SlideShare a Scribd company logo
1 of 4
Download to read offline
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage
ABSTRACT:
The need of secure big data storage service is more desirable than ever to date.
The basic requirement of the service is to guarantee the confidentiality of the
data.However, the anonymity of the service clients, one of the most essential aspects of
privacy, should be considered simultaneously. Moreover, the service also should provide
practical and fine-grained encrypted data sharing such that a data owner is allowed to
share a ciphertext of data among others under some specified conditions. This paper, for
the first time, proposes a privacy-preserving ciphertext multi-sharing mechanism to
achieve the above properties. It combines the merits of proxy re-encryption with
anonymous technique in which a ciphertext can be securely and conditionally shared
multiple times without leaking both the knowledge of underlying message and the identity
information of ciphertext senders/recipients. Furthermore, this paper shows that the new
primitive is secure against chosen-ciphertext attacks in the standard model..
INTRODUCTION
TO DATE many individuals and companies choose to upload their data to clouds since the
clouds supports considerable data storage service but also efficient data processing
capability. Accordingly, it is unavoidable that trillions of personal and industrial data are
flooding the Internet. For example, in some smart grid scenario, a governmental
surveillance authority may choose to supervise the electricity consumption of a local living
district. A great amount of electricity consumed data of each family located inside the
district will be automatically transferred to the authority via Internet period by period. The
need of big data storage, therefore, is more desirable than ever.
EXISTING SYSTEM
In Existing System a basic security requirement of big data storage is to guarantee
the confidentiality of the data. Fortunately, some existing
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
cryptographic encryption mechanisms can be employed to fulfill the requirement. For
instance, Public Key Encryption (PKE) allows a data sender to encrypts the data under the
public key of receiver such that no one except the valid recipient can gain access to the
data
DisADVANTAGE OF Existing SYSTEM
 Does not satisfy all the requirements of users in the scenario of big data storage.job
execution time.
PROPOSED SYSTEM
In Proposed System a concrete construction for unidirectional AMH-IBCPRE, in
which it achieves multiple ciphertext receiver update, conditional data sharing, anonymity
and collusion-safe (i.e. holding against collusion attacks) simultaneously in asymmetric
bilinear group. Note the functionality of our system is generally described in Fig 1. We
state that the new primitive is applicable to many real-world applications, such as secure
email forwarding, electronic encrypted data sharing, where both anonymity and flexible
encrypted data sharing are needed. We also show that the scheme is CCA-secure in the
standard model under the decisional P-Bilinear Diffie-Hellman assumption. To the best of
our knowledge, our system is the first of its kind in the literature.
ADVANTAGE OF PROPOSED SYSTEM
 Anonymity: given a ciphertext, no one knows the identity information of sender and
receiver.
 Multiple receiver-update: given a ciphertext, the receiver of the ciphertext can be
updated in multiple times.
 Conditional sharing: a ciphertext can be fine-grained shared with others if the pre-
specified conditions are Satisfied
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
ARCHITECTURE:
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 44 Mb.
 Monitor : 15 VGA Colour.
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : Java 1.7 ,Hadoop 0.8.1
 Database : MySql 5
 IDE : Eclipse

More Related Content

What's hot

Efficient regular language search for secure cloud storage
Efficient regular language search for secure cloud storageEfficient regular language search for secure cloud storage
Efficient regular language search for secure cloud storageShakas Technologies
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pkiPrabhat Goel
 
Couldcomputing it telkom
Couldcomputing it telkomCouldcomputing it telkom
Couldcomputing it telkombujangtandomang
 
A secure client side deduplication scheme in cloud storage environments
A secure client side deduplication scheme in cloud storage environmentsA secure client side deduplication scheme in cloud storage environments
A secure client side deduplication scheme in cloud storage environmentsShakas Technologies
 
2019 cou kolokotronis_nicholas - nicholas kolokotronis
2019 cou kolokotronis_nicholas - nicholas kolokotronis2019 cou kolokotronis_nicholas - nicholas kolokotronis
2019 cou kolokotronis_nicholas - nicholas kolokotronisLiza Charalambous
 
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?Blockchain Council
 
identity based encryption transformation for flexible sharing of encrypted da...
identity based encryption transformation for flexible sharing of encrypted da...identity based encryption transformation for flexible sharing of encrypted da...
identity based encryption transformation for flexible sharing of encrypted da...Venkat Projects
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13I M
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12s1190091
 
Cryptography
CryptographyCryptography
CryptographyJasim Jas
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptographyAshish Kumar
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 

What's hot (18)

Cryptointro
CryptointroCryptointro
Cryptointro
 
Efficient regular language search for secure cloud storage
Efficient regular language search for secure cloud storageEfficient regular language search for secure cloud storage
Efficient regular language search for secure cloud storage
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
Couldcomputing it telkom
Couldcomputing it telkomCouldcomputing it telkom
Couldcomputing it telkom
 
s117
s117s117
s117
 
A secure client side deduplication scheme in cloud storage environments
A secure client side deduplication scheme in cloud storage environmentsA secure client side deduplication scheme in cloud storage environments
A secure client side deduplication scheme in cloud storage environments
 
2019 cou kolokotronis_nicholas - nicholas kolokotronis
2019 cou kolokotronis_nicholas - nicholas kolokotronis2019 cou kolokotronis_nicholas - nicholas kolokotronis
2019 cou kolokotronis_nicholas - nicholas kolokotronis
 
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
CAN BLOCKCHAIN PRIVATE KEY BE HACKED?
 
identity based encryption transformation for flexible sharing of encrypted da...
identity based encryption transformation for flexible sharing of encrypted da...identity based encryption transformation for flexible sharing of encrypted da...
identity based encryption transformation for flexible sharing of encrypted da...
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Blockway
BlockwayBlockway
Blockway
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
 
Group slide presentation week12
Group slide presentation week12Group slide presentation week12
Group slide presentation week12
 
Cryptography
CryptographyCryptography
Cryptography
 
online game over cryptography
online game over cryptographyonline game over cryptography
online game over cryptography
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
Week12
Week12Week12
Week12
 

Viewers also liked

PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGEPRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGEI3E Technologies
 
ieee projects 2014-15 for cse with abstract and base paper
ieee projects 2014-15 for cse with abstract and base paper ieee projects 2014-15 for cse with abstract and base paper
ieee projects 2014-15 for cse with abstract and base paper vsanthosh05
 
ძველი ქართული ხუროთმოძღვრება
ძველი ქართული ხუროთმოძღვრებაძველი ქართული ხუროთმოძღვრება
ძველი ქართული ხუროთმოძღვრებაrusudanchxartishvili
 
Query aware determinization of uncertain objects .
Query aware determinization of uncertain objects .Query aware determinization of uncertain objects .
Query aware determinization of uncertain objects .LeMeniz Infotech
 
Research design
Research designResearch design
Research designMahi Soni
 
Lektura Zypa Cupak
Lektura Zypa CupakLektura Zypa Cupak
Lektura Zypa Cupakdenisdudas00
 
Week 4 proposal power point public
Week 4 proposal power point   publicWeek 4 proposal power point   public
Week 4 proposal power point publiccollegeagain
 
Telemno Life Agency-Product Presentation
Telemno Life Agency-Product PresentationTelemno Life Agency-Product Presentation
Telemno Life Agency-Product PresentationTELEMNO LIFE AGENCY
 
A novel wall switched step-dimming concept in led lighting systems using pfc ...
A novel wall switched step-dimming concept in led lighting systems using pfc ...A novel wall switched step-dimming concept in led lighting systems using pfc ...
A novel wall switched step-dimming concept in led lighting systems using pfc ...LeMeniz Infotech
 
Dance and dense denso
Dance and dense densoDance and dense denso
Dance and dense densoPathetic_punk
 
Swedish_Technology_Time_Attendance
Swedish_Technology_Time_AttendanceSwedish_Technology_Time_Attendance
Swedish_Technology_Time_AttendanceSwedish Technology
 
Ethereum: A decentralized software platform for people and things
Ethereum: A decentralized software platform for people and thingsEthereum: A decentralized software platform for people and things
Ethereum: A decentralized software platform for people and thingsAlexander Hirner
 

Viewers also liked (18)

Big data ppt
Big  data pptBig  data ppt
Big data ppt
 
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGEPRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
PRIVACY-PRESERVING CIPHERTEXT MULTI-SHARING CONTROL FOR BIG DATA STORAGE
 
ieee projects 2014-15 for cse with abstract and base paper
ieee projects 2014-15 for cse with abstract and base paper ieee projects 2014-15 for cse with abstract and base paper
ieee projects 2014-15 for cse with abstract and base paper
 
ძველი ქართული ხუროთმოძღვრება
ძველი ქართული ხუროთმოძღვრებაძველი ქართული ხუროთმოძღვრება
ძველი ქართული ხუროთმოძღვრება
 
Query aware determinization of uncertain objects .
Query aware determinization of uncertain objects .Query aware determinization of uncertain objects .
Query aware determinization of uncertain objects .
 
Project
ProjectProject
Project
 
Research design
Research designResearch design
Research design
 
Lektura Zypa Cupak
Lektura Zypa CupakLektura Zypa Cupak
Lektura Zypa Cupak
 
Week 4 proposal power point public
Week 4 proposal power point   publicWeek 4 proposal power point   public
Week 4 proposal power point public
 
Telemno Life Agency-Product Presentation
Telemno Life Agency-Product PresentationTelemno Life Agency-Product Presentation
Telemno Life Agency-Product Presentation
 
A novel wall switched step-dimming concept in led lighting systems using pfc ...
A novel wall switched step-dimming concept in led lighting systems using pfc ...A novel wall switched step-dimming concept in led lighting systems using pfc ...
A novel wall switched step-dimming concept in led lighting systems using pfc ...
 
Dance and dense denso
Dance and dense densoDance and dense denso
Dance and dense denso
 
Pierce leslie bungalow, kerala
Pierce leslie bungalow, keralaPierce leslie bungalow, kerala
Pierce leslie bungalow, kerala
 
Swedish_Technology_Time_Attendance
Swedish_Technology_Time_AttendanceSwedish_Technology_Time_Attendance
Swedish_Technology_Time_Attendance
 
604 2441-1-pb
604 2441-1-pb604 2441-1-pb
604 2441-1-pb
 
Ethereum: A decentralized software platform for people and things
Ethereum: A decentralized software platform for people and thingsEthereum: A decentralized software platform for people and things
Ethereum: A decentralized software platform for people and things
 
Ppt2
Ppt2Ppt2
Ppt2
 
Q3
Q3Q3
Q3
 

Similar to Privacy preserving ciphertext multi-sharing control for big data storage

Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storageLeMeniz Infotech
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityLeMeniz Infotech
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsLeMeniz Infotech
 
Performing initiative data prefetching in distributed file systems for cloud ...
Performing initiative data prefetching in distributed file systems for cloud ...Performing initiative data prefetching in distributed file systems for cloud ...
Performing initiative data prefetching in distributed file systems for cloud ...LeMeniz Infotech
 
Space efficient verifiable secret sharing using polynomial interpolation
Space efficient verifiable secret sharing using polynomial interpolationSpace efficient verifiable secret sharing using polynomial interpolation
Space efficient verifiable secret sharing using polynomial interpolationLeMeniz Infotech
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...LeMeniz Infotech
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy  preserving public auditing for shared data in the cloudOruta privacy  preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudLeMeniz Infotech
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...LeMeniz Infotech
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationLeMeniz Infotech
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...LeMeniz Infotech
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storageLeMeniz Infotech
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...LeMeniz Infotech
 
User defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesUser defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesLeMeniz Infotech
 
Generic and efficient constructions of attribute based encryption with verifi...
Generic and efficient constructions of attribute based encryption with verifi...Generic and efficient constructions of attribute based encryption with verifi...
Generic and efficient constructions of attribute based encryption with verifi...LeMeniz Infotech
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...LeMeniz Infotech
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...LeMeniz Infotech
 
Traffic pattern based content leakage detection for trusted content delivery ...
Traffic pattern based content leakage detection for trusted content delivery ...Traffic pattern based content leakage detection for trusted content delivery ...
Traffic pattern based content leakage detection for trusted content delivery ...LeMeniz Infotech
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...1crore projects
 
Providing privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systemsProviding privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systemsLeMeniz Infotech
 

Similar to Privacy preserving ciphertext multi-sharing control for big data storage (20)

Privacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storagePrivacy preserving ciphertext multi-sharing control for big data storage
Privacy preserving ciphertext multi-sharing control for big data storage
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
Performing initiative data prefetching in distributed file systems for cloud ...
Performing initiative data prefetching in distributed file systems for cloud ...Performing initiative data prefetching in distributed file systems for cloud ...
Performing initiative data prefetching in distributed file systems for cloud ...
 
Space efficient verifiable secret sharing using polynomial interpolation
Space efficient verifiable secret sharing using polynomial interpolationSpace efficient verifiable secret sharing using polynomial interpolation
Space efficient verifiable secret sharing using polynomial interpolation
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy  preserving public auditing for shared data in the cloudOruta privacy  preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
User defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesUser defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based services
 
Generic and efficient constructions of attribute based encryption with verifi...
Generic and efficient constructions of attribute based encryption with verifi...Generic and efficient constructions of attribute based encryption with verifi...
Generic and efficient constructions of attribute based encryption with verifi...
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
 
A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
Traffic pattern based content leakage detection for trusted content delivery ...
Traffic pattern based content leakage detection for trusted content delivery ...Traffic pattern based content leakage detection for trusted content delivery ...
Traffic pattern based content leakage detection for trusted content delivery ...
 
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
 
Providing privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systemsProviding privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systems
 

More from LeMeniz Infotech

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...LeMeniz Infotech
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...LeMeniz Infotech
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...LeMeniz Infotech
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachLeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsLeMeniz Infotech
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlLeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...LeMeniz Infotech
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...LeMeniz Infotech
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersLeMeniz Infotech
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedLeMeniz Infotech
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksLeMeniz Infotech
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsLeMeniz Infotech
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...LeMeniz Infotech
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android appsLeMeniz Infotech
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication schemeLeMeniz Infotech
 

More from LeMeniz Infotech (20)

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 

Privacy preserving ciphertext multi-sharing control for big data storage

  • 1. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage ABSTRACT: The need of secure big data storage service is more desirable than ever to date. The basic requirement of the service is to guarantee the confidentiality of the data.However, the anonymity of the service clients, one of the most essential aspects of privacy, should be considered simultaneously. Moreover, the service also should provide practical and fine-grained encrypted data sharing such that a data owner is allowed to share a ciphertext of data among others under some specified conditions. This paper, for the first time, proposes a privacy-preserving ciphertext multi-sharing mechanism to achieve the above properties. It combines the merits of proxy re-encryption with anonymous technique in which a ciphertext can be securely and conditionally shared multiple times without leaking both the knowledge of underlying message and the identity information of ciphertext senders/recipients. Furthermore, this paper shows that the new primitive is secure against chosen-ciphertext attacks in the standard model.. INTRODUCTION TO DATE many individuals and companies choose to upload their data to clouds since the clouds supports considerable data storage service but also efficient data processing capability. Accordingly, it is unavoidable that trillions of personal and industrial data are flooding the Internet. For example, in some smart grid scenario, a governmental surveillance authority may choose to supervise the electricity consumption of a local living district. A great amount of electricity consumed data of each family located inside the district will be automatically transferred to the authority via Internet period by period. The need of big data storage, therefore, is more desirable than ever. EXISTING SYSTEM In Existing System a basic security requirement of big data storage is to guarantee the confidentiality of the data. Fortunately, some existing
  • 2. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com cryptographic encryption mechanisms can be employed to fulfill the requirement. For instance, Public Key Encryption (PKE) allows a data sender to encrypts the data under the public key of receiver such that no one except the valid recipient can gain access to the data DisADVANTAGE OF Existing SYSTEM  Does not satisfy all the requirements of users in the scenario of big data storage.job execution time. PROPOSED SYSTEM In Proposed System a concrete construction for unidirectional AMH-IBCPRE, in which it achieves multiple ciphertext receiver update, conditional data sharing, anonymity and collusion-safe (i.e. holding against collusion attacks) simultaneously in asymmetric bilinear group. Note the functionality of our system is generally described in Fig 1. We state that the new primitive is applicable to many real-world applications, such as secure email forwarding, electronic encrypted data sharing, where both anonymity and flexible encrypted data sharing are needed. We also show that the scheme is CCA-secure in the standard model under the decisional P-Bilinear Diffie-Hellman assumption. To the best of our knowledge, our system is the first of its kind in the literature. ADVANTAGE OF PROPOSED SYSTEM  Anonymity: given a ciphertext, no one knows the identity information of sender and receiver.  Multiple receiver-update: given a ciphertext, the receiver of the ciphertext can be updated in multiple times.  Conditional sharing: a ciphertext can be fine-grained shared with others if the pre- specified conditions are Satisfied
  • 3. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com ARCHITECTURE:
  • 4. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 44 Mb.  Monitor : 15 VGA Colour. SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : Java 1.7 ,Hadoop 0.8.1  Database : MySql 5  IDE : Eclipse