SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
VERIFIABLE AND MULTI-KEYWORD SEARCHABLE ATTRIBUTE-
BASED ENCRYPTION SCHEME FOR CLOUD STORAGE
Dr.E.Punarselvam1
,Mr.M.Dhamodaran2
, M.Saravanan3
, S.Sasidharan3
,
S.Sreedhar3
, K.Vignesh3
E-Mail:1.hod.it@mec.edu.in,punarselvam83@gmail.com,2.dhamodaran.m.it@mec.edu.in
1. Head of the department, 2.Assistant Professor, 3.Final Year student
Department of Information Technology, Muthayammal Engineering College, Tamilnadu.
ABSTRACT
The success of the cloud computing paradigm is due to its on-demand, self-service, and
pay-by-use nature. Public key encryption with keyword search applies only to the certain
circumstances that keyword cipher text can only be retrieved by a specific user and only supports
single-keyword matching. In the existing searchable encryption schemes, either the
communication mode is one-to-one, or only single-keyword search is supported. This paper
proposes a searchable encryption that is based on attributes and supports multi-keyword search.
Searchable encryption is a primitive, which not only protects data privacy of data owners but
also enables data users to search over the encrypted data. Most existing searchable encryption
schemes are in the single-user setting. There are only few schemes in the multiple data users
setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend
on a trusted third party with interactive search protocols or need cumbersome key management.
To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption
to enable attribute-based keyword search (ABKS).
KEYWORDS: Public Key, Encryption Schemes, ABKS,Data Sharing.
International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
1. INTRODUCTION
With the development of cloud
computing, many of information can be
shared through computer networks. The
cloud server (CS) can provide users with a
variety of services, such as outsourcing
commission calculations and data storage.
Users can store their large amounts of data
to the CS and share data with other users.
For the purpose of the security of storage
data and user’s privacy, data is usually
stored in encrypted form in CS. However,
under this environment users will encounter
a difficulty problem of how to search
keyword in cipher text. Searchable
Encryption (SE) is a cryptographic
technology that has been developed for
many years, which supports users’ keyword
search in cipher text. In the meanwhile, it
can save a lot of network and computational
overhead for user, and take advantage of the
huge computing power of CS. The SE
technology mainly solves the problem of
how to use the server to complete the search
for interesting keywords when the data is
encrypted and stored in CS, but CS is not
completely trusted. How to improve the
efficiency of keyword search while reducing
local computing load is still a problem to be
solved. Most of existing schemes support
single-keyword search. Single-keyword
search waste network bandwidth and
computing resources, as this search method
returns a large number of results, this means
that the search result is not accurate. That is,
when a data user uses multi- keyword
search, the cloud sever will return relatively
few number of files containing these
multikeyword, thus the search result is much
more accurate than when a data user uses
one keyword search. In order to solve this
problem, multi-keyword search is proposed.
Most of existing attribute-based encryption
(ABE) schemes have high computational
costs at user client. These problems greatly
limit the applications of ABE schemes in
practice.
Specifically, our scheme supports
three functions: (1) multiple keyword
searches; (2) full outsourcing; (3)
verifiability of outsourced private keys.
Therefore, by changing some specific
constructions of the algorithm, the three
main advantages of our scheme can be
extended to the general attribute-based
encryption scheme (such as the encryption
scheme without considering the local
computing burden, or the encryption scheme
lacking the cipher text search). Achieve the
ability to reduce local computing storage
and accurately search cipher text.
International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
Cloud computing is the use of
computing resources (hardware and
software) that are delivered as a service over
a network (typically the Internet). The name
comes from the common use of a cloud-
shaped symbol as an abstraction for the
complex infrastructure it contains in system
diagrams. Cloud computing entrusts remote
services with a user's data, software and
computation. Cloud computing consists of
hardware and software resources made
available on the Internet as managed third-
party services. These services typically
provide access to advanced software
applications and high-end networks of
server computers.
Figure 1 Structure of cloud computing
Cloud Computing Works
The goal of cloud computing is to
apply traditional supercomputing, or high-
performance computing power, normally
used by military and research facilities, to
perform tens of trillions of computations per
second, in consumer-oriented applications
such as financial portfolios, to deliver
personalized information, to provide data
storage or to power large, immersive
computer games.
The cloud computing uses networks of large
groups of servers typically running low-cost
consumer PC technology with specialized
connections to spread data-processing
chores across them. This
shared IT infrastructure contains large pools
of systems that are linked together.
Often, virtualization techniques are used to
maximize the power of cloud computing.
2.CHARACTERISTICSAND SERVICES
MODELS
The salient characteristics of cloud
computing based on the definitions provided
by the National Institute of Standards and
Terminology (NIST) are outlined below:
ď‚· On-demand self-service: A
consumer can unilaterally provision
computing capabilities, such as
server time and network storage, as
needed automatically without
requiring human interaction with
each service’s provider.
International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
ď‚· Broad network access: Capabilities
are available over the network and
accessed through standard
mechanisms that promote use by
heterogeneous thin or thick client
platforms (e.g., mobile phones,
laptops, and PDAs).
 Resource pooling: The provider’s
computing resources are pooled to
serve multiple consumers using a
multi-tenant model, with different
physical and virtual resources
dynamically assigned and reassigned
according to consumer demand.
There is a sense of location-
independence in that the customer
generally has no control or
knowledge over the exact location of
the provided resources but may be
able to specify location at a higher
level of abstraction (e.g., country,
state, or data center). Examples of
resources include storage,
processing, memory, network
bandwidth, and virtual machines.
ď‚· Rapid elasticity: Capabilities can be
rapidly and elastically provisioned,
in some cases automatically, to
quickly scale out and rapidly
released to quickly scale in. To the
consumer, the capabilities available
for provisioning often appear to be
unlimited and can be purchased in
any quantity at any time.
ď‚· Measured service: Cloud systems
automatically control and optimize
resource use by leveraging a
metering capability at some level of
abstraction appropriate to the type of
service (e.g., storage, processing,
bandwidth, and active user
accounts). Resource usage can be
managed, controlled, and reported
providing transparency for both the
provider and consumer of the
utilized service.
3. SERVICES MODELS
Cloud Computing comprises three
different service models, namely
Infrastructure-as-a-Service (IaaS), Platform-
as-a-Service (PaaS), and Software-as-a-
Service (SaaS). The three service models or
layer are completed by an end user layer that
encapsulates the end user perspective on
cloud services. The model is shown in figure
below. If a cloud user accesses services on
the infrastructure layer, for instance, she can
run her own applications on the resources of
a cloud infrastructure and remain
responsible for the support, maintenance,
and security of these applications herself. If
International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
she accesses a service on the application
layer, these tasks are normally taken care of
by the cloud service provider.
4.EXISTING SYSTEM
Public Key Encryption (PKE), the
privacy required by means of the patients
could stand ensured. Up in conformity with
now, much cryptographic encryptions
strategies bear been proposed after fulfill the
necessities about privacy- retaining in
tremendous records storage. However, near
encryption strategies such as like the masses
key encryption are no longer anonymous,
i.e., salvo the adversaries reap the cipher
texts, that may effortlessly be aware of the
owner regarding the cipher text as like
nicely as whoever desire get hold of the
cipher text. The PKE can't acquire the
anonymity concerning the customer’s ship
then get hold of the cipher text, hence
private facts may additionally remain
leaked. If an opposite is capable after
achieve the cipher text, that perform
recognize whose solution the cipher textual
content is encrypted under, accordingly
understanding the proprietor of the cipher
text.
4.1 DISADVANTAGES
ď‚· Encryption strategies such so the
populace authorization encryption
are not anonymous.
ď‚· The adversaries reap the cipher texts,
he do without problems are aware of
the proprietor regarding the cipher
text so nicely as whomever intention
gets hold of the cipher text.
ď‚· They might also will according part
records only including receivers who
have certain attributes. Data carriers
then receivers hold to affirm the truth
concerning each lousy according to
redact sure that data or the identity
won’t keep leaked out.
ď‚· The attributes additionally need
according to keep protected.
5. PROPOSED SYSTEM
This proposes a searchable
encryption that is based on attributes and
supports multi-keyword search. Searchable
encryption is a primitive, which not only
protects data privacy of data owners but also
enables data users to search over the
encrypted data. Most existing searchable
encryption schemes are in the single-user
setting. There are only few schemes in the
multiple data users setting, i.e., encrypted
data sharing. Among these schemes, most of
International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
the early techniques depend on a trusted
third party with interactive search protocols
or need cumbersome key management. To
remedy the defects, the most recent
approaches borrow ideas from attribute-
based encryption to enable attribute-based
keyword search (ABKS).
5.1ADVANTAGES
ď‚· First proposed the notion about the
privacy about the keys is high
secure.
ď‚· The most recent approaches borrow
ideas from attribute-based encryption
to enable attribute-based keyword
search (ABKS).
ď‚· Achieving attributes authentication
earlier than re-encryption, or
ensuring the protection over the
attributes and data.
ď‚· Receivers whoever are certified in
imitation of know the information do
use their keys in conformity with
decrypt the cipher text, however
others cannot, consequently data
providers’ privations be able stand
protected.
ď‚· To perfect the current PRE system
considered the scenario to that
amount information companies may
additionally need the records to stay
conditionally shared. That capability
receiver just gains a quantity on the
facts as an alternative on the whole.
Such deference is greater close in
imitation of the reality.
6.METHODOLOGYS
• Attribute Authority
• Cloud Server
• Key Generation Server
• Data Owner
• Data User
Attribute Authority (AA)
The AA is attribute authority, which
is responsible for system's initial
establishment and the local secret key
generation of data user. Simultaneously, it
distributes corresponding secret key
according to attribute set for data user.
When an attribute is revoked, AA generates
an update key and completes partial secret
key update.
Cloud Server (CS)
The CS stores cipher text which
containing encrypted files and keyword
indexes generated by data owners.
Afterwards, when a data user tends to search
cipher text, CS completes a matching of data
user's token and keyword index. If matching
International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
succeeds, it sends cipher text to data user.
Additionally, in attribute revocation phase,
CS is responsible for updating cipher text.
Key Generation Server (KGS)
The KGS generates data user's
partial secret key, namely outsourced secret
key, which effectively reduces the
computational burden of AA. Besides, KGS
is responsible for completing the update of
outsourced secret key when attribute
revocation happens.
Data Owner (DO)
The DO encrypts keyword set and
file to be shared, uploads cipher text to
cloud server. Only attribute set of data user
who wants to access data satisfies access
structure in cipher text. The encrypted data
will be shared with data user. To be specific,
the encryption operation to be completed by
DO includes: the keyword index generation,
the file encryption, and the encryption of
key for encrypted file, hence cipher text
consists of three parts.
Data User (DU)
When data user's attribute set
satisfies access structure in cipher text, then
data user DU is able to access encrypted
data and recover original plaintext.
Specifically, DU generates desired keyword
token and sends to cloud server CS, the CS
makes a matching between search token and
keyword index, if matching succeeds, DU
can download corresponding cipher text. In
other words, DU is responsible for
generating keyword token which he is
interested in and decrypting cipher text.
7. CONCLUSION
In this article we proposed VMKS-
ABE scheme. In our scheme, we combine
the verifiable of the correctness of
outsourced private key with multi-keyword
search based on attribute encryption. In the
general group model, the security of
keyword index is proved. Under the random
oracle model, the cipher text is proved to be
selectively secure. In this article we
proposed VMKS-ABE scheme. In our
scheme, we combine the verifiable of the
correctness of outsourced private key with
multi-keyword search based on attribute
encryption. In the general group model, the
security Since the security in the general
group model is much weak than in the
standard model, it is worth constructing
verifiable and multi-keyword searchable
scheme in the standard model.
International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
8. FUTURE ENHANCEMENTS
The verifiable of the correctness of
outsourced private key with multi-keyword
search based on attribute encryption. In the
general group model, the security of
keyword index is proved. Under the random
oracle model, the cipher text is proved to be
selectively secure.
9.REFERENCES
[1] M. C. Mont, K. McCorry, N.
Papanikolaou, and S. Pearson, “Security and
privacy governance in cloud computing via
SLAS and a policy orchestration service,” in
Proc. 2nd Int. Conf. Cloud Comput. Serv.
Sci., 2012, pp. 670–674.
[2] E.Punarselvam,“Bio-Medical Analysis of
lumbar spine image using Gobar filter and
canny edge detection algorithm of MRI”,
International Journal of Research in
computer applications and Robotics,Vol.1
Issue No.8 Nov 2013 PP(42-50)
ISSN:2320-7345.
[3] C. Metz. (2009, Oct.).DDoS attack rains
down on Amazon Cloud [Online].
Available:
http://www.theregister.co.uk/2009/10/05/am
azon_bitbucket_outage/S
[4] K. Lu, D. Wu, J. Fan, S. Todorovic, and
A. Nucci, “Robust and efficient detection of
DDoS attacks for large-scale internet,”
Comput.Netw., vol. 51, no. 18, pp. 5036–
5056, 2007.
[5] E.Punarselvam,”Comparative analysis of
Bio-CAD Technique and Canny Edge
detection Algorithm for Lumbar spine
images using Finite Element Method”,
International Journal of Engineering
Research and Management, Vol. 1 Issue
No.8 November 2014 PP(165-168)
ISSN:2349-2058..
[6] J. Li, Q.Wang,C.Wang,N. Cao,K. Ren,
and W. Lou, "Fuzzy keyword search over
encrypted data in cloud computing,"
International Journal of Engineering
Research and Applications, vol. 4, no. 7, pp.
441-445, May 2014, doi:
10.1109/INFCOM.2010.5462196.
[7] W. Sun, S. Yu, W. Lou, Y. Hou, and H.
Li, "Protecting Your Right: Verifiable
Attribute-BasedKeywordSearchwith Fine-
Grained Owner- Enforced Search
Authorization in the Cloud," IEEE
INFOCOM, vol. 27, no. 4, pp. 226-234, Jul.
2014, doi:
10.1109/INFOCOM.2014.6847943.
International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020
[8] Dr.E.Punarselvam,“Robust Data
Collection with Multiple Sink Zone In 3-D
Underwater Sensor Networks”, in
International Journal on Applications in
Basic and Applied Sciences, vol. 5, Issue
no. 1, December 2019,PP 8-14.ISSN 2455 –
1007
[9] Y. Ye, J. Han,W. Susilo, T. H. Yuen,
and J. Li, "ABKS-CSC: attributebased
keyword search with constant-size
ciphertexts," Security & Communication
Networks, vol. 9, no. 18, pp. 5003-5015,
Oct. 2016, doi: org/10.1002/sec.1671.
[10] Dr.E.Punarselvam,“Effective and
Efficient Traffic Scrutiny in Sweet Server
with Data Privacy”, International Journal on
Applications in Information and
Communication Engineering Volume 5 :
Issue 2: November 2019, PP 1 – 5
[11] A. Sahai and B. Waters, "Fuzzy
identity-based encryption," In Advances in
Cryptology – EUROCRYPT, Cramer R.
Eds. Berlin, Germany: Springer, 2005, pp.
457-473.
[12] V. Goyal, O. Pandey, A. Sahai, and B.
Waters, "Attribute -based encryption for
fine-grained access control of encrypted
data," in Proc. 13th ACM Conf. Comput.
Commun.Secur.(CCS), New York, NY,
USA: ACM, 2006, pp. 89-98.
[13] E.Punarselvam, “Privacy and Secured
Multiparty Data Categorization using Cloud
Resources”, International Journal of
Innovative Research in Science, Engineering
and Technology, ISSN(Online) : 2319 –
8753,ISSN (Print) : 2347-6710 Vol. 4,
Special Issue 6,May 2015,pp 336-343 [14]
B. Waters, "Ciphertext-Policy Attribute-
Based Encryption: An Expressive, Efficient,
and Provably Secure Realization," In Public
Key Cryptography – PKC, D. Catalano, N.
Fazio, R. Gennaro, A. Nicolosi Eds. Berlin,
Germany: Springer, 2011, pp. 53-70.
[15] Dr.E.Punarselvam,“Heart Attack
Recognition and Heart Rate Monitoring
System Using IOT”,in International Journal
on Applications in Engineering and
Technology, Vol. 5, Issue no.
2, December 2019,PP.5-10.ISSN 2455 -
0523

More Related Content

What's hot

IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET-  	  Fish Recognition and Detection Based on Deep LearningIRJET-  	  Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep LearningIRJET Journal
 
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...IJCSEA Journal
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniqueseSAT Journals
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniqueseSAT Publishing House
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET Journal
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET Journal
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET Journal
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensorijtsrd
 
IRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET Journal
 
Home security system using internet of things
Home security system using internet of thingsHome security system using internet of things
Home security system using internet of thingspoovarasu maniandan
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET Journal
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
 
C6524029320
C6524029320C6524029320
C6524029320aissmsblogs
 

What's hot (20)

IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET-  	  Fish Recognition and Detection Based on Deep LearningIRJET-  	  Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
 
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
 
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray CastingIRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
 
IRJET - Smart Yoga Instructor
IRJET - Smart Yoga InstructorIRJET - Smart Yoga Instructor
IRJET - Smart Yoga Instructor
 
Home security system using internet of things
Home security system using internet of thingsHome security system using internet of things
Home security system using internet of things
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
C6524029320
C6524029320C6524029320
C6524029320
 

Similar to verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud securityBalkees Shereek
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPAM Publications
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search SchemesIRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
710201940
710201940710201940
710201940IJRAT
 

Similar to verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage (20)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Retrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTPRetrieving Secure Data from Cloud Using OTP
Retrieving Secure Data from Cloud Using OTP
 
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET-  	  Privacy Preserving Encrypted Keyword Search SchemesIRJET-  	  Privacy Preserving Encrypted Keyword Search Schemes
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
710201940
710201940710201940
710201940
 

More from IJET - International Journal of Engineering and Techniques

More from IJET - International Journal of Engineering and Techniques (20)

Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
IJET-V3I2P16
 
IJET-V3I2P15
IJET-V3I2P15IJET-V3I2P15
IJET-V3I2P15
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoĂŁo Esperancinha
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage

  • 1. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020 VERIFIABLE AND MULTI-KEYWORD SEARCHABLE ATTRIBUTE- BASED ENCRYPTION SCHEME FOR CLOUD STORAGE Dr.E.Punarselvam1 ,Mr.M.Dhamodaran2 , M.Saravanan3 , S.Sasidharan3 , S.Sreedhar3 , K.Vignesh3 E-Mail:1.hod.it@mec.edu.in,punarselvam83@gmail.com,2.dhamodaran.m.it@mec.edu.in 1. Head of the department, 2.Assistant Professor, 3.Final Year student Department of Information Technology, Muthayammal Engineering College, Tamilnadu. ABSTRACT The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Public key encryption with keyword search applies only to the certain circumstances that keyword cipher text can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS). KEYWORDS: Public Key, Encryption Schemes, ABKS,Data Sharing.
  • 2. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020 1. INTRODUCTION With the development of cloud computing, many of information can be shared through computer networks. The cloud server (CS) can provide users with a variety of services, such as outsourcing commission calculations and data storage. Users can store their large amounts of data to the CS and share data with other users. For the purpose of the security of storage data and user’s privacy, data is usually stored in encrypted form in CS. However, under this environment users will encounter a difficulty problem of how to search keyword in cipher text. Searchable Encryption (SE) is a cryptographic technology that has been developed for many years, which supports users’ keyword search in cipher text. In the meanwhile, it can save a lot of network and computational overhead for user, and take advantage of the huge computing power of CS. The SE technology mainly solves the problem of how to use the server to complete the search for interesting keywords when the data is encrypted and stored in CS, but CS is not completely trusted. How to improve the efficiency of keyword search while reducing local computing load is still a problem to be solved. Most of existing schemes support single-keyword search. Single-keyword search waste network bandwidth and computing resources, as this search method returns a large number of results, this means that the search result is not accurate. That is, when a data user uses multi- keyword search, the cloud sever will return relatively few number of files containing these multikeyword, thus the search result is much more accurate than when a data user uses one keyword search. In order to solve this problem, multi-keyword search is proposed. Most of existing attribute-based encryption (ABE) schemes have high computational costs at user client. These problems greatly limit the applications of ABE schemes in practice. Specifically, our scheme supports three functions: (1) multiple keyword searches; (2) full outsourcing; (3) verifiability of outsourced private keys. Therefore, by changing some specific constructions of the algorithm, the three main advantages of our scheme can be extended to the general attribute-based encryption scheme (such as the encryption scheme without considering the local computing burden, or the encryption scheme lacking the cipher text search). Achieve the ability to reduce local computing storage and accurately search cipher text.
  • 3. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the common use of a cloud- shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation. Cloud computing consists of hardware and software resources made available on the Internet as managed third- party services. These services typically provide access to advanced software applications and high-end networks of server computers. Figure 1 Structure of cloud computing Cloud Computing Works The goal of cloud computing is to apply traditional supercomputing, or high- performance computing power, normally used by military and research facilities, to perform tens of trillions of computations per second, in consumer-oriented applications such as financial portfolios, to deliver personalized information, to provide data storage or to power large, immersive computer games. The cloud computing uses networks of large groups of servers typically running low-cost consumer PC technology with specialized connections to spread data-processing chores across them. This shared IT infrastructure contains large pools of systems that are linked together. Often, virtualization techniques are used to maximize the power of cloud computing. 2.CHARACTERISTICSAND SERVICES MODELS The salient characteristics of cloud computing based on the definitions provided by the National Institute of Standards and Terminology (NIST) are outlined below: ď‚· On-demand self-service: A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service’s provider.
  • 4. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020 ď‚· Broad network access: Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs). ď‚· Resource pooling: The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location- independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or data center). Examples of resources include storage, processing, memory, network bandwidth, and virtual machines. ď‚· Rapid elasticity: Capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time. ď‚· Measured service: Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be managed, controlled, and reported providing transparency for both the provider and consumer of the utilized service. 3. SERVICES MODELS Cloud Computing comprises three different service models, namely Infrastructure-as-a-Service (IaaS), Platform- as-a-Service (PaaS), and Software-as-a- Service (SaaS). The three service models or layer are completed by an end user layer that encapsulates the end user perspective on cloud services. The model is shown in figure below. If a cloud user accesses services on the infrastructure layer, for instance, she can run her own applications on the resources of a cloud infrastructure and remain responsible for the support, maintenance, and security of these applications herself. If
  • 5. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020 she accesses a service on the application layer, these tasks are normally taken care of by the cloud service provider. 4.EXISTING SYSTEM Public Key Encryption (PKE), the privacy required by means of the patients could stand ensured. Up in conformity with now, much cryptographic encryptions strategies bear been proposed after fulfill the necessities about privacy- retaining in tremendous records storage. However, near encryption strategies such as like the masses key encryption are no longer anonymous, i.e., salvo the adversaries reap the cipher texts, that may effortlessly be aware of the owner regarding the cipher text as like nicely as whoever desire get hold of the cipher text. The PKE can't acquire the anonymity concerning the customer’s ship then get hold of the cipher text, hence private facts may additionally remain leaked. If an opposite is capable after achieve the cipher text, that perform recognize whose solution the cipher textual content is encrypted under, accordingly understanding the proprietor of the cipher text. 4.1 DISADVANTAGES ď‚· Encryption strategies such so the populace authorization encryption are not anonymous. ď‚· The adversaries reap the cipher texts, he do without problems are aware of the proprietor regarding the cipher text so nicely as whomever intention gets hold of the cipher text. ď‚· They might also will according part records only including receivers who have certain attributes. Data carriers then receivers hold to affirm the truth concerning each lousy according to redact sure that data or the identity won’t keep leaked out. ď‚· The attributes additionally need according to keep protected. 5. PROPOSED SYSTEM This proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of
  • 6. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020 the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute- based encryption to enable attribute-based keyword search (ABKS). 5.1ADVANTAGES ď‚· First proposed the notion about the privacy about the keys is high secure. ď‚· The most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS). ď‚· Achieving attributes authentication earlier than re-encryption, or ensuring the protection over the attributes and data. ď‚· Receivers whoever are certified in imitation of know the information do use their keys in conformity with decrypt the cipher text, however others cannot, consequently data providers’ privations be able stand protected. ď‚· To perfect the current PRE system considered the scenario to that amount information companies may additionally need the records to stay conditionally shared. That capability receiver just gains a quantity on the facts as an alternative on the whole. Such deference is greater close in imitation of the reality. 6.METHODOLOGYS • Attribute Authority • Cloud Server • Key Generation Server • Data Owner • Data User Attribute Authority (AA) The AA is attribute authority, which is responsible for system's initial establishment and the local secret key generation of data user. Simultaneously, it distributes corresponding secret key according to attribute set for data user. When an attribute is revoked, AA generates an update key and completes partial secret key update. Cloud Server (CS) The CS stores cipher text which containing encrypted files and keyword indexes generated by data owners. Afterwards, when a data user tends to search cipher text, CS completes a matching of data user's token and keyword index. If matching
  • 7. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020 succeeds, it sends cipher text to data user. Additionally, in attribute revocation phase, CS is responsible for updating cipher text. Key Generation Server (KGS) The KGS generates data user's partial secret key, namely outsourced secret key, which effectively reduces the computational burden of AA. Besides, KGS is responsible for completing the update of outsourced secret key when attribute revocation happens. Data Owner (DO) The DO encrypts keyword set and file to be shared, uploads cipher text to cloud server. Only attribute set of data user who wants to access data satisfies access structure in cipher text. The encrypted data will be shared with data user. To be specific, the encryption operation to be completed by DO includes: the keyword index generation, the file encryption, and the encryption of key for encrypted file, hence cipher text consists of three parts. Data User (DU) When data user's attribute set satisfies access structure in cipher text, then data user DU is able to access encrypted data and recover original plaintext. Specifically, DU generates desired keyword token and sends to cloud server CS, the CS makes a matching between search token and keyword index, if matching succeeds, DU can download corresponding cipher text. In other words, DU is responsible for generating keyword token which he is interested in and decrypting cipher text. 7. CONCLUSION In this article we proposed VMKS- ABE scheme. In our scheme, we combine the verifiable of the correctness of outsourced private key with multi-keyword search based on attribute encryption. In the general group model, the security of keyword index is proved. Under the random oracle model, the cipher text is proved to be selectively secure. In this article we proposed VMKS-ABE scheme. In our scheme, we combine the verifiable of the correctness of outsourced private key with multi-keyword search based on attribute encryption. In the general group model, the security Since the security in the general group model is much weak than in the standard model, it is worth constructing verifiable and multi-keyword searchable scheme in the standard model.
  • 8. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020 8. FUTURE ENHANCEMENTS The verifiable of the correctness of outsourced private key with multi-keyword search based on attribute encryption. In the general group model, the security of keyword index is proved. Under the random oracle model, the cipher text is proved to be selectively secure. 9.REFERENCES [1] M. C. Mont, K. McCorry, N. Papanikolaou, and S. Pearson, “Security and privacy governance in cloud computing via SLAS and a policy orchestration service,” in Proc. 2nd Int. Conf. Cloud Comput. Serv. Sci., 2012, pp. 670–674. [2] E.Punarselvam,“Bio-Medical Analysis of lumbar spine image using Gobar filter and canny edge detection algorithm of MRI”, International Journal of Research in computer applications and Robotics,Vol.1 Issue No.8 Nov 2013 PP(42-50) ISSN:2320-7345. [3] C. Metz. (2009, Oct.).DDoS attack rains down on Amazon Cloud [Online]. Available: http://www.theregister.co.uk/2009/10/05/am azon_bitbucket_outage/S [4] K. Lu, D. Wu, J. Fan, S. Todorovic, and A. Nucci, “Robust and efficient detection of DDoS attacks for large-scale internet,” Comput.Netw., vol. 51, no. 18, pp. 5036– 5056, 2007. [5] E.Punarselvam,”Comparative analysis of Bio-CAD Technique and Canny Edge detection Algorithm for Lumbar spine images using Finite Element Method”, International Journal of Engineering Research and Management, Vol. 1 Issue No.8 November 2014 PP(165-168) ISSN:2349-2058.. [6] J. Li, Q.Wang,C.Wang,N. Cao,K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," International Journal of Engineering Research and Applications, vol. 4, no. 7, pp. 441-445, May 2014, doi: 10.1109/INFCOM.2010.5462196. [7] W. Sun, S. Yu, W. Lou, Y. Hou, and H. Li, "Protecting Your Right: Verifiable Attribute-BasedKeywordSearchwith Fine- Grained Owner- Enforced Search Authorization in the Cloud," IEEE INFOCOM, vol. 27, no. 4, pp. 226-234, Jul. 2014, doi: 10.1109/INFOCOM.2014.6847943.
  • 9. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020 [8] Dr.E.Punarselvam,“Robust Data Collection with Multiple Sink Zone In 3-D Underwater Sensor Networks”, in International Journal on Applications in Basic and Applied Sciences, vol. 5, Issue no. 1, December 2019,PP 8-14.ISSN 2455 – 1007 [9] Y. Ye, J. Han,W. Susilo, T. H. Yuen, and J. Li, "ABKS-CSC: attributebased keyword search with constant-size ciphertexts," Security & Communication Networks, vol. 9, no. 18, pp. 5003-5015, Oct. 2016, doi: org/10.1002/sec.1671. [10] Dr.E.Punarselvam,“Effective and Efficient Traffic Scrutiny in Sweet Server with Data Privacy”, International Journal on Applications in Information and Communication Engineering Volume 5 : Issue 2: November 2019, PP 1 – 5 [11] A. Sahai and B. Waters, "Fuzzy identity-based encryption," In Advances in Cryptology – EUROCRYPT, Cramer R. Eds. Berlin, Germany: Springer, 2005, pp. 457-473. [12] V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute -based encryption for fine-grained access control of encrypted data," in Proc. 13th ACM Conf. Comput. Commun.Secur.(CCS), New York, NY, USA: ACM, 2006, pp. 89-98. [13] E.Punarselvam, “Privacy and Secured Multiparty Data Categorization using Cloud Resources”, International Journal of Innovative Research in Science, Engineering and Technology, ISSN(Online) : 2319 – 8753,ISSN (Print) : 2347-6710 Vol. 4, Special Issue 6,May 2015,pp 336-343 [14] B. Waters, "Ciphertext-Policy Attribute- Based Encryption: An Expressive, Efficient, and Provably Secure Realization," In Public Key Cryptography – PKC, D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi Eds. Berlin, Germany: Springer, 2011, pp. 53-70. [15] Dr.E.Punarselvam,“Heart Attack Recognition and Heart Rate Monitoring System Using IOT”,in International Journal on Applications in Engineering and Technology, Vol. 5, Issue no. 2, December 2019,PP.5-10.ISSN 2455 - 0523