Submit Search
Upload
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
•
0 likes
•
16 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i5/IRJET-V6I5893.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 8
Download now
Download to read offline
Recommended
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET Journal
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Editor IJCATR
J017547478
J017547478
IOSR Journals
Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
Iaetsd Iaetsd
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
Recommended
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET- Privacy Preserving Keyword Search over Cloud Data
IRJET Journal
International Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
An proficient and Confidentiality-Preserving Multi- Keyword Ranked Search ove...
Editor IJCATR
J017547478
J017547478
IOSR Journals
Cloud Data Security and Secure Data Sharing Methods
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
iaetsd Preserving private multi keyword searching with ranking by anonymous i...
Iaetsd Iaetsd
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET Journal
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
Iaetsd Iaetsd
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
1crore projects
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Journals
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Publishing House
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
Security and privacy approach of cloud computing
Security and privacy approach of cloud computing
Jahangeer Qadiree
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
IMPULSE_TECHNOLOGY
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal
A Little Security For Big Data
A Little Security For Big Data
Saurabh Kheni
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Pvrtechnologies Nellore
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
LeMeniz Infotech
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
Samuel Borthwick
IJSRED-V2I2P55
IJSRED-V2I2P55
IJSRED
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
More Related Content
What's hot
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
redpel dot com
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET Journal
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
Iaetsd Iaetsd
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
1crore projects
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Journals
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
eSAT Publishing House
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
cscpconf
Security and privacy approach of cloud computing
Security and privacy approach of cloud computing
Jahangeer Qadiree
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
IMPULSE_TECHNOLOGY
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal
A Little Security For Big Data
A Little Security For Big Data
Saurabh Kheni
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Pvrtechnologies Nellore
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
LeMeniz Infotech
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Editor IJMTER
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
Samuel Borthwick
IJSRED-V2I2P55
IJSRED-V2I2P55
IJSRED
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
IRJET Journal
What's hot
(20)
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
IRJET- Compound Keyword Search of Encrypted Cloud Data by using Semantic Scheme
Carrying out safe exploration short of the actual data of codes and trapdoors
Carrying out safe exploration short of the actual data of codes and trapdoors
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
Security and privacy approach of cloud computing
Security and privacy approach of cloud computing
Enabling secure and efficient ranked keyword
Enabling secure and efficient ranked keyword
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
A Little Security For Big Data
A Little Security For Big Data
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
IJSRED-V2I2P55
IJSRED-V2I2P55
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
A Survey on Access Control Scheme for Data in Cloud with Anonymous Authentica...
Similar to IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET Journal
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
IRJET Journal
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET Journal
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
C017421624
C017421624
IOSR Journals
50120140503020
50120140503020
IAEME Publication
journal paper
journal paper
rikaseorika
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
IJERA Editor
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
Ad4502189193
Ad4502189193
IJERA Editor
Ijariie1196
Ijariie1196
IJARIIE JOURNAL
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET Journal
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET Journal
Similar to IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
(20)
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
C017421624
C017421624
50120140503020
50120140503020
journal paper
journal paper
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
Ad4502189193
Ad4502189193
Ijariie1196
Ijariie1196
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
AbhinavSharma374939
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Recently uploaded
(20)
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6404 Multi-Owner Keyword Search Over Cloud with Cryptography Shaikh Rohan Ali1, Javed Md. Khan 2, Chaudhari Khuduspasha 3, Mr. Shaikh Sharique Ahmad4 1,2,3B.E. (Computer) Pursuing Jamia Institute of Engineering & Mgmt. Studies, Akkalkuwa, Maharashtra India 4M.E. (Computer), Lecturer Jamia Institute of Engineering & Mgmt. Studies, Akkalkuwa, Maharashtra India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In first, most of the prevailing schemes most effective bears in thoughts the state of affairs with the single data owner. 2nd, they need at ease channels to guarantee the relaxed transmission of thriller keysfromtherecordsowner to statistics customers. 0.33, in a few schemes, the statistics owner needs to be online to assist facts customers at the same time as data clients intend to perform the search, this is inconvenient. Searchable encryption letsincloudcustomersto outsource the huge encrypted statistics tothealongway-flung cloud and to go looking over the information without revealing the touchy information. Many schemes have been proposed to resource the important thing-word seek in a public cloud. But, they have got a few ability limitations. To enable users to quickly type out the records of pastimes from massive encrypted facts, searchable encryption has been proposed and enriched by way of many schemes. rather than decrypting the complete information, those schemes allow users to appearance over the encrypted facts and pleasant decrypt the corresponding files. Searchable encryption schemes were proposed to clear up the problems causedatthe same time as the information proprietor shares the statistics with a couple of customers Keywords—component, formatting, style, styling, insert (key words) 1. INTRODUCTION The short growth of cloud customers has affirmedthatcloud storage services are becoming the inseparable part of humans' life. Customers can experience a greater reachable and price-green storage environmentthanpreservinga local storage infrastructure. However, the reality that cloud garage offerings offer massive convenience for customers, statistics confidentiality and privacy is probably placed at danger even as clients outsource the facts to a miles-flung cloud server. Clearly, encryptingtheinformation earlierthan outsourcing is a way to defend facts privateers. However, this may make facts utilization, collectively with keyword search, a completely hard project [1]. Those schemespermit customers to search around over the encrypted records and handiest decrypt the corresponding documents. Maximum of the prevailing schemes simplest takes into account the state of affairs of a single facts proprietor. As opposed to handiest one records owner, most cloudcompanies,intruth, serve a couple of statistics owners who are able to percentage their information with every different. For the reason that data sharing is turning into increasingly important at the user facet, the way to permit facts customers speedy and securely discover the information of interests from a couple of information owners’ facts will become hard trouble. Due to the huge transmissions of secret keys, it isn't reasonable to without delay enlarge the present schemes from one statistics proprietor to multiple data owners. 1.1 What is multi owner keyword search over shared data? The information is significant information' raw fabric. The information shared via the use of the cloud computing concept. The key-wordisacomponentwhichtogolookingon the basis of client’s quires. [14] In shared facts, all vital recordsavailable thrusimply. The person thatcanbelooking the information to getrightofaccesstovirtualinformationits dealt with as a “multi-proprietor”. At the back of the concept of the unmarried owner, it deals with more than one key- word searching procedures. [1]. specific facts objects (or documents, we do no longer distinguish the belief of facts with that of the record within the course of the paper as international locations are interactively used in masses of references mentioned right here) outsourced are encrypted by means of a single key. [2-9] the statistics retrieval line of work and the oblivious switch line of labor fall on this magnificence. Mostoftheresearchonsearchableencryptions centered on the case whilst data are encrypted with the identical key and extra green solutions have been proposed in current years. The idea behind the ones buildings is thatto access a database, in my opinion authorized consumer is issued a question key by using the information owner and simplest the legal clients who've valid query keys can generate legitimate get proper of access to queries which allow the database manipulate servertoprocedureusers’are seeking for queries without gaining knowledge of the keywords contained within the queries and the contents of the encrypted statistics. 1.2 Impaction of cloud computing on multi owner keyword search over shared data The records of visitors need to be extended due to the expandability of the internet of factors.Intoday’sgeneration server have a tremendous impact onthefactsmanipulate. In the back of the idea of man or woman servers, we difficulty this period with allotted server fashion. The speedy growth of cloud customers has affirmed that cloud storage offerings are getting the inseparable a part of human beings'lifestyles. Users can enjoy an extra on hand and price-green garage
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6405 surroundings than keeping a neighbourhood storage infrastructure. No matter the reality that cloud garage services offer large comfort for customer’s records confidentiality and privacy might be positioned at threat while clients outsource the records toa mileoffcloudserver. Certainly, encrypting the data earlier than outsourcing is an approach to defend facts privateers.But,thismaymakefacts usage, which includes key-phrase search, a very hard task. [6], [7] Cloud computing protection isa brief-growingcarrierthat offers the numerous same functionalities as traditional IT safety. This includes protective important statistics from robbery, records leakage, and deletion. One of the blessings of cloud offerings is that you can feature at scale and although continue to be comfy. It is similar to how you presently manipulate safety, however now you've got new strategies of turning in protection solutions that address new regions of the mission. Cloud protection does not exchange the method on a mannertomanipulatesafetyfrom stopping to detective and corrective actions. But, it does, however, give you the capability to carry out those activities in an additional agile manner Your information is secured inside statistics centres and wherein some nations require facts to be saved in their united states, selecting an issue that has multiple records centres internationally can help to read this. Statistics storage regularly includes sure compliance requirements, especially while storing credit ratingcard numbersorhealth information. Many cloud companies provide impartial zero.33-celebration audit reviews to attest that their inner system exists and are effective in coping with the security inside their centres in which you keep your information. [17]. 2. PROBLEM DEFINATION In first, the vast majority of the current plans just thinkabout the situation with the single information proprietor. Second, they need secure channels to ensure the protected transmission of mystery keys from the information proprietor to information clients. Third, in certain plans, the information proprietor ought to be online to help inform clients when information clients expect to play out the hunt, which is badly arranged.Accessibleencryptionpermitscloud clients to re-appropriate the monstrous scrambled information to the remote cloud and to look over the information without uncovering the touchy data. Numerous plans have been proposed to help the watchword seek in an open cloud. In any case, they have some potential confinements. To empower clients to rapidly deal with the data of premiums from expansive scrambled information, accessible encryption has been proposed and enhanced by numerous plans. Rather than decoding the entire information, these plans enable clients to look over the scrambled information and just unscramble the comparing records. Accessible encryption plans have been proposed to tackle the issues caused when the information proprietor imparts the information to numerous clients. [2-9] 3. LITERATURE SURVEY Due to the fact that music et al. [2] supplied the primary sensible searchable encryption scheme, many observe-up schemes have been proposed in the literature [3,4,20-22]. Some of these schemes only permit the facts owner to search over the encrypted statistics, which aren't inappropriate for statistics sharing offerings inside the cloud. In mild of this trouble, some schemes [5-9,19] were proposed to support multi-consumer searchable encryption, implying that the facts can also be searched by using authorized customers thinking about the cost of building the secure channels, Beak et al. [10] proposed the first scheme, called secure channel free searchable encryption (SCFPEKS), aiming to dispose of the relaxed channels from searchable encryption. Rhee at al. [11] delivered an enhanced security versionandconstructed a scheme on this model. To improve performance, GU et al. [12] presented a unique SCF-PEKS scheme without pairing operation Rhee at al. [11] broughtasuperiorsecurityversion and constructed a scheme on this model. To enhance performance, GU et al. [12] supplied a unique SCF-PEKS scheme without pairing operation. If there are many informationproprietorswhoareinclinedto share their information with each other, new searchable encryption is required. For the answers with comfortable channels, every informationownerhastoestablishanatease channel with a records person and transmits the secret records via the channel. It way that each the computation overhead and conversation overhead growth with the wide variety of facts owners. For the SCF-PEKS schemes, each records proprietor has to encrypt every key-word for each statistics user. The computation overhead and garage overhead will growth no longer handiest with the variety of facts users however also with the variety of keywords. Consequently, it'smilesgreattolayoutsearchableencryption without comfy channels in a multi-owner placing. 4. EXISTING METHODOLOGY Inside the present system, the maximum of the prevailing schemes most effective keep in mind the situation ofa single records owner. as opposed to mosteffectiveoneinformation proprietor, maximum cloud carriers,infact,servea coupleof statistics owners who are capable of proportion their records with each different. Since the records sharing is becoming increasingly more critical at the user aspect, how to let records customers fast and securely find out the facts of pastimes from more than one data proprietors’factsturns into a difficult problem. Because of the big transmissions of mystery keys, it isn't always reasonable to at once expand the existing schemes from one facts owner to a couple of information proprietors. [18]
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6406 A. System model The machine version includes 3 entities the manager, users, and the cloud server. The supervisor takes charge of the institution management, consisting of adding a new consumer and doing away with a revoked user. Each user within the institution is taken into consideration as a licensed person, which means that the user concurrently performs roles: an information proprietor and a facts user. As a statistics owner, the person can share his encrypted information with other legal customers within the group. And as a facts person, the consumer can search over the encrypted facts of others in the organization. After the manager allows a new consumer tojointheorganization, the brand new person desires to add the general public key to the cloud server. Then the manager publishes a notification to the cloud server, which informs each legal consumer to download the public key of the new person and generate a re-encryption key for the new consumer. After that, the brand new person can enjoy searching over the encrypted information of others in the group. Analogously, to permit the legal customers to search over the information of the new consumer, this new user desires to generate a re- encryption key for each authorized user and uploads these keys to the cloud server. To revoke a user from the group, the manager simplest wishes to request the cloud server to delete all the re-encryption keys related to the revokeduser. Since our scheme makes used. B. Security model In this work, we recollect that there is no secure channel in our machine. All of the records transmitted can be intercepted by means of a choosadversary who can listen in on transmission channels. It method that no secret facts are permitted to be transmitted through transmission channels. Meanwhile, we recall the honest but curious cloud server like the maximum of the prevailing works. The cloudserverwill simplyobserve our proposed protocol, however curiously try to research as a great deal additional records as viable from the acquired information. It’s miles well worth noting that we forget about the collusion among the cloud server and revoked customers. In addition, no legal user will help the cloud server find out additional records. Moreover, the cloud server will now not assist revoked users to preserve the privilege which they ever owned inside the group. C. Design objectives Our scheme ambitions to attain subsequent goals. 1. Safety: - Even in the environment without at ease channels, our scheme should nevertheless saveyou the cloud server from getting to know extra statistics and keep the contents of the documents, the keywords within the index, and the key-wordin trapdoors as secret. 2. Efficiency: - Our scheme ought to reap an appropriate performance from a person’s angle. 3. Efficient person Adjustment: - Our scheme has to guarantee that the consumer adjustment is green and relaxed. Only the legal users can perform the hunt over the encrypted statistics sharedwithinthe group. The revoked users will lose the privilege of the hunt. 5. PROPOSED METHODOLOGY In first, the maximum of the prevailing schemes best recalls the state of affairs with the single information owner. Second, they want comfortable channels to assure the cozy transmission of secret keys from the statisticsownertofacts users. 1/3, in some schemes, the records proprietorought to be online to assist records customers while facts users intend to perform the hunt, that is inconvenient. Searchable encryption permits cloud customers to outsource the huge encrypted facts to the far off cloud and to go lookingover the data without revealing the touchy records. Many schemes have been proposed to guide the key-word seek in a public cloud. But, they have a few capacity obstacles. To enable users to speedy kind out the statistics of interests from huge encryptedrecords,searchableencryptionhasbeenproposed and enriched through many schemes. In preference to decrypting the complete records, these schemes allowusers to look over the encrypted information and best decrypt the corresponding files. Searchable encryption schemes were proposed to solve the troubles brought on while the facts proprietor shares the facts with a couple of users. [2-9]. We advise a novel searchable scheme which helps the multi- owner keyword seek without at ease channels. Greater than that, our scheme is a non-interactive solution, wherein all the customers handiest need to talk with the cloud server. Moreover, the analysis proves that our scheme can assure safety even without secure channels. Not like maximum existing public key encryption primarily based searchable schemes, we evaluate the performance ofourscheme,which suggests that our scheme is sensible. We provide secure and privacy-maintaining access manipulate to customers,which guarantees any member inside the organization to anonymously utilize the cloud aid. Furthermore, the real identities of statistics owners can be discovered throughthe group manager when disputes occur. Right hereweusethan the variety of servers and at the back of the concept of centralized. We concentrate on some convenience 1. Timing intake is less 2. Decryption key should be sent via a secure channel and kept secret.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6407 3. It is an efficient public keyencryptionschemewhich supports flexible delegation. So these aspects stand as a tool for reduce power of internet scale in the steganography. 6. ARCHITECTURE Fig -1: Architecture of System MODULE DESCRIPTION It consists of 4 modules which to be specified here, 1. Group Manager Module 2. Group Member Module 3. Cloud Module 4. User Module Group Manager Module a) In our scheme, we do not forget that the supervisor is an initiator who creates a collection. b) The manager takes a fee of the group control, including a brand new person and removing a revoked consumer. c) Every person within the group is taken into consideration as a certified person, because of this that the consumer simultaneously performs two roles: a records proprietor and a statistics consumer. As facts proprietor, the consumer can percentage his encrypted facts with different legal customers in the institution. Group Member Module a) As a data user, the person can seek over the encrypted information of others inside the group. After the manager allows a new consumer to enroll in the institution, the new person desires to add the public key to the cloud server. b) Then the manager publishes a notification to the cloud server, which informs every authorized person to download the public key of the new user and generate a re-encryption key for the brandnew person. c) After that, the new user can revel in searching over the encrypted facts of others within the group. Cloud Module a) The rapid growth of cloud users has Affirmed that cloud storage services havebecometheindivisiblea part of people’s life. b) Despite the removal of secure channels, these solutions are still aloof from being deployed in an exceedingly real public cloud. Most cloud suppliers, in reality, serve multiple knowledge homeowners WHO are ready to share their data with one another. c) The cryptographic primitive known as proxy re- encryption is employed to assistknowledgeowners delegate the power of search to data users via the cloud server, while not revealing any extra info. User Module a) User revocation is performed by the cluster manager via a publicobtainablerevocationlist(RL), supported that cluster members will inscribe their knowledge files and make sure the confidentiality. 7. DIAGRAME Fig -2: DFD (Data Flow Diagram)
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6408 Fig -3: Sequence diagram of Manager module Fig -4: Sequence diagram of Data User module Fig -5: Sequence diagram of Cloud module Fig -6: Sequence diagram of Admin module Fig -7: Components diagram of Manager Panel Fig -8: Component Diagram of Data User Panel Fig -9: Component Diagram of Cloud Panel Fig -10: Component Diagram of Admin Panel Fig -11: Class Diagram of the project
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6409 8. DIAGRAME 1. SKE.Gen (1k) →K: Inputs a security parameter 1k, the key generation algorithm SKE. Gen outputs a key K. 2. SKE.Enc (K, m) →c: Inputs a key K and a message m, the encryption algorithm SKE.Enc outputs a cipher text. 3. SKE.Dec (K, c) →m: Inputs a key K and a ciphertext c, the decryption algorithm SKE.Dec outputs a message. Many businesses and those store their crucial statistics on cloud and information is also accessed through many folks, so it's far very crucial to relaxed the facts from intruders. To provide safety to cloud many algorithms are designed. Afew popular algorithms are A. Data Encryption Standard (DES) This stands for data Encryption standard anditchangedinto advanced in 1977. It becomes the first encryption trendy to be recommended by means of NIST (National Institute of standards and technology). DES is64bits’keylength with64 bits block size. Considering that that time, many attacks and methods have witnessed weaknesses of DES, which made it an insecure block cipher. [23] B. AES (Advanced Encryption Standard): The basic steps in algorithm [8] are stated as: Key Expansion - round keys are derived from the cipher key using Rijndael's key schedule Initial Round AddRoundKey - each byte of the state is combined with the round key using bitwise xor RoundsSubBytes - Every byte is replacedwithanotherbyte according to a looks towards table by the non-linear substitution steps. ShiftRows – The transposition step where each row of the state is shifted cyclically certain number of steps. MixColumns - A mixing of columns operation which operates on the columns of the state, combining the four bytes in each column is called as MixColumns. AddRoundKey Final Round (no MixColumns)- 1. SubBytes 2.ShiftRows 3. AddRoundKey Key generation- This module handles key generation by the cryptographic module at client side. The server generates unique keys for users once they authenticate themselves with the server. The key is generated using instances of AES key generator class. This key is then transferred to the cloud client via the mail-server through a mail which receives and stores a copy for it for decrypting purpose. Algorithm Cipher(byte[] input, byte[] output) { byte[4,4] State; copy input[] into State[] AddRoundKey for (round = 1; round < Nr-1; ++round) { SubBytes ShiftRows MixColumns AddRoundKey } SubBytes ShiftRows AddRoundKey copy State[] to output[] } C. Blowfish Algorithm This became evolved in 1993. It is one of the most common public algorithms provided by using Bruce Schneier. Blowfish is a variable period key, 64 bit block cipher. No
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6410 attack is understood to be successful against this. Various experiments and research evaluation provedthe prevalence of Blowfish algorithm over different algorithms in terms of the processing time. Blowfish is better than different algorithms in throughput and power consumption [24]. Algorithm: Divide x into two 32-bit halves: xL , xR For i = 1to 16: xL = xL XOR Pi xR = F(xL) XOR xR Swap xL and xR Next i Swap xL and xR (Undo the last swap.) xR = xR XOR P17 xL = xL XOR P18 Recombine xR and xL D. RSA That is internet encryption and authentication system that makes use of a set of rules developed in 1977 by using Ron Rivest, Adi Shamir, and Leonard Adleman. The RSA set of rules is the maximum commonly used encryption. till now it's far the handiest set of rules used for non-public and public key technology and encryption. it's far a fast encryption [9]. Algorithm Key Generation: KeyGen(p, q) Input: Two large primes –p, q Compute n = p. q φ (n) = (p -1) (q -1) Choose e such that gcd(e, φ (n)) = 1 Determine d such that e.d ≡ 1 mod φ (n) Key: Public key = (e, n) Secret key= (d, n) Encryption: c = me mod n where c is the cipher text and m is the plain text. RSA has a multiplicative homomorphic property i.e., it is possible to find the product of the plain text by multiplying the cipher texts. The result of the operation will be the cipher text of the product. Given ci = E (mi) = mie mod n, then (c1. c2) mod n = (m1 . m2)e mod n 9. CONCLUSION On this paper, we endorse a singular public key primarily based key-word seek scheme, whichsupportsa multi-owner keyword seek without at ease channels. furthermore, our scheme supports non-interactivity, this means that each facts proprietor and information person within the group can whole his man or woman tasks without interacting with each other. Instead, each of the customers inside the institution handiest wishes to have interaction with the cloud server. furthermore, even though the removal of comfortable channels, our scheme can nonetheless guarantee the comfy key-word seek, with the intentiontono longer reveal any extra statistics to the cloud server nor the eavesdropper. In our project work we can deal withsecurity until we not provided secure channels. ACKNOWLEDGEMENT “A journey is easier when you travel together. Interdependence is certainly more valuable than independence.” We take this opportunity to express our deep sense of gratitude and respect to our guide Mr. Shaikh Sharique Ahmad without his constant encouragement and key tips it would not have been possible to completethiswork withthe present quality and we really indebted him for helping us in each aspect of our academic’s activities. We also owe our sincere thanks to all faculty members of Computer Engineering Department who have been always ready with a helping hand. Last, but not the least, we thank all those people, who have helped us directly or indirectly in accomplishing this work. I extend a special word to my friends, who have been a constant source of inspiration throughout my project work. “The completion of any project depends upon the cooperation, coordination, and combined efforts of several resources of knowledge, inspiration, and energy”. REFERENCES [1] W.H Sun, W.J Lou, Y.T Hou, and H Li, “Privacy-preserving keyword search over encrypted data in cloud computing,” in Secure Cloud Computing. Springer, 2014, pp. 189–212. [2] D.X Song, D Wagner, and A Perrig, “Practical techniques for searches on encrypted data,” in Security and Privacy,
8.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 6411 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on. IEEE, 2000, pp.44–55. [3] D Boneh, C.G DI, R Ostrovksy, and G Persiano, “Public key encryption with keyword search,” in Advances in Cryptology-Eurocrypt 2004. Springer, 2004, pp. 506–522. [4] R Curtmola, J Garay, S Kamara, and R Ostrovsky, “Searchablesymmetric encryption:improveddefinitions and efficient constructions,” in Proceedings of the 13th ACM conference onComputerand communicationssecurity.ACM, 2006, pp. 79–88. [5] J Li, Q Wang, C Wang, N Cao, K Ren, and W.J Lou, “Fuzzy keyword search over encrypted data in cloud computing.” in Computer Communications (INFOCOM), IEEE,2010,pp.1-5. [6] C Wang, N Cao, J Li, K Ren, and W.J Lou, “Secure ranked keyword search over encrypted cloud data,” in IEEE 30th International Conference on DistributedComputingSystems (ICDCS), 2010, pp. 253–262. [7] M Li, S.C Yu, N Cao, and W.J Lou, “Authorized private keyword search over encrypted data in cloud computing,” in Distributed Computing Systems (ICDCS), 2011 31st International Conference on. IEEE, 2011, pp. 383–392. [8] N Cao, C Wang, M Li, K Ren, and W.J Lou, “Privacy- preserving multi-keyword ranked search over encrypted cloud data,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 1, pp. 222–233, 2014. [9] W.H Sun, B. Wang, N Cao, M Li, W.J Lou, Y.T Hou, and H Li,” Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking,” in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM, 2013,pp.71– 82. [10] J Baek, R Safavi-Naini, and W Susilo, “Public key encryptionwithkeywordsearchrevisited,”inComputational Science and Its Applications– ICCSA 2008. Springer, 2008, pp. 1249–1259. [11] H.S Rhee, J.H Park, W Susilo, and D.H Lee, “Improved searchable public key encryption with designated tester,” in Proceedings of the 4th International Symposium on Information, Computer, and CommunicationsSecurity.ACM, 2009, pp. 376–379. [12] C.X Gu, Y.F Zhu, and H Pan, “Efficient public key encryption with keyword search schemes from pairings,” in Information security and cryptology. Springer, 2008, pp. 372–383. [13] W.H Sun, X.F Liu, W.J Lou, Y.T Hou, and HLi,“Catchyouif you lie to me: Efficientverifiableconjunctivekeywordsearch over large dynamic encrypted cloud data,” in IEEE Conference on Computer Communications (INFOCOM), 2015, pp. 2110–2118. [14] B Wang, W Song, W.J Lou, and Y.T Hou, “Inverted index based multi-keyword public-keysearchableencryptionwith strong privacy guarantee,” in IEEE Conference on Computer Communications (INFOCOM), 2015, pp. 2092–2100. [15] F Bao, R.H Deng, H.F Zhu, “Variations of diffie- hellman problem,” in Information and Communications Security. Springer, 2003, pp.301–312. [16] “Enron Email Dataset,” https://www.cs.cmu.edu/~./enron/. [17] “Pairing-based Cryptographic Library,” https://crypto.stanford.edu/pbc/. [18] “OpenSSL,” https://www.openssl.org/. [19] B Wang, S Yu, W.J Lou, Y.T Hou, “Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud.” In INFOCOM, 2014 Proceedings, 2014, pp. 2112- 2120. [20] E.J Goh. “Secure Indexes.” IACR Cryptology ePrint Archive, pp. 216, 2003. [21] P Golle, J Staddon, and B Waters. “Secure conjunctive keyword search over encrypted data.” In Applied Cryptography and Network Security, 2004, pp. 31-45. [22] S Kamara, C Papamanthou, and T Roeder,” Dynamic searchable symmetric encryption.” In Proceedings of the 2012 ACM conference on Computer and communications security, 2012, pp. 965-976. [23] Yogesh Kumar, Rajiv Munjal and Harsh Sharma,”Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures”IJCSMSInternational Journal ofComputer Science and Management Studies,Vol.11,Issue03, Oct2011. [24] Mr. Gurjeevan Singh, Mr. Ashwani Singla and Mr. K S Sandha “Cryptography Algorithm Comparison For Security Enhancement In Wireless Intrusion Detection System” International Journal of Multidisciplinary Research Vol.1 Issue 4, August 2011. [25] Uma Somani, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing,"2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC-2010).
Download now