IRJET Journal
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
IRJET Journal
•
6 vistas
Guaranteed Availability of Cloud Data with Efficient Cost por IRJET Journal
Guaranteed Availability of Cloud Data with Efficient Cost
IRJET Journal
•
84 vistas
C04932125 por IOSR-JEN
C04932125
IOSR-JEN
•
362 vistas
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm por IRJET Journal
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET Journal
•
32 vistas
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri... por IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
•
35 vistas
Más de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
20 vistas
•
7 diapositivas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 vistas
•
7 diapositivas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
8 vistas
•
5 diapositivas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 vistas
•
11 diapositivas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 vistas
•
6 diapositivas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 vistas
•
5 diapositivas
Más de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
20 vistas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 vistas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
8 vistas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 vistas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 vistas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 vistas
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 vistas
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 vistas
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 vistas
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 vistas
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 vistas
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
52 vistas
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
10 vistas
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 vistas
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 vistas
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 vistas
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 vistas
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 vistas
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
5 vistas
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 vistas
Último
DevOps-ITverse-2023-IIT-DU.pptx por
DevOps-ITverse-2023-IIT-DU.pptx
Anowar Hossain
9 vistas
•
45 diapositivas
DESIGN OF SPRINGS-UNIT4.pptx por
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
19 vistas
•
47 diapositivas
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli
9 vistas
•
16 diapositivas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78
53 vistas
•
19 diapositivas
Saikat Chakraborty Java Oracle Certificate.pdf por
Saikat Chakraborty Java Oracle Certificate.pdf
SaikatChakraborty787148
15 vistas
•
1 diapositiva
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... por
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain
13 vistas
•
34 diapositivas
Último
(20)
DevOps-ITverse-2023-IIT-DU.pptx por Anowar Hossain
DevOps-ITverse-2023-IIT-DU.pptx
Anowar Hossain
•
9 vistas
DESIGN OF SPRINGS-UNIT4.pptx por gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
•
19 vistas
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... por AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli
•
9 vistas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78
•
53 vistas
Saikat Chakraborty Java Oracle Certificate.pdf por SaikatChakraborty787148
Saikat Chakraborty Java Oracle Certificate.pdf
SaikatChakraborty787148
•
15 vistas
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L... por Anowar Hossain
DevOps to DevSecOps: Enhancing Software Security Throughout The Development L...
Anowar Hossain
•
13 vistas
Proposal Presentation.pptx por keytonallamon
Proposal Presentation.pptx
keytonallamon
•
29 vistas
CHEMICAL KINETICS.pdf por AguedaGutirrez
CHEMICAL KINETICS.pdf
AguedaGutirrez
•
12 vistas
sam_software_eng_cv.pdf por sammyigbinovia
sam_software_eng_cv.pdf
sammyigbinovia
•
5 vistas
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptx
gopinathcreddy
•
32 vistas
Stone Masonry and Brick Masonry.pdf por Mohammed Abdullah Laskar
Stone Masonry and Brick Masonry.pdf
Mohammed Abdullah Laskar
•
25 vistas
zincalume water storage tank design.pdf por 3D LABS
zincalume water storage tank design.pdf
3D LABS
•
5 vistas
What is Whirling Hygrometer.pdf por IIT KHARAGPUR
What is Whirling Hygrometer.pdf
IIT KHARAGPUR
•
12 vistas
Activated sludge process .pdf por 8832RafiyaAltaf
Activated sludge process .pdf
8832RafiyaAltaf
•
9 vistas
802.11 Computer Networks por TusharChoudhary72015
802.11 Computer Networks
TusharChoudhary72015
•
10 vistas
SNMPx por Amatullahbutt
SNMPx
Amatullahbutt
•
17 vistas
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome
•
28 vistas
Effect of deep chemical mixing columns on properties of surrounding soft clay... por AltinKaradagli
Effect of deep chemical mixing columns on properties of surrounding soft clay...
AltinKaradagli
•
6 vistas
Machine Element II Course outline.pdf por odatadese1
Machine Element II Course outline.pdf
odatadese1
•
9 vistas
Searching in Data Structure por raghavbirla63
Searching in Data Structure
raghavbirla63
•
7 vistas
Efficient and Empiric Keyword Search Using Cloud
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 112 Efficient and Empiric Keyword Search Using Cloud S.S. Swethapriyadarshni1, S.Swathi Priya2, P.Yuvarani3, K.Hemapriya4 1’2’3Panimalar Institute of Technology 4Assistant Professor, Dept. of Computer Science Engineering, Panimalar Institute of Technology, Chennai, TamilNadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud is a Centralized Architecture Server, which serves as a platformforeveryuserofthecloudwanted tostoredata and sensitive information’s in safe secured storage space. The next logical stage in the growth of on-demand information technology services and products is cloud computing. Cloud computing will rely on virtualized resources to a considerable extent. Cloud computing allows IT skills to be reused, and it always includes current computing services such as distributed and grid computing. Users can perform a keyword-based search over encrypted material with searchable encryption. The majority of currently available searchable encryption systems arebasedonasinglecloudserverapproach, whichhassome drawbacks, such as a single point of failure and hostile insiders. The multi cloud server strategy, ontheother hand, providesmoredataavailabilityand security. However, transferring existing keyword search strategies to the multi cloud will result in higher storage and search expenses, with no discernible improvement in data security. In addition, unlike single cloud, a challenge in a multi cloud environment is how to adequately check query integrity when certain cloudserversreturninaccurateorincompletedata. Weoffer an iterative encryption approach to assure file privacy even if numerous cloud services collude with one another to ensure data security. Key Words: Cloud computing, Cloud Server, Encryption, Decryption, Multicloud, AES 1. INTRODUCTION Cloud computing has several attributes, blockchain,forwardapproach,andcryptosystem-basedapproachesareaccustomedto preserving security. The cloud infrastructurehasseveral characteristicsthey'reremotelyhosted,ubiquitous,andcommodified. Currently, several firms are delivering cloud services example Google, Microsoft, etc… Virtualization is an associate degree abstraction of execution of the cloud, so virtual machines are used. To preserve the info, the info is encrypted before outsourcing it to the cloud. Cloud sourcing is turning into a giant deal as a result of its high scale usage and has inexpensive suppliers. There are also problems concerning the policy and access that are overcome by the cloud organization. One of the main challenges of the cloud is the constant net throughout the storage of information. Cloud Computing is the sought-after network access split pool organized computing riches. 1.1 SCOPE OF THE PROJECT With searchable encryption, users can do a keyword-based search across encrypted material. The bulk of searchable encryption solutions currently available are based on a single cloud server architecture, whichhasseveral disadvantagessuch as a single point of failure and hostile insiders. The use of several cloud servers, on the other hand, increases data availability and security. Transferring existing keyword search strategies to the multicloud, on the other hand, will increase storage and search costs while providing no noticeable improvement in data security. One of these services is Amazon Elastic Compute Cloud (EC2), which allows users to have a virtual cluster of computers available at all times through the Internet. On AWS, virtual computers have hardware central processing units (CPUs) and graphics processingunits(GPUs)forprocessing,aswell as local/RAM memory, hard disk/SSD storage, a choice of operating systems, networking,andpre-loadedapplicationsoftware such as web servers, databases, and customer relationship management (CRM). The project's goal is to integrate keyword search across various clouds so that users can quickly locate a specific file or data, and to prevent the involvement of third parties so that data is secure and protected. 1.2 EXISTING SYSTEM Without needing to learn the plaintexts, searchable encryption allows a cloud server toconductkeywordsearches onbehalfof data users over encrypted data. The majority of currently available searchable encryption systems, on the other hand, only support single or conjunctive keyword searches, and the few schemes that can perform expressive keyword searches are computationally inefficient because they are built from bilinear pairings over composite-order groups. In existingsystems,an expressive public-key searchable encryption technique in the prime-order groups outperforms existingschemessignificantly by allowing keyword search rules to be defined in conjunctive, disjunctive, or any monotonic Boolean formulas. When a user
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 113 obtains data from a concerned person via the internet, unknown or invalidusersmaygainaccesstothedata stored ona central server or database. It could result in data being lost or altered by a third party. Most existing PEKS methods, regardless of search authorisation, focus on data consumers'richsearchfunctionalities.Theframework allowsclientstosendencrypteddata to the cloud, allows users to search for documents using different keywords, and allows them to check the server's response. 2. PROPOSED SYSTEM Encrypting a file, then making n copies of it, and distributing the n copies to n cloud servers is astraightforward filedistribution solution in numerous clouds. Userscan still retrieve the fileeven if (n-1)cloudserversareofflineinthissituation,indicatingthat this distribution mechanism is highly reliable. The cloud server is merely aware that if it engages in unethical behavior, it will almost certainly be discovered. The suggested design reduces storage overhead on both the client and user sides. The retrieval timelowers as the number of documents increases, cuttingstorage costs forboth parties. However,thismethodnecessitatesan excessive amount of storageoverhead. Furthermore,becauseeachcloudserverhasaccesstotheentireencryptedfile,webuilda secureand reliable file distribution strategy in various clouds to strike a better balance between storageoverhead,privacy,and reliability. We present an iterative encryption strategy inspired by the two-layer encryption scheme to preserve the privacy of data files even if numerous cloud serversstart a collusionattackatthesametime.Inthissystem,userscanalsoproducea unique code to gain access to a record from an authorized individual. It will provide users with a safe access method as well as protect unknown individuals from dangerous activities. Output-1: User login page Output-2: Registration page
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 114 Output-3: Keyword Searching page Output-4: Response page Output-5: AWS Cloud shell
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 115 Output-6: Fetched data from AWS Cloud shell 3. CONCLUSIONS In this, we propose a solid and certain keyword search conspire in different mists, which permits the information client to perform catchphrase search in a safe, dependable, and unquestionable way. To begin with, we proposea solidanddependable document appropriation conspire, which guarantees security throughiterativeencryptionanddependability bypresentingRS deletion code innovation. Second, we plan a Bloom channel tree file structure and extend it to a multi cloud climate. Third, we execute a viable trustworthiness confirmation calculation that can rapidly check the respectability of inquiry results and recognize pernicious cloud servers. At long last, we do security investigation and exploratoryassessmenttocheck thesecurity and viability of our plan. For the future work, first, we will investigate a quicker and more effective record dissemination conspire that permits clients to bear lower reproduction costs. Second, we will stretch out the protected hunt plan to accomplish fluffy question, positioning inquiry, and multi watchword question. REFERENCES [1]. Yunhong Zhou, Shihui Zheng, and Licheng Wang, "Privacy-Preserving and Efficient Public Key Encryption with Keyword Search-Based CP-ABE in Cloud", 13 October 2020. [2]. Qingji Zheng Shouhuai Xu Giuseppe Ateniese, "VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data", the University of Texas at San Antonio, USA Sapienza University of Rome, ItalyandJohnsHopkins University, USA. [3]. Mrs. Zabiha Khan, Assistant Professor, Dept. of CSE, Ghousia College of Engineering, Karnataka, India, Ms. Kamala Kumari, B. K, Rumana Iffath, Saima Ahmed, Zaiba Tabassum UG Students Ghousia College of Engineering, Ramanagaram, "Review of Attribute-based Keyword Search AuthorizationinCloud",www.ijert.orgNConPCS -2017ConferenceProceedingsSpecial Issue - 2017. [4]. XINRUI GE, JIA YU, CHENGYU HU, HANLIN ZHANG, AND RONG HAO, 1. College of Computer Science and Technology, Qingdao University, Qingdao 266071, China,"EnablingEfficientVerifiableFuzzyKeywordSearchOverEncryptedData inCloud Computing", date of current version September 7, 2018. [5]. Lincei, Chungen Xu, Lei Xiaoling Yu, and Cong Zuo, "VerifiableIdentity-BasedEncryption withKeyword SearchforIoTfrom Lattice", Accepted: 24 February 2021. [6]. Shangping Wang, Jian Ye, Yaling Zhang, China, "A keyword searchable attribute-based encryption scheme with attribute update for cloud storage" May 24, 2018.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 116 [7]. Rui Zhang, Rui Xue, Ting Yuyz, and Ling Liux, "PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data", Qatar, Email: tyu@qf.org.qa College of Computing, Georgia Institute of Technology, Atlanta, GA, USA, Email: lingliu@cc.gatech.edu. [8]. A Shiny, Jayanth Das, M Venkat Aravind, C A Anirudh Srivatsaa, M Rahul, "Cloud Server Misbehavior Detection Using Ranked Keyword Search Results Verification", International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-8 Issue-4, April 2019. [9]. R. SaiVenkata Siva Kumar, T.P.Anithaashri, "Enhancement Of Cloud Data Search Using Symmetric-KeyBasedVerification", Chennai, anithaashritp.sse@saveetha.com, European Journal of Molecular & Clinical Medicine ISSN 2515-8260 Volume 07, Issue 08, 2020. [10]. Devi Thiyagarajan, R. Ganesan, "USER VERIFIABLE MULTIPLE KEYWORD SEARCH SCHEME USING THE MERKLE TREE FOR OUTSOURCED DATA IN THE CLOUD", International Journal of Technology(2017) 4:591-600ISSN 2086-9614, (Received: November 2015 / Revised: February 2017 / Accepted: July 2017).
Descargar ahora