Research on Decryption Methodologies and Key Aggregate Searchable Encryption for Data Security Storage in Cloud

Abstract

Numerous firm’s architectures management of data guarantees substantially alter method, gain access to maintain private commercial business. Occur additional facts protection problems. Existing statistics safety methods have limits in preventing records legal assaults, in particular these performed by utilizing companion diploma business executives to the cloud dealer to monitor data get right of entry to within the cloud and find out unusual records get right of entry to. Sorts require method of building a machine robust protection privateer’s statistic through files person team customer’s technique much documents. Not simply the encryption keys but also the search keys need to be utilized and consumers have to keep their keys resistant and disseminated. The cutting-edge current gadget the place the facts proprietor can solely share one key with the user, whether or not it is any kind of document, massive or small variety of documents, and the function of the person is to cross a lure in the cloud of overall performance checking out and safety evaluation of shared documents, which is an impenetrable and superb proposed gives schemes. And consumers are also extremely concerned about data sharing storage, inexplicable information leak in the cloud, and harmful attackers. In the article, an experiment is done to format a method for encryption for impenetrable statistics allocation.

Authors and Affiliations

Sunaina Bagga

Keywords

Related Articles

Big Data Analysis: Concepts, Challenges And Opportunities

Big Data has the potential to bring valued insights for advanced decision making. It has become a trending practice to adopt Big Data into their process. It has attracted both the academicians as well as the industry peo...

Evolving Constraints in Military Applications using Wireless Sensor Networks

WSNs consist of a large number of small sensor nodes. These nodes are very cheap in terms of cost. In military operations, there is always a threat of being attacked by enemies. So, the use of these cheap sensor nodes wi...

Predict the Readmission Patterns of Chronic Diseases Using Machine Learning

Machine learning plays an essential role in predicting presence or obsence of locomotor disorders. The diseases like heart, diabetes, cancer, kidney we collect data and such information if predicted well in advance can p...

A Review Paper on the Difference between Single-Cycle and Multi Cycle Processor

The processors are all important components of computer architecture. Computer architecture is a specification that describes how hardware and software technologies are connected to create a computer platform. It refers...

Syllabic Units Automatically Segmented Data for Continuous Speech Recognition

We present novel approach for constant speech processing in which the detection and recognition tasks are separated A syllable is utilized as a measure both to detection and localization. A minimal phase’s group delay ch...

Download PDF file
  • EP ID EP747149
  • DOI 10.55524/ijircst.2021.9.6.69
  • Views 26
  • Downloads 0

How To Cite

Sunaina Bagga (2021). Research on Decryption Methodologies and Key Aggregate Searchable Encryption for Data Security Storage in Cloud. International Journal of Innovative Research in Computer Science and Technology, 9(6), -. https://europub.co.uk./articles/-A-747149