2,375 Hits in 6.8 sec

A Multi Keyword Searchable Attribute-based Encryption Technique for Data Access Control in Cloud Storage

Prashant Mininath Mane
2020 International Journal of Advanced Trends in Computer Science and Engineering  
In this study, it includes a multi-keyword searchable attribute-based encryption technique with a cloud-based attribute update, which is a hybrid of the attribute-based encryption algorithm and multi-keyword  ...  Multi Authority Cipher-text-policy Attribute-Based Encryption (MA-C-ABE) scheme is a modern form of basic cryptographic and data encryption, which is useful for data cloud storage for fine-grained access  ...  Multi-Keyword Searchable Attribute-Based Encryption Multi-keyword searchable encryption allows legitimate users to produce several keywords over encrypted data in a search query.  ... 
doi:10.30534/ijatcse/2020/104942020 fatcat:6pzotrjewzex3d6iulj6xpyo3q

Multi-Keyword Search Methodology for Cloud Data

Mrs. Kavya B S, Shrilakshmi P V, Sushmitha N, Yamuna S
2017 IJARCCE  
This paper provides multi-keyword ranked search over the encrypted cloud data (MRSE).It is implemented using RSA algorithm through effective key generation.  ...  In our future work,we will explore the other multi-keyword semantics over encrypted cloud data and check for the integrity of the rank order.  ...  A secure tree based search scheme over the encrypted cloud data is proposed which supports multi-keyword ranked search over cloud data for end users.  ... 
doi:10.17148/ijarcce.2017.6422 fatcat:763amabgd5c5ralq4oaafhcwdu

A Survey on Secure Ranked Keyword Search over Outsourced Encrypted Cloud Data

Akash Tidke
2021 International Journal for Research in Applied Science and Engineering Technology  
In this paper we present a survey on keyword based searching algorithms. Various searching techniques are used for retrieving the encrypted data from cloud servers.  ...  It concludes that till now multi-keyword ranked search MRSE scheme is the best methodology for searching the encrypted data.  ...  Attribute based Encryption In distributed settings with untrusted servers, like the cloud, many applications need mechanisms for complex accesscontrol over encrypted data.  ... 
doi:10.22214/ijraset.2021.35184 fatcat:ars7ok7ifberxb3fl2juaoz7pu

Review on Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing

R. Rakesh, Anoop S.
2016 International Journal of Computer Applications  
It is an effective method which is considered as best solution to build a practical data sharing system based on public cloud storage.  ...  to submit a single aggregate trapdoor to the cloud server, so that he/she can query over the shared documents by the help of generated single aggregate trapdoor.  ...  In the description [16] [17] [18] [19] [20] [21] , by applying the attribute based encryption, it achieves more fine access control which is based on keyword searching.  ... 
doi:10.5120/ijca2016909101 fatcat:37iwvmpzibeh5oyu7pemfq4w5m

Authorized Private Keyword Search over Encrypted Data in Cloud Computing

Ming Li, Shucheng Yu, Ning Cao, Wenjing Lou
2011 2011 31st International Conference on Distributed Computing Systems  
, and establish a scalable framework for Authorized Private Keyword Search (APKS) over encrypted cloud data.  ...  Encryption is a promising way to protect the confidentiality of the outsourced data, but it also introduces much difficulty to performing effective searches over encrypted information.  ...  CONCLUDING REMARKS In this paper, we address the problem of authorized private keyword searches over encrypted data in cloud computing, where multiple data owners encrypt their records along with a keyword  ... 
doi:10.1109/icdcs.2011.55 dblp:conf/icdcs/LiYCL11 fatcat:iidjk26ux5f7fm4dpmgyacdxam


SadeerDheyaa Abdulameer.
2017 International Journal of Advanced Research  
This is in contrast to [6] , where the data users interact with the data owners/trusted authorities to obtain search tokens. Keyword Search over Encrypted Data.  ...  credentials can generate tokens that can be used to search over the outsourced encrypted data.  ... 
doi:10.21474/ijar01/3636 fatcat:nkkrzx4uovf2hgrfqwjlzlifda

Survey on Regenerating Code Based Revocable and Searchable ABE Scheme for Mobile Cloud Storage

Jayesh Sahebrav Patil, Prashant Mininath Mane
2018 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
supports the Keyword search over encrypted data in the mobile cloud storage.  ...  In multi keyword search; data owners and users can generate the keywords index and search trapdoor, respectively, without relying on always online trusted authority.  ...  In paper [11] authors proposes searchable encryption schemes that enable the clients to store the encrypted data to the cloud and execute keyword search over ciphertext domain.  ... 
doi:10.32628/cseit183895 fatcat:kruj2prwxjhwdm2qbijposfxha

Efficient Multi-Keyword Search Through Ciphertext Data in the Cloud

2019 International Journal of Engineering and Advanced Technology  
In this task, the cipher text policy attribute-based encryption (CPABE) algorithm is used to perform encryption of files and documents.  ...  This work aims to develop a systematic approach to searching multi keywords in the cloud with ciphertext data.  ...  ALGORITHM The proposed work aims to perform multi-keywords search over cipher text data.  ... 
doi:10.35940/ijeat.f8534.088619 fatcat:5vmsol3vtvaytiyfgiwnzdovry

A Novel User Revocation And Secure Multi Keyword Ranked Search Scheme Over Encrypted Data

Beulah Rani Gorremuchu, Naga Sriharsha Mulugu
2016 IOSR Journal of Computer Engineering  
As our existing system we noticed some of the privacy challenges over multi-keyword ranked search from the cloud server. i.e user revocation and lack of encryption scheme over index structure.  ...  by Diffie Hellman Algorithms: This algorithm is basically used to generate keys., and Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data  ...  Conclusion In this paper we suggested solutions for user revocations and data integrity issues related to multiowner framework for multi keyword ranked search Scheme over encrypted data, we have presented  ... 
doi:10.9790/0661-1805056063 fatcat:aset4doozvch5ohwca5422jytq

Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search

Fangming ZHAO, Takashi NISHIDE, Kouichi SAKURAI
2014 IEICE transactions on information and systems  
Our fine-grained access control aware multi-user secure keyword search approach interdependently harmonizes these two security notions, access control and encrypted keyword search.  ...  We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting.  ...  Acknowledgments Authors would like to thank Professor Kazuo Ohta, Professor Yoshiaki Hori, Dr. Goichiro Hanaoka, and Professor Robert H. Deng for their valuable and suggestive comments.  ... 
doi:10.1587/transinf.e97.d.1790 fatcat:w5ry2njozncm7bwc7uv7sowy7a

A Multi-attribute Keyword Retrieval Mechanism for Encrypted Cloud Data

Yunfa Li, Mingyi Li, Yangyang Shen
2016 International Journal of Security and Its Applications  
But it is very difficult question that how to effective retrieval and to use the encrypted data, we propose a multi-attribute keyword retrieval mechanism for encrypted cloud data.  ...  With the development of cloud computing technology, more and more users have outsourced their data to cloud platform. To protect the safety of these data, some encryption methods are usually used.  ...  Acknowledgments This paper is a revised and expanded version of a paper entitled "Multi -attribute Fuzzy Keyword Retrieval Method for Secure Data Service in Cloud Computing" presented at the 9th International  ... 
doi:10.14257/ijsia.2016.10.12.27 fatcat:q5556e5nobce7kktuo22payyx4

Safe Multi Keyword Ranked Search over Encrypted Cloud Data

Pradnya H., Arti Mohanpurkar
2016 Communications on Applied Electronics  
In subsisting system, for the first instance, the conundrum of privacypreserving multi-keyword ranked search over encrypted data in cloud computing (MRSE) is define and solve.  ...  General Terms Multi keyword Rank search, MD Algorithm, vector Space Model.  ...  Verifiable Privacy Preserving Multi-keyword Text Search in cloud supporting similarity-Based Ranking, Wenhai Sun et al [2] , Secure Ranked Keyword Search over Encrypted Cloud Data, C.  ... 
doi:10.5120/cae2016652309 fatcat:6qedcs36xfaldae2gf37nk252u

A Review on Enabling Synonym Based Fined-grained Multi-keyword Search Using Hierarchical Clustering

Miss.Pawar Pratima Prakash
In previous system, single keyword or Boolean keyword search is provided over an encrypted data. MRSE is the multi keyword ranked searching technique for efficient searching over an encrypted data.  ...  Before outsourcing of data on cloud user encrypt it as per security concern. Other users can use cloud data by downloading and decrypting it from cloud.  ...  MRSE-HCI is multi-keyword ranked search over encrypted data based on hierarchical clustering index. In MRSE-HCI, search time is increases linearly as aggressive growing size of data collection.  ... 
doi:10.18535/ijetst/v3i12.11 fatcat:vxificufy5d2ppara3uydpjanq

Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing [chapter]

Wenhai Sun, Wenjing Lou, Y. Thomas Hou, Hui Li
2013 Secure Cloud Computing  
Search over encrypted data is a technique of great interest in the cloud computing era, because many believe that sensitive data has to be encrypted before outsourcing to the cloud servers in order to  ...  This chapter provides a basic introduction to the problem definition, system model, and reviews the state-of-the-art mechanisms for implementing privacy-preserving keyword search over encrypted data.  ...  [10] , for the first time, explore the problem of multi-keyword ranked search over encrypted cloud data (MRSE), and establish a set of strict privacy requirements for such a secure cloud data utilization  ... 
doi:10.1007/978-1-4614-9278-8_9 fatcat:neckj7ezarhozbsaueh7neyndi


Naveen Kumar C.G .
2017 International Journal of Research in Engineering and Technology  
The data is hived away in encrypted form to prevent anonymity activities. Reachability is one of the issues faced between cloud users and LBS companies.  ...  The cloud technologies are very much improved that attracts many Location based Services (LBS) companies.  ...  The author in [11] framed search method based on Identity based Encryption. Their method supported a single query as well as multi queries.  ... 
doi:10.15623/ijret.2017.0601022 fatcat:usku52qo7vfyvimfx2yyzgtoji
« Previous Showing results 1 — 15 out of 2,375 results