Submit Search
Upload
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
•
0 likes
•
32 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i8/IRJET-V5I8133.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
Iaetsd Iaetsd
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET Journal
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
rahulmonikasharma
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
552 556
552 556
Editor IJARCET
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storage
sarfraznawaz
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister
Recommended
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
Iaetsd Iaetsd
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET Journal
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
rahulmonikasharma
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
552 556
552 556
Editor IJARCET
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storage
sarfraznawaz
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
Venkat Projects
Frost & Sullivan: Moving Forward with Distributed Cryptography
Frost & Sullivan: Moving Forward with Distributed Cryptography
EMC
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
IGEEKS TECHNOLOGIES
F018133640.key aggregate paper
F018133640.key aggregate paper
IOSR Journals
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
theijes
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
IEEEFINALYEARPROJECTS
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET Journal
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
Adz91 Digital Ads Pvt Ltd
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
Shakas Technologies
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storage
ijtsrd
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
IRJET- Improved Vault based Tokenization to Boost Vault Lookup Performance
IRJET- Improved Vault based Tokenization to Boost Vault Lookup Performance
IRJET Journal
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET Journal
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
IAEME Publication
Multi-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
ijcisjournal
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
More Related Content
What's hot
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
Venkat Projects
Frost & Sullivan: Moving Forward with Distributed Cryptography
Frost & Sullivan: Moving Forward with Distributed Cryptography
EMC
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
IGEEKS TECHNOLOGIES
F018133640.key aggregate paper
F018133640.key aggregate paper
IOSR Journals
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
theijes
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
IEEEFINALYEARPROJECTS
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET Journal
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET Journal
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
Adz91 Digital Ads Pvt Ltd
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
Shakas Technologies
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storage
ijtsrd
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
IRJET- Improved Vault based Tokenization to Boost Vault Lookup Performance
IRJET- Improved Vault based Tokenization to Boost Vault Lookup Performance
IRJET Journal
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET Journal
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
IAEME Publication
Multi-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud Storage
IRJET Journal
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
ijcisjournal
What's hot
(20)
15.secure keyword search and data sharing mechanism for cloud computing
15.secure keyword search and data sharing mechanism for cloud computing
Frost & Sullivan: Moving Forward with Distributed Cryptography
Frost & Sullivan: Moving Forward with Distributed Cryptography
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
F018133640.key aggregate paper
F018133640.key aggregate paper
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storage
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
IRJET- Improved Vault based Tokenization to Boost Vault Lookup Performance
IRJET- Improved Vault based Tokenization to Boost Vault Lookup Performance
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
Multi-Keyword Ranked Search in Encrypted Cloud Storage
Multi-Keyword Ranked Search in Encrypted Cloud Storage
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Similar to IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET Journal
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IJERA Editor
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
J017236366
J017236366
IOSR Journals
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
iosrjce
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
ijsrd.com
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
IRJET Journal
Similar to IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
(20)
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET - Providing High Securtiy for Encrypted Data in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
J017236366
J017236366
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
IRJET- Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
Security Check in Cloud Computing through Third Party Auditor
Security Check in Cloud Computing through Third Party Auditor
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Recently uploaded
(20)
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Internship report on mechanical engineering
Internship report on mechanical engineering
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 769 Exchanging secure data in cloud with confidentiality and privacy goals Vicithra M 1Vichithra.M Mail id:vicithra.mathiyalakan@gmail.com & Address: Trichy 2Professor: Dr. G. Srinaganya, MCA, M. Phil, Ph. d.., Dept. of Computer Science, Shrimathi Indira Gandhi College, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Hazardous development in the quantity of passwords for online applications and encryption keys for outsourced information stockpiling very much surpass the administration furthest reaches of clients. Along these lines outsourcing keys (counting passwords and information encryption keys) to proficient secret key directors (fair however inquisitive specialist organizations)is drawinginthe consideration of numerous clients. In any case, existing arrangements in conventional information outsourcing situation can't all the while meet the accompanying three security prerequisites for keys outsourcing: 1)Confidentiality and protection of keys; 2)Search security on personality ascribes attached to keys; 3)Owner controllableapprovalover his/her common keys. In this paper, havebeenCloudKey Bank, the principal brought together key administration structure that tends to all the three objectives above. Under our structure, the key proprietor can perform protection and controllable approval implementedencryption withleastdata spillage. To actualize CloudKeyBank productively, wepropose another calculations deterministic arbitrary piece generator (DRBG) and Triple DES (3DES). Our trial results and security examination demonstrate the effectiveness and security objectives are all around accomplished. Key Words: Security, Information, Outsourcing,Encryption, Protection etc… 1. INTRODUCTION Conveyed stockpiling is directly getting popularity since it offers a versatile on-ask for data outsourcing organization with connecting with focal points: mitigation of the weight for limit organization, far reaching data access with zone opportunity, and avoiding of capital utilizationonhardware, programming, and individual frameworks of help, et cetera. Before long, this new perspective of data encouraging organization furthermore brings new security threats toward customer's data, thus impacting individuals or enterprisers to at introduce feel hesitant. It is seen that data proprietors lose outrageous control over the predetermination of their outsourced data; thusly, the rightness, openness and trustworthiness of the data are being placed in threat. From one perspective, the cloud advantage is commonly looked with a broad extent of inside/external adversaries, whomaymalevolentlydeleteor decline customers' data; on the other hand, the cloud authority communities may act misleadingly, trying to disguise data mishap or pollution and ensuring that the records are still viably set away in the cloud for reputation or cash related reasons. However, existing game plans in ordinary data outsourcing circumstance can't at the same time meet the going with three security necessities for keys outsourcing. Along these lines it looks good for customersto realize a successful tradition to perform periodical checksof their outsourced data to ensure that the cloud to make certain keeps up their data precisely. Various instruments dealing with the trustworthiness of outsourceddata without an adjacent copy have beenproposedunderdifferentsystem and security models up to now. It is seen that data proprietors lose outrageous control over the fate of their outsourced data; in this way, the rightness, openness and respectability of the data are being placed in risk. 2. EXISTING SYSTEM A strategy which has been proposed to meet clashing necessities is concurrent encryptionwherebythe encryption key is normally the aftereffect of the hash of the information section. Albeit concurrent encryption is by all accounts a decent possibilitytoaccomplishprivacyanddeduplicationin the meantime, it shockingly experiences different surely understood shortcomings including lexicon assaults: an aggressor who can figure or foresee a documentcanwithout much of a stretch infer the potential encryption key and confirm whether the record is as of now put away at the distributed storage supplier or not. Touchy development in the quantity of passwords for electronic applications and encryption keys for outsourced information stockpiling very much surpass the administration furthest reaches of clients. Along these lines, outsourcing keys (counting passwords and information encryption keys) to proficient secret key directors (legitimate yet inquisitive specialist co-ops) is pulling in the consideration of numerous clients. 2.1 Survey A. The Quest to Replace Passwords: A Framework for Comparative EvaluationofWebAuthenticationSchemes To assess two many years of proposition to trade content passwords for universally useful client confirmation on the web utilizing an expansive arrangement of twenty-five ease of use, deployability and security benefits that a perfectplan may give. The extent of proposition wereviewisadditionally broad, including secret key administration programming, combined login conventions, graphical watchword plans,
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 770 subjective validation plans, one-time passwords,equipment tokens, telephone supported plans and biometrics. In thorough approach prompts keybitsofknowledgeaboutthe trouble of supplanting passwords. Not exclusively does this plan verge on giving all want benefits it even holds the full arrangement of advantages that inheritance passwords as of nowgive.Specifically,there is an extensive variety of plans offering minor security benefits past heritage passwords, to those offering critical security benefits as a byproduct of being costlier to send or more hard to utilize. Infer that numerous scholarly recommendations have neglected to pick up footing since specialists once in a while think about an adequately extensive variety of true limitations.Pastourinvestigationof current plans, our system gives an assessment philosophy and benchmark for future web confirmation recommendations. B. Quests ON ENCRYPTED DATA – PRACTICAL TECHNIQUES It is attractive to store information on information stockpiling servers, for example, mail servers anddocument servers in encodedshapeto diminishsecurityandprotection dangers. In any case, this more often than not suggests that one needs to forfeit usefulness for security. For instance, if a customer wishes to recover just archives containing certain words, it was not already known how to let the information stockpiling server play out the hunt and answer the question, without loss of information secrecy. We depictour cryptographic plans for the issue of looking on encoded information and give evidencesofsecuritytothesubsequent crypto frameworks. The strategies have various significant favorable circumstances.Theyareprovablysecure:theygive provable mystery to encryption, as in the untrusted server can't get the hang of anything about the plaintext when just given the figure content; they give inquiryseclusiontoseeks, implying that the untrusted server can't get the hang of much else about the plaintext than the query item; they give controlled looking, so that theuntrustedservercan't scanfor a self-assertive word without the client's approval; they additionally bolster concealed questions, so the client may approach the untrusted server to scan for a mystery word without uncovering the word to the server. The calculations displayed are basic, quick (for an archive of length n, the encryption and inquiry calculations just need O(n) stream figure and square figure activities),andpresent nospace and correspondence overhead, and henceforth are handy to utilize today. C. Open Key Encryption with Keyword Search Most diagrams, I have think about the issue of seeking on information that is encoded utilizing an open key framework. Consider client Bob who sends email to client Alice scrambled under Alice's open key. An email door needs to test whether the email contains the watchword "dire" with the goal that it could course the email in like manner. Alice, then again does not wish to enable the portal to unscramble every one of her messages. Have been characterize and build an instrument that empowers Alice to give a key to the portal that empowers the door to test whether "pressing" is a catchphrase in the email without picking up whatever else about the email. We allude to this system as Public Key Encryption with catchphrase Search. As another illustration, consider a mail server that stores different messages freely encoded for Alice by others. Utilizing our instrument Alice can send the mail server a key that will empower the server to distinguish all messages containing some particular catchphrase, yet get the hang of nothing else. To characterize the idea of open key encryption with catchphrase inquiry and give a few developments. Determination The best possible determination of your figures will rely upon the sort of figure it is as characterized in the "Kinds of Figures" area. Creator photos, shading, and grayscale figures ought to be no less than 300dpi. Lineart, including tables ought to be at least 600dpi. D. Mysterious various leveled character based encryption (without irregular prophets). Have been available a personality based cryptosystem that highlights completely mysterious figure writings and various leveled key designation. To give a proof of security in the standard model in view of the mellow Decision Linear many-sided quality supposition in bilinear gatherings. The framework is proficient and handy, with little figure writings of size straight in the profundity of the pecking order. Applications incorporate pursuit on scrambled information, completely private correspondence, and so forth. Our outcomes settle two open issues relating to unknown personality based encryption, our plan being the first to offer provable namelessness in the standard model, notwithstanding being the first to acknowledge completely mysterious HIBE at all levels in the pecking order. E. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. Predicate encryption is another worldview for open key encryption summing up, in addition to other things, personality based encryption. In a predicate encryption conspire, mystery keys relate to predicates and figure writings are related with properties; the mystery key SK comparing to a predicate f can be utilized to unscramble a figure content related with characteristic I if and just if f(I) =
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 771 1. Developments of such plans are presently known for specific classes of predicates. We develop such a plan for predicates comparing to the assessment of inward items over ZN (for some huge number N). This, thus, empowers developments in which predicates relate to the assessment of disjunctions, polynomials, CNF/DNF formulae, or edge predicates (among others). Other than filling in as a huge advance forward in the hypothesis of predicate encryption, our outcomes prompt various applications that are fascinating in their own particular right. 3. PROPOSED SYSTEM In our undertaking, weadapttotheinnatesecurityexposures of joined encryption and propose Cloud Dedupulication, which protects the consolidated favorable circumstances of deduplication and merged encryption. The security of Cloud Deduplication depends on its new engineering whereby notwithstanding the fundamental stockpiling supplier, a metadata administrator and an extra server are characterized: theserver addsanextraencryption layer to avert understood assaults against joined encryption and in this way ensure the privacy of the information; then again, the metadata supervisor is capable of the key administration errand since square level deduplication requires the remembrance of a colossal number of keys. Accordingly, the basic deduplication is performed at piece level and we characterize a productive key administration component to keep away from clients to store one key for every square. Have been proposed Cloud Key Bank, the principal bound together key administration structure that tends to all the three objectives above. Under our system,the key proprietor can perform protection and controllable approval have been proposed Base64 calculation for discharge key create and AES calculation for encode and unscramble our information our trial results and security examination demonstrate the effectiveness and security objectives are very much accomplished. Advanced Encryption Standard(AES) Calculation The Advanced Encryption Standard, or AES, is a symmetric square figure picked by the U.S. government to ensure arranged data and is executed in programming and equipment all through the world to encode delicate information. AES highlights The choice procedure forthisnewsymmetric keycalculation was completely open to open examination and remark; this guaranteed an exhaustive, straightforward investigation of the outlines submitted. NIST determined the new propelled encryption standard calculation must be a piece figure equipped for dealing with 128 piece squares, utilizing keys measured at 128, 192, and 256 bits; other criteria for being picked as the following propelled encryption standard calculation included: • Security: Competing calculations were to be judged on their capacity to oppose assault, when contrastedwithother submitted figures, however security quality was to be viewed as the most imperative factor in the opposition. • Cost: Intended to be discharged under a worldwide, nonexclusive and sovereignty free premise, the hopeful calculations were to be assessed on computational and memory proficiency. • Implementation: Algorithm and execution qualities to be assessed incorporated the adaptability of the calculation; reasonableness of the calculation to be actualized in equipment or programming; and in general, relative effortlessness of usage. How AES encryption works AES contains three square figures:AES-128, AES-192andAES- 256. Each figure encodes and unscrambles information in pieces of 128 bits utilizing cryptographickeysof128-, 192-and 256-bits, individually. The Rijndael figure was intended to acknowledge extra square sizes and key lengths, however for AES, those capacities were not received. Fig -1: AES Encryption Base64 Base64 encoding is utilized to change over parallel information into a content like arrangement that enables it to be transported in situationsthatcandeal withjustcontent securely. Utilize cases are encoding UID's for use in HTTP
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 772 URL's, encoding encryption keys and testaments to make them securely versatile through email, show them in HTML pages and utilize them with reorder. Base64 is infrequently likewise refered to as PEM, which remains for Privacy-improved Electronic Mail. There, Base64 was utilized to make printable content again after double email information that was produced amid the email encryption process. How It works: Base64 encoding takes the first double information and works on it by isolating it into tokens of three bytes. A byte comprises of eight bits, so Base64 takes 24bits altogether. These 3 bytes are then changed over into four printable characters from the ASCII standard. The initial step is to take the three bytes (24bit) of twofold information and split it into four quantities of six bits. Since the ASCII standard characterizes theutilizationofseven bits, Base64 just uses 6 bits (comparing to 2^6 = 64 characters) to guarantee the encoded information is printable and none of the unique characters accessible in ASCII are utilized. The calculation's name Base64 originates from the utilization of these 64 ASCII characters. The ASCII characters utilized for Base64 are the numbers 0-9, the letters in order 26 lowercase and 26 capitalized characters in addition to two additional characters '+' and '/'. Fig -2: Architecture Diagram C. Result This system offers answers for meet and beat the accompanying three security necessities for keys outsourcing 1) DeduplicationoverHighlysecureddocumentencryption and decoding for Confidentiality and protection of information and keys utilizing AES Algorithm. 2) Database Encryption and Decryption to secure the information proprietor's Privacy and File chief utilizing Base64 Crypto Algorithm. 3) OTA – One Time Access - Owner controllable approval over information proprietor's shared documents and keys. 4. CONCLUSIONS Overseeing encoded information with deduplication is imperative and critical by and by for accomplishing an effective Cloud stockpiling administration, particularly for Big Data stockpiling. To proposed a down to earth plan to deal with the encoded Big Data in Cloud with deduplication in light of proprietorship test and PRE. This plan can adaptably bolster information refresh and imparting to deduplication notwithstanding when the information holders are disconnected. Scrambled information can be safely gotten to in light of the fact that lone the approved information holders can acquire the symmetric keys utilized for informationdecoding.Broad execution investigation and test demonstratedthat thisplan is secure and productive under the portrayed security display and extremely appropriate for Big Data deduplication. The consequences of our PC reproductions additionally demonstrated the practicability of our plan. Email Notification to information proprietor when there is copied information being transferred by other information holders and notice to information proprietor and information holder when the record is transfer and download. REFERENCES [1] C. Wang, xzzz Q. Wang, K. Ren, and W. Lou, “Privacy- preserving public auditing for storage security in cloud computing”. [2] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public audit ability and data dynamics for storage security in cloud computing”. [3] M. A. Shah, R. Swaminathan, and M. Baker, “Privacy- preserving audit and extraction of digital contents”. [4] M. Bellare and G. Neven, “Multi-signatures in the plain public key model and a general forking lemma”. [5] R. C. Merkle, “Protocols for public key cryptosystems”.
Download now