SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1507
Privacy Preserving and Proficient Identity Search Techniques for Cloud
Data Safety
M Gayathri Devi1, R Janitha Mangala Lakshmi
2
, R. Reena
3
, R. K Kapila Vani4
1,2Student, Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering
College, Chennai, India
3,4Assistant Professor, Department, of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy
Engineering College, Chennai, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Cloud computing is one type of computing
platform that is Internet based. One important feature of a
Cloud service is Cloud storage. The cloud users may upload
sensitive data in the Cloud and allow the Cloud server to
maintain these data. Cloud computing provides flexible data
management and ubiquitous data access. However the cloud
storage provided by the cloud computing is not trusted
.Normally data aresecured by theorganizationsbut nowadays
some employees sell their access specifications to the hackers
for commercial purposes. This paper provides an efficient
method based on identity techniques to overcome such issues.
Key Words: Visual-Encryption, Collective Behavior, Data
Signing, Visual-Cryptography
1. INTRODUCTION
Cloud storage is a model of storage of data with a highly
virtualized infrastructure made up of many distributed
resources. In the cloud storage, the data is remotely
maintainedandmanaged.Theuserscanstoretheirdataonline
and are able to access from any part of the world via the
Internetconnection. Thebiggestadvantageofstoring data in
Cloud is that the users are provided with a broader range of
access to distributed resources in a cost-efficient manner.
This is because it eliminates the capital expenses such as
buying the hardware, software and setting it up. Though it
has many appealing advantages as a promising platform for
the internet, this new data storage paradigm brings many
challenging issues which have profound influence on the
usability, reliability and performance of the overall system.
Cloud computing has been envisionedasthenextgeneration
architecture of the IT enterprise due to its long list of
unpredicted advantages. Considering the outsourced data
and the client’s constrained resource capability ,the core of
the problem can be generalized as how the client find an
efficient way to perform verification without the local
existence in the data files. In order totacklethisproblemthis
paper provides privacy preserving schemebasedonidentity
verification mechanism through real time alive face
detection video mode.
2.RELATEDWORK
(a) Personalized Search Over encrypted data – Zhangjie Fu
When we consider the data privacy and security, it is
recommended practice to encrypt thedata beforeweupload
into database. One of the most familiar way to search the
encrypted data is searchable encryptionschemes.According
to this paper, an user model to record and analyzetheuser’s
search history, has been developed. With this model, query
extensions for accessing multiple files by the user cloud also
be supported. Here, three main entities are involved: data
owner, user and the database / cloud server. The user
interest model is built upon the user’slongtermhistory.And
if the user needs to access any file or database content, then
he makes a click request to database. The rank isgiventothe
user and based on that rank only the user could either be
allowed or be denied to access the data and the ranking is
based on the access frequency, keywords andrelativewords
to the search.
(b) Proof of retrievability with resource constraints – Jin Li
One of the main concerned problem with data storageisthat
the data integrity verification at untrusted servers. Proof of
Retrievability(PoR) model supports dynamic data
operations, as well as ensure securityagainstresetattacksin
the cloud server. A strengthened security odel by
considering the reset attack against the storage serverin the
upload phase of an integrity verification scheme has been
developed. In this paper, only the verification schemes with
public verifiability is considered, that is any person who
knows the public key can act as a verifier.Henceaccordingto
this paper it seems to be more rational andpractical toequip
the verification protocol with public verifiability which is
expected to play a more important role in achieving better
efficiency for cloud computing.
(c) Preliminaries Searchable encryption
It is a technique that could provide security and protect the
data privacy and meanwhile enabled leverged preserved
approach with combined publickeycryptographyandutilize
scheme of approval.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1508
3. EXISTING METHODOLOGY
Cloud computing does not allow users to physically possess
the storage of the data, leaving the data storage and control
in the hands of cloud providers. Searchable encryption is a
novel technique that could protect the data privacy and
meanwhile enable keyword query over encrypted
documents. The notion of key-aggregate searchable
encryption such that the data owner only sends a single key
to a user to share a huge quantity of files. A regular language
searchable encryption system resisting off-line keyword
guessing attack consists o key generation of user and cloud
server. Here the existing system uses Data signing
algorithm.
Technique Definition:- (Data Signing Algorithm)
The user can only sign documents on that particular
computer. The security of the private key depends entirely
on the security of the computer.
Limitations of Existing System:
 The user can only sign documents onthatparticular
computer.
 The security of the private key depends entirely on
the security of the computer.
4. PROPOSED SYSTEM
The secure framework has been proposed here to ensure
and realize that the service provided ensures security and
large volumes of data can be securely possessed. Combining
with revocation and proof of retrievability, we provide an
efficient scheme of identity verification of the client for
dynamic data file operations on cloud. For this purpose, the
technique named Visual-Crptographic Encryption(VC-E)has
been used in our developed scheme.
Technique Definition:- (VC-E)
A mathematical procedureforperformingencryptionon
data. Through the use of an algorithm, information is
made into meaningless cipher text and requires the use
of a key to transform the data back into its original form.
Fig. 1
Advantages of Proposed Scheme:-
 An encrypting algorithm scrambles the message and it
can only be unscrambled with a key created at the same
time.
 Cipher algorithms are either symmetric or asymmetric
for encryption security.
5. SYSTEM MODEL
Fig. 2
The system architecture describes about the three major
entities, namely, admins, user and the cloud server. This
architecture defines about the various processes and
operations taking place in the proposed scheme of our
project. Here the cloud server is an important entity built
over the logical perception of network. The user in the
system plays the role in the phase of uploading file and
admins involves in the rest of the UI request and response
phases.
PHASES OF SYSTEM
1. USER INTERFACE DESIGN
The goal of user interface design is to make the user's
interaction as simple and efficient as possible, in terms of
accomplishing user goals (user-centered design). Interface
design is involved in a wide range of projects fromcomputer
systems, all of the projects that involve much of the same
basic human interactions. This is the first module of our
project. The important role for the user is to move login
window to user window. This module has been created for
the security purpose. In this login page we have to enter
login user id and password. It will check username and
password and validated to check if the credentials are valid.
If we enter any invalid username or passwordwecan’t enter
into login window to user window it will show an error
message. So we are preventing unauthorized user from
entering into the login window to user window. It would
provide a good security for our project. So server contain
user id and password server also check theauthentication of
the user. It improves the security and prevents from
unauthorized user entering into the network. Here we
validate the login user and server authentication. Inthefirst
module, there are two possible logins exist. Where one of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1509
them is for the user to log in to the cloud and proceed with
uploading of file and the other is for the admin to login and
view requests, approve them and permit the requester to
download the file. After the requests are viewed, the admins
could either approve (accept)ordeclinetherequestmadeby
the one of the admin to download the file.
Fig. 3
2. F3ILE UPLOAD
The user will initially upload the files to the cloud that are
secured by the face detection video mode. User will login
their account and upload a file or image, andthatfiles/image
are encrypt and store in admin side. Even uploaded user
also cannot access, before admin can accept. This page is for
uploading images and other media files. The users initially
log in to their account for uploading the file. The uploaded
file could then be downloaded if the admins approve the
request by face detection video mode. Once the user log into
the account and uploads file, after that the user himself also
is not allowed to access or downloadfile withouttheadmin’s
approval.
3. PROVIDING SECURITY TO FILE
In this phase the main motto is to secure thefilesordata that
are being uploaded by the user. Once if any of the admin
requires a file to be accessed or downloaded for any
purposes, they make a request. Here once of the request is
made the request reaches rest of the admins so as to allow
them to either accept one decline request by ensuring the
security. When the request is made then the admins will be
able to see three options available:
Options:
- View
- Accept
- Decline
All these options will enable the admins to ensure that the
files are secured. So the module defines and ensures file
security.
Fig. 4
4. ADMIN MONITORING PHASE
In this phase after the request for the file is been done it is
sent to rest of the admins and then waits for the other
admins to respond. Meantime the other admins notices the
notification that has been sent. The notification contains the
runtime video of the requested admin. The runtime video is
been done using the application IP Webcam. This has a
unique IP address which is to be given while sending the
video request. Thus through this the other admins get a
assurance that the requested admin is an authorized one.
Fig. 5
5. VIEW/READ FILE
 After all the admins check the notification and the
runtime video they give their respond accordingly.
 They give their response either by accepting the
request or declining it.
 Only when all the remaining admins have accepted
the request the file could be accessed or
downloaded by the admin.
 Even when one admin finds it insecure he could
decline the request and the file could not be
downloaded.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1510
6. CONCLUSION AND FUTURE ENHANCEMENTS
CONCLUSION
In this paper, we had introduceda largeuniversal searchable
encryption scheme to protect the security of cloud storage
system which realizes encryption and search function. The
cloud service provider could test whether the encrypted
cipher text is acceptable by the DFA embedded in the
submitted search token. In the test procedure, no input data
and secret information will be leaked tothecloudserver. We
also put forth a concrete construction with light-weight
encryption and token generation algorithms. The proposed
scheme is privacy-preserving and indistinguishable against
Keyword Guessing Attack (KGA), which are proved in
standard model. The comparison and experimental results
confirms the low transmission and computational overhead
of the scheme.
FUTURE ENHANCEMENTS
The new scheme performance proved that it efficiently
secures the files for misuse by any of the admins and that it
could use the resources provided when the problem size
scaled up and even more it can be increased. Planned to
implement a more effective approach by using more
enhanced algorithms than using the VC-E algorithm to
implement the new scheme.
7. REFERENCES
 Z.Fu, J.Shu, K.Ren. Enabling Personalized Search
over Encrypted Outsourced Data with Efficiency
Improvement. IEEE Transactions on Parallel and
Distributed Systems, 2015.
 J, Tan X, Chen X, et al. Opor: Enabling proof of
retrievability in cloud computing with resource-
constrained devices[J]. IEEE Transactions on
cloud computing, 2015, 3(2): 195-205.
 Wang H. Identity-based distributed provable data
possession in multicloud storage[J]. IEEE
Transactions on Services Computing, 2015, 8(2):
328-340.
 Cui B, Liu Z, Wang L. Key-Aggregate Searchable
Encryption
(KASE)forGroupDataSharingviaCloudStorage[J].IE
EE TRANSACTIONS ON COMPUTERS, 2014, 6(1):
1.
 Zhang Q, Yang L T, Chen Z, Li P. PPHOPCM: Privacy-
preserving High-order Possibilistic c-Means
Algorithm for BigData Clustering with Cloud
Computing[J]. IEEE Transactions on Big Data,
2017, DOI: 10.1109/TBDATA.2017.2701816.
 Z. Shen, J. Shu, and W. Xue, “Preferred keyword
search over encrypted data in cloud computing,”
In Proc. of 21st International Symposium on
Quality of Service (IWQoS’13), 2013.

More Related Content

What's hot

CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storagesarfraznawaz
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Editor IJARCET
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414Editor IJARCET
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET Journal
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudIRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 

What's hot (20)

CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Design and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storageDesign and implementation of a privacy preserved off premises cloud storage
Design and implementation of a privacy preserved off premises cloud storage
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
Kx3518741881
Kx3518741881Kx3518741881
Kx3518741881
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414Ijarcet vol-2-issue-4-1410-1414
Ijarcet vol-2-issue-4-1410-1414
 
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 

Similar to IRJET- Privacy Preserving and Proficient Identity Search Techniques for Cloud Data Safety

Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSIRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds IRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 

Similar to IRJET- Privacy Preserving and Proficient Identity Search Techniques for Cloud Data Safety (20)

Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
50120140503020
5012014050302050120140503020
50120140503020
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verification
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 

Recently uploaded (20)

Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 

IRJET- Privacy Preserving and Proficient Identity Search Techniques for Cloud Data Safety

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1507 Privacy Preserving and Proficient Identity Search Techniques for Cloud Data Safety M Gayathri Devi1, R Janitha Mangala Lakshmi 2 , R. Reena 3 , R. K Kapila Vani4 1,2Student, Department of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering College, Chennai, India 3,4Assistant Professor, Department, of Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy Engineering College, Chennai, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Cloud computing is one type of computing platform that is Internet based. One important feature of a Cloud service is Cloud storage. The cloud users may upload sensitive data in the Cloud and allow the Cloud server to maintain these data. Cloud computing provides flexible data management and ubiquitous data access. However the cloud storage provided by the cloud computing is not trusted .Normally data aresecured by theorganizationsbut nowadays some employees sell their access specifications to the hackers for commercial purposes. This paper provides an efficient method based on identity techniques to overcome such issues. Key Words: Visual-Encryption, Collective Behavior, Data Signing, Visual-Cryptography 1. INTRODUCTION Cloud storage is a model of storage of data with a highly virtualized infrastructure made up of many distributed resources. In the cloud storage, the data is remotely maintainedandmanaged.Theuserscanstoretheirdataonline and are able to access from any part of the world via the Internetconnection. Thebiggestadvantageofstoring data in Cloud is that the users are provided with a broader range of access to distributed resources in a cost-efficient manner. This is because it eliminates the capital expenses such as buying the hardware, software and setting it up. Though it has many appealing advantages as a promising platform for the internet, this new data storage paradigm brings many challenging issues which have profound influence on the usability, reliability and performance of the overall system. Cloud computing has been envisionedasthenextgeneration architecture of the IT enterprise due to its long list of unpredicted advantages. Considering the outsourced data and the client’s constrained resource capability ,the core of the problem can be generalized as how the client find an efficient way to perform verification without the local existence in the data files. In order totacklethisproblemthis paper provides privacy preserving schemebasedonidentity verification mechanism through real time alive face detection video mode. 2.RELATEDWORK (a) Personalized Search Over encrypted data – Zhangjie Fu When we consider the data privacy and security, it is recommended practice to encrypt thedata beforeweupload into database. One of the most familiar way to search the encrypted data is searchable encryptionschemes.According to this paper, an user model to record and analyzetheuser’s search history, has been developed. With this model, query extensions for accessing multiple files by the user cloud also be supported. Here, three main entities are involved: data owner, user and the database / cloud server. The user interest model is built upon the user’slongtermhistory.And if the user needs to access any file or database content, then he makes a click request to database. The rank isgiventothe user and based on that rank only the user could either be allowed or be denied to access the data and the ranking is based on the access frequency, keywords andrelativewords to the search. (b) Proof of retrievability with resource constraints – Jin Li One of the main concerned problem with data storageisthat the data integrity verification at untrusted servers. Proof of Retrievability(PoR) model supports dynamic data operations, as well as ensure securityagainstresetattacksin the cloud server. A strengthened security odel by considering the reset attack against the storage serverin the upload phase of an integrity verification scheme has been developed. In this paper, only the verification schemes with public verifiability is considered, that is any person who knows the public key can act as a verifier.Henceaccordingto this paper it seems to be more rational andpractical toequip the verification protocol with public verifiability which is expected to play a more important role in achieving better efficiency for cloud computing. (c) Preliminaries Searchable encryption It is a technique that could provide security and protect the data privacy and meanwhile enabled leverged preserved approach with combined publickeycryptographyandutilize scheme of approval.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1508 3. EXISTING METHODOLOGY Cloud computing does not allow users to physically possess the storage of the data, leaving the data storage and control in the hands of cloud providers. Searchable encryption is a novel technique that could protect the data privacy and meanwhile enable keyword query over encrypted documents. The notion of key-aggregate searchable encryption such that the data owner only sends a single key to a user to share a huge quantity of files. A regular language searchable encryption system resisting off-line keyword guessing attack consists o key generation of user and cloud server. Here the existing system uses Data signing algorithm. Technique Definition:- (Data Signing Algorithm) The user can only sign documents on that particular computer. The security of the private key depends entirely on the security of the computer. Limitations of Existing System:  The user can only sign documents onthatparticular computer.  The security of the private key depends entirely on the security of the computer. 4. PROPOSED SYSTEM The secure framework has been proposed here to ensure and realize that the service provided ensures security and large volumes of data can be securely possessed. Combining with revocation and proof of retrievability, we provide an efficient scheme of identity verification of the client for dynamic data file operations on cloud. For this purpose, the technique named Visual-Crptographic Encryption(VC-E)has been used in our developed scheme. Technique Definition:- (VC-E) A mathematical procedureforperformingencryptionon data. Through the use of an algorithm, information is made into meaningless cipher text and requires the use of a key to transform the data back into its original form. Fig. 1 Advantages of Proposed Scheme:-  An encrypting algorithm scrambles the message and it can only be unscrambled with a key created at the same time.  Cipher algorithms are either symmetric or asymmetric for encryption security. 5. SYSTEM MODEL Fig. 2 The system architecture describes about the three major entities, namely, admins, user and the cloud server. This architecture defines about the various processes and operations taking place in the proposed scheme of our project. Here the cloud server is an important entity built over the logical perception of network. The user in the system plays the role in the phase of uploading file and admins involves in the rest of the UI request and response phases. PHASES OF SYSTEM 1. USER INTERFACE DESIGN The goal of user interface design is to make the user's interaction as simple and efficient as possible, in terms of accomplishing user goals (user-centered design). Interface design is involved in a wide range of projects fromcomputer systems, all of the projects that involve much of the same basic human interactions. This is the first module of our project. The important role for the user is to move login window to user window. This module has been created for the security purpose. In this login page we have to enter login user id and password. It will check username and password and validated to check if the credentials are valid. If we enter any invalid username or passwordwecan’t enter into login window to user window it will show an error message. So we are preventing unauthorized user from entering into the login window to user window. It would provide a good security for our project. So server contain user id and password server also check theauthentication of the user. It improves the security and prevents from unauthorized user entering into the network. Here we validate the login user and server authentication. Inthefirst module, there are two possible logins exist. Where one of
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1509 them is for the user to log in to the cloud and proceed with uploading of file and the other is for the admin to login and view requests, approve them and permit the requester to download the file. After the requests are viewed, the admins could either approve (accept)ordeclinetherequestmadeby the one of the admin to download the file. Fig. 3 2. F3ILE UPLOAD The user will initially upload the files to the cloud that are secured by the face detection video mode. User will login their account and upload a file or image, andthatfiles/image are encrypt and store in admin side. Even uploaded user also cannot access, before admin can accept. This page is for uploading images and other media files. The users initially log in to their account for uploading the file. The uploaded file could then be downloaded if the admins approve the request by face detection video mode. Once the user log into the account and uploads file, after that the user himself also is not allowed to access or downloadfile withouttheadmin’s approval. 3. PROVIDING SECURITY TO FILE In this phase the main motto is to secure thefilesordata that are being uploaded by the user. Once if any of the admin requires a file to be accessed or downloaded for any purposes, they make a request. Here once of the request is made the request reaches rest of the admins so as to allow them to either accept one decline request by ensuring the security. When the request is made then the admins will be able to see three options available: Options: - View - Accept - Decline All these options will enable the admins to ensure that the files are secured. So the module defines and ensures file security. Fig. 4 4. ADMIN MONITORING PHASE In this phase after the request for the file is been done it is sent to rest of the admins and then waits for the other admins to respond. Meantime the other admins notices the notification that has been sent. The notification contains the runtime video of the requested admin. The runtime video is been done using the application IP Webcam. This has a unique IP address which is to be given while sending the video request. Thus through this the other admins get a assurance that the requested admin is an authorized one. Fig. 5 5. VIEW/READ FILE  After all the admins check the notification and the runtime video they give their respond accordingly.  They give their response either by accepting the request or declining it.  Only when all the remaining admins have accepted the request the file could be accessed or downloaded by the admin.  Even when one admin finds it insecure he could decline the request and the file could not be downloaded.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1510 6. CONCLUSION AND FUTURE ENHANCEMENTS CONCLUSION In this paper, we had introduceda largeuniversal searchable encryption scheme to protect the security of cloud storage system which realizes encryption and search function. The cloud service provider could test whether the encrypted cipher text is acceptable by the DFA embedded in the submitted search token. In the test procedure, no input data and secret information will be leaked tothecloudserver. We also put forth a concrete construction with light-weight encryption and token generation algorithms. The proposed scheme is privacy-preserving and indistinguishable against Keyword Guessing Attack (KGA), which are proved in standard model. The comparison and experimental results confirms the low transmission and computational overhead of the scheme. FUTURE ENHANCEMENTS The new scheme performance proved that it efficiently secures the files for misuse by any of the admins and that it could use the resources provided when the problem size scaled up and even more it can be increased. Planned to implement a more effective approach by using more enhanced algorithms than using the VC-E algorithm to implement the new scheme. 7. REFERENCES  Z.Fu, J.Shu, K.Ren. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement. IEEE Transactions on Parallel and Distributed Systems, 2015.  J, Tan X, Chen X, et al. Opor: Enabling proof of retrievability in cloud computing with resource- constrained devices[J]. IEEE Transactions on cloud computing, 2015, 3(2): 195-205.  Wang H. Identity-based distributed provable data possession in multicloud storage[J]. IEEE Transactions on Services Computing, 2015, 8(2): 328-340.  Cui B, Liu Z, Wang L. Key-Aggregate Searchable Encryption (KASE)forGroupDataSharingviaCloudStorage[J].IE EE TRANSACTIONS ON COMPUTERS, 2014, 6(1): 1.  Zhang Q, Yang L T, Chen Z, Li P. PPHOPCM: Privacy- preserving High-order Possibilistic c-Means Algorithm for BigData Clustering with Cloud Computing[J]. IEEE Transactions on Big Data, 2017, DOI: 10.1109/TBDATA.2017.2701816.  Z. Shen, J. Shu, and W. Xue, “Preferred keyword search over encrypted data in cloud computing,” In Proc. of 21st International Symposium on Quality of Service (IWQoS’13), 2013.