Achieving Privacy and Security In Multi Owner Cloud Using Novel Secure Search Protocol And AES
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 9
Abstract
Cloud computing provide benefits of individual users and organizations which minimizes investment and resource usage cost. Data owners forwarding the data to cloud servers without local data management and data users retrieving the data from cloud. Privacy and security considerations earlier research done only single owner model along with secure search. To download all the encoded information and decrypt them locally. Be that as it may, this technique is clearly unrealistic on the grounds that it will bring about a colossal measure of correspondence overhead. Positioned multi-keyword search will cause substantial calculation and capacity costs.Existing schemes are incurring more communication overhead for secure search and these are supporting only single owner model. We present multi owner model with privacy preserving ranked multi-keyword search for reencrypted cloud data by using AES 256 bit provides privacy of data, keywords and trapdoors. A novel dynamic secret key generation protocol is used to prevent attackers from secret key the fting and acting as valid user. Propose approaches minimizes computation and storage cost along with secure search.
Authors and Affiliations
V. B. T. Rajeswari| Dept. of CSE, Aditya Institute of Science & Technology, Surampalem, Kakinada, E.G.dt, AP, India, R. Srinivas| Dept. of CSE, Aditya Institute of Science & Technology, Surampalem, Kakinada, E.G.dt, AP, India
Seismic Analysis And Design of Cantilever Retaining Walls
This project deals with analysis and design with an emphasis laid on effect of earthquake on an important soil retaining structure like cantilever retaining wall. This work also throws light on earthquake damages to...
A review of Data Mining Techniques Using in Big Data
The term Big Data comprises largevolume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly...
Adaptable conveyed administration uprightness verification for software as a service clouds
SaaS gives an adaptable situation through which application administration providers permitted to have their applications in a conveyed domain, with the goal that clients can get to the facilitated administrations in...
Tweet Mining from General Elections of a Country
In previous election of a country for its democratic elections in which social media was targeted as a way to convince the social media users to attract their votes, an analysis of BigData on these elections tweets is...
Distributed Access Control With Unknown Validation Of Information Stored In Clouds
We propose another decentralized access control plan for secure information storage in clouds that backings anonymous validation. In the proposed plan, the cloud checks the arrangement's legitimacy without knowing th...