The subsisting public-key encryption schemes which are semantically secure, take linear search time with
the total number of cipher texts, thus making data retrieval from databases arduous or time consuming. So,
in order to rectify the current quandary, the paper proposes SPCHS Methodology for Expeditious Keyword
Search. In Searchable Public Key Cipher texts with Obnubilated Structures (SPCHS), the concept of
obnubilated structures is introduced. Here, the concept of filtering is utilized efficiently. This in turn, makes
data retrieval from sizably voluminous scale databases far more facile by reducing the time intricacy as well
as ensuring efficient performance. The time involution of our scheme depends only on the genuine number of
engendered cipher texts rather than all the number of cipher texts. Given a keyword for a file search,
predicated on the filtering mechanism we designate the file extension or type which has to be returned thus
ruling out all the other possibilities which not only makes probing more facile but withal preserves time
involution. This article gives an overview about SPCHS Mechanism and the sundry methods adopted.
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper.
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper.
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...iosrjce
Using Cloud Storage, users can remotely store their data and enjoy on-demand high quality
applications and services. To ensure safety of stored data, it becomes must to encrypt data before storing in the
global space. In cloud data, search arises only with plain data. But it is essential to invoke search with
encrypted data. The specialty of cloud data storage is that it allows copious keywords in a solitary query and
sorts the resultant data documents in relevance order. The proposed multi keyword search based on ranking
over an encrypted cloud data uses feature of similarity and inner product similarity matching. The vector space
model helps to provide sufficient search accuracy and homomorphic encryption enables users to involve in
ranking while majority of computing work is done on server side by operations only on cipher text. Thus in this
method for Top-K retrieval user gets an interested/used link in top. To selectively share documents fine-grained
attribute-based access control policies can be used.
Data get to control is a powerful method to guarantee the data security in the cloud. Because of information
out sourcing and un confided in cloud servers, the information get to control turns into a testing issue in cloud
storage systems. Cipher text-Policy Attribute Based Encryption (CP-ABE) is viewed as a standout amongst
the most reasonable advancements for information get to control in distributed storage, since it gives
straightforward control access to the owners. It is hard to implement the existing CP-ABE schemes to access
the information from cloud storage systems. we propose a plan to structure the information securing control in
a revocable multi-expert CP-ABE conspire from cloud storage system
In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. We propose a novel ‘secure attribute based system with short ciphertext’ scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits.
An Efficient privacy preserving for Mobile and Pervasive Computinginventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A Novel Approach for Data Security in Cloud EnvironmentSHREYASSRINATH94
Businesses and enterprises are shifting their work base from traditional obsolete systems to cloud servers. The reasons of the shift are rapid deployment of an application which enables the developers to launch their applications within a short duration of time, lower cost operating models, scalability and ability to use an operational budget. The increased demand for computer-intensive applications led to a huge growth in cloud services. Security of the stored files and applications in the cloud is a major concern due to lack of standardized control of the cloud. Traditional cryptographic algorithms like AES and RSA, though robust in nature, are not lightweight in a mobile cloud environment. This paper proposes a novel cryptographic method wherein the file is first encrypted and then stored in cloud and is decrypted using the same key which is used for encryption as and when needed. The experimental results of the identified test cases indeed prove that the proposed algorithm is lightweight in nature in terms of less execution time and less processing cycles. The lightweight approach of the proposed algorithm will benefit the user to encrypt large files in cloud.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Privacy preserving is the essential aspect for cloud. In privacy preserving ranked keyword search, data
owner outsource the document in an encrypted form. So for privacy purpose, Reliable ciphertext search technique
is essentially. To design ciphertext search technique which provide encrypted document is critical task. In this
paper, hierarchical clustering method is designed for semantic search and fast ciphertext search within a big data
environment. In hierarchical clustering, documents are based on maximum relevance score and clusters are divided
into sub-clusters.
EVALUATION OF THE SHAPD2 ALGORITHM EFFICIENCY IN PLAGIARISM DETECTION TASK US...cscpconf
This work presents results of the ongoing novel research in the area of natural language processing focusing on plagiarism detection, semantic networks and semantic compression. The
results demonstrate that the semantic compression is a valuable addition to the existing methods used in plagiary detection. The application of the semantic compression boosts the efficiency of
Sentence Hashing Algorithm for Plagiarism Detection 2 (SHAPD2) and authors’ implementation of the w - shingling algorithm. Experiments were performed on Clough & Stephenson corpus as well as an available PAN–PC-10 plagiarism corpus used to evaluate plagiarism detection methods, so the results can be compared with other research teams
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...IJMTST Journal
In Wireless sensor network, sensor nodes are used to monitor physical or environmental condition. Sensor
networks are often deployed in an unattended and hostile environment to perform the monitoring and data
collection tasks. When it is deployed in such an environment, it lacks physical protection and subjected to
node compromise. After compromising one or multiple sensor nodes, an adversary may launch various
attacks to disrupt the in-network communication. Among these attacks, two common ones are dropping
packets and modifying packet. In this paper, we propose a simple yet effective scheme to identify
misbehaving forwarders that drop or modify packets. Node Categorization algorithm and Global Ranking
algorithm are
Healthcare Monitoring System by using iSense Device& IOT PlatformIJMTST Journal
In the recent years Wireless Sensor Network have given rise to many healthcare applications. As the cost and size of sensor devices are decreasing fast, the application areas of wireless sensor networks have also expanded rapidly.iSense are the WSN devises works under the 802.15.4 IEEE standard iSense gives both hardware and software solution to build wireless sensor application. So in this paper we used both hardware and software part of the iSense. We connected our Sensor data to the internet of things (IOT). We use some of cloud services to stores patient’s records over the cloudDatabse. MongoDB is a schema less database tool which gives interface to store patient’s records on cloud.In this paper we use cloud service as DaaS (Database as a Service). The MongoLab provides the DaaS from different service providers like Microsoft Azure, Google etc, so that our sensor data can stored on cloud by getting the services. Finally the patient’s body temperature, body activity status, alcohol content in the body all these records processed by the isenseCoremodule and can stores data on cloud, so that respective patient’s physicians can take effective and quick decisions to improve patient life by accessing cloud data from different remote locations.
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...iosrjce
Using Cloud Storage, users can remotely store their data and enjoy on-demand high quality
applications and services. To ensure safety of stored data, it becomes must to encrypt data before storing in the
global space. In cloud data, search arises only with plain data. But it is essential to invoke search with
encrypted data. The specialty of cloud data storage is that it allows copious keywords in a solitary query and
sorts the resultant data documents in relevance order. The proposed multi keyword search based on ranking
over an encrypted cloud data uses feature of similarity and inner product similarity matching. The vector space
model helps to provide sufficient search accuracy and homomorphic encryption enables users to involve in
ranking while majority of computing work is done on server side by operations only on cipher text. Thus in this
method for Top-K retrieval user gets an interested/used link in top. To selectively share documents fine-grained
attribute-based access control policies can be used.
Data get to control is a powerful method to guarantee the data security in the cloud. Because of information
out sourcing and un confided in cloud servers, the information get to control turns into a testing issue in cloud
storage systems. Cipher text-Policy Attribute Based Encryption (CP-ABE) is viewed as a standout amongst
the most reasonable advancements for information get to control in distributed storage, since it gives
straightforward control access to the owners. It is hard to implement the existing CP-ABE schemes to access
the information from cloud storage systems. we propose a plan to structure the information securing control in
a revocable multi-expert CP-ABE conspire from cloud storage system
In this paper, we consider ‘secure attribute based system with short ciphertext’ is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access control methods such as Role-Based Access Control. However, current ‘secure attribute based system with short ciphertext’ schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ABE (CP-ABE) provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the ciphertext. We propose a novel ‘secure attribute based system with short ciphertext’ scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits.
An Efficient privacy preserving for Mobile and Pervasive Computinginventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A Novel Approach for Data Security in Cloud EnvironmentSHREYASSRINATH94
Businesses and enterprises are shifting their work base from traditional obsolete systems to cloud servers. The reasons of the shift are rapid deployment of an application which enables the developers to launch their applications within a short duration of time, lower cost operating models, scalability and ability to use an operational budget. The increased demand for computer-intensive applications led to a huge growth in cloud services. Security of the stored files and applications in the cloud is a major concern due to lack of standardized control of the cloud. Traditional cryptographic algorithms like AES and RSA, though robust in nature, are not lightweight in a mobile cloud environment. This paper proposes a novel cryptographic method wherein the file is first encrypted and then stored in cloud and is decrypted using the same key which is used for encryption as and when needed. The experimental results of the identified test cases indeed prove that the proposed algorithm is lightweight in nature in terms of less execution time and less processing cycles. The lightweight approach of the proposed algorithm will benefit the user to encrypt large files in cloud.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
Privacy preserving is the essential aspect for cloud. In privacy preserving ranked keyword search, data
owner outsource the document in an encrypted form. So for privacy purpose, Reliable ciphertext search technique
is essentially. To design ciphertext search technique which provide encrypted document is critical task. In this
paper, hierarchical clustering method is designed for semantic search and fast ciphertext search within a big data
environment. In hierarchical clustering, documents are based on maximum relevance score and clusters are divided
into sub-clusters.
EVALUATION OF THE SHAPD2 ALGORITHM EFFICIENCY IN PLAGIARISM DETECTION TASK US...cscpconf
This work presents results of the ongoing novel research in the area of natural language processing focusing on plagiarism detection, semantic networks and semantic compression. The
results demonstrate that the semantic compression is a valuable addition to the existing methods used in plagiary detection. The application of the semantic compression boosts the efficiency of
Sentence Hashing Algorithm for Plagiarism Detection 2 (SHAPD2) and authors’ implementation of the w - shingling algorithm. Experiments were performed on Clough & Stephenson corpus as well as an available PAN–PC-10 plagiarism corpus used to evaluate plagiarism detection methods, so the results can be compared with other research teams
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud S...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
Effective Identification of Packet Droppers and Modifiers in Wireless Sensor ...IJMTST Journal
In Wireless sensor network, sensor nodes are used to monitor physical or environmental condition. Sensor
networks are often deployed in an unattended and hostile environment to perform the monitoring and data
collection tasks. When it is deployed in such an environment, it lacks physical protection and subjected to
node compromise. After compromising one or multiple sensor nodes, an adversary may launch various
attacks to disrupt the in-network communication. Among these attacks, two common ones are dropping
packets and modifying packet. In this paper, we propose a simple yet effective scheme to identify
misbehaving forwarders that drop or modify packets. Node Categorization algorithm and Global Ranking
algorithm are
Healthcare Monitoring System by using iSense Device& IOT PlatformIJMTST Journal
In the recent years Wireless Sensor Network have given rise to many healthcare applications. As the cost and size of sensor devices are decreasing fast, the application areas of wireless sensor networks have also expanded rapidly.iSense are the WSN devises works under the 802.15.4 IEEE standard iSense gives both hardware and software solution to build wireless sensor application. So in this paper we used both hardware and software part of the iSense. We connected our Sensor data to the internet of things (IOT). We use some of cloud services to stores patient’s records over the cloudDatabse. MongoDB is a schema less database tool which gives interface to store patient’s records on cloud.In this paper we use cloud service as DaaS (Database as a Service). The MongoLab provides the DaaS from different service providers like Microsoft Azure, Google etc, so that our sensor data can stored on cloud by getting the services. Finally the patient’s body temperature, body activity status, alcohol content in the body all these records processed by the isenseCoremodule and can stores data on cloud, so that respective patient’s physicians can take effective and quick decisions to improve patient life by accessing cloud data from different remote locations.
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...IJMTST Journal
In wireless ad hoc network packets are loosed due to two conditions one is due to the perturbance in the
channel and another one is due to the intrusion (i.e.) intruder discard the packet. In this paper we fixate on
the inner attack (i.e.) the assailment caused by the intruder who malevolently discards the packets. The
malevolent node pretends to be an one of the node in the routing path and cause the assailment.
Conventional algorithm does not provide the efficient detection of packet loss so, In order to ameliorate the
detection accurately we propose correlation function and withal for the correct calculation of correlation we
implement BLS predicated Homomorphism Linear Authenticator to check the information provided by the
node are true. The HLA architecture provides privacy preserving, collusion proof and sanctions low
communication and storage overheads.
Easy Mobile Cable Management System Using Android ApplicationIJMTST Journal
The cable industry is evolving from analogue to digital. The current system that Cable Operators follow doesn't help in implementing the TRAI(Telecom Regulatory Authority of India) regulations to implement subscriber management. There is Smartphone movement in India where the availability of Smartphone's & mobile internet is more and cost effective. By considering the fact, the solution for the said problem will be implemented as android mobile application. The required business logic will be implemented through Web Services and designed android application will use those Web Services hosted on to the cloud. This ensures to provide cost effective solution to the Cable Operator. Cable Operators can manage their subscribers, billing & collection from anywhere & anytime through the android application.
Performance Analysis of MIMO Equalization Techniques with Highly Efficient Ch...IJMTST Journal
To combat the wireless fading impairment in the high network demand environment, various coding
schemes have been implemented. MIMO techniques are still the powerful techniques along with source
coding. This paper focuses on coherent implementation of high performance turbo codes with MIMO
equalization techniques. It is proposed to achieve optimum BER value at very low values of SNR in a noisy
environment.
Traditionally, in paper based election,voters cast their vote to select right candidate, where they simply put their vote in voting box and at the end of the voting day the votes are going to be count manually. This process was much time consuming as well as was erroneous. To overcome this drawback Electronic Voting Machine (EVM) was introduced. In EVM, Voter cast their vote by pressing the voting button which was on EVM. The Major advantage of EVM system is , the votes are counted automatically instead of manually. But the drawback of EVM machine was, the votes may get manipulated and was not secure. So to overcome all these drawbacks, research on biometric based voting system is going on. This Paper focuses on survey of different voting system using Fingerprint biometric through different algorithms and methods.
A Flexible AC Distribution System for a Microgrid with a Photovoltaic System ...IJMTST Journal
This paper presents a FACT ac distribution system device for micro grid applications. The device aims to improve the power quality and reliability of the overall power distribution system that the micro grid is connected to. The control design employs a new model predictive control algorithm which allows faster computational time for large power systems by optimizing the steady-state and the transient control problems separately. Extended Kalman filters are also employed for frequency tracking and to extract the harmonic spectra of the grid voltage and the load currents in the micro grid. Simulation results is verified through different case studies.
Recognition by Using Image Processing for Different Size Distribution SchemesIJMTST Journal
An unmanned aerial vehicle was used as a mobile sensor platform to collect sea-ice features, and several
image processing algorithms have been applied to samples of sea-ice images to extract useful information
about sea ice. The sea-ice statistics given by the floe size distribution, being an important parameter for
climate and wave- and structure-ice analysis, is challenging to calculate due to difficulties in ice floe
identification, particularly the separation of seemingly connected ice floes. In this paper, the gradient vector
flow snake algorithm is applied to solve this problem. To evolve the GVF snake algorithm automatically, an
initialization based on the distance transform is proposed to detect individual ice floes, and the morphological
cleaning is afterward applied to smoothen the shape of each identified ice floe. Based on the identification
result, the image is separated into four different layers: ice floes, brash pieces, slush, and water. This makes
it further possible to present a color map of the ice floes and brash pieces based on sizes, and the
corresponding ice floe size distribution histogram. The proposed algorithm yields an acceptable identification
results.
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSNIJMTST Journal
Security breaches and energy consumption issues are indispensable in WSN (wireless sensor networks). Considering attacks like Denial-of-Service (DoS) where not only the service is not provided but in addition to that unwanted power is also consumed.“Denial-of-Sleep attack" (type of DoS attack) also results in unnecessary power exhaustion. This paper briefs
Artificial Neural Network Based Closed Loop Control of Multilevel InverterIJMTST Journal
Multi level inverters are gaining attraction because of the inherent advantages like low switching losses and less voltage stress which results in low filter cost. The common techniques that are available for switching the multi level inverters are based on sinusoidal pulse width modulation and using conventional PI based controllers, hysteresis based controllers. These controllers suffer with slow response time this makes usage of multi level inverters in custom power devices difficult. Because custom power devices require fast acting controller action which can be achieved by intelligent controllers. In this project artificial neural network based modulation scheme is designed and implemented for a cascaded H bridge inverter. The response time of controller for different operating power factors of the load are compared with conventional PI controllers and are presented. The developed control technique is developed by using Sim Power Systems Block set of MATLAB/SIMULINK Release R2015a.
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...IJMTST Journal
Privacy of data is one of the most important concept in wireless sensor networks. Wireless sensor networks are used in many areas likewise in tracking and monitoring of some events. Each sensor node has one private key and an assigned id. We are providing data confidentiality between the sensor nodes in wireless sensor network using bilinear pairing (diffie-hellman algorithm). Sharing of data between those neighbouring nodes is also secured with the concept of shared secret key(symmetric key cryptography). Content privacy and context privacy can be obtained and the threats regarding to it can be overcomed. Data is encrypted between the nodes using those shared secret keys. We are providing security for the data between the neighbouring nodes in wireless sensor networks.
A Three Phase AC-AC ZCS Resonant Converter for Induction HeatingIJMTST Journal
Generally, domestic induction-heating technology requires a high output power levels with less number of
components in a compact size. To satisfy these requirements, the basic circuit configurations are considered
based on the combination of a rectifier and a inverter. The main disadvantage of this method has low-efficient
and economic problems. This paper proposes a new concept unlike previous method, i.e the direct conversion
of ac–ac converter for reducing the component count, reduce cost, improve reliability, and also efficiency.
Generally, the proposed converter is a voltage-source based series-resonant converter used for controlling
output power, and minimizing the control complexity. This paper also proposes a concept of AC-AC converter
based three phase Induction Heating applications.
Optimal Placement and Sizing of Capacitor and Distributed Generator in Radial...IJMTST Journal
Distribution Systems are growing large and being stretched too far, leading to higher system losses and
poor voltage regulation, the need for an efficient and effective distribution system has therefore become more
urgent and important. A distribution system connects consumers to the high-voltage transmission system.
Because of lower voltage, and hence higher current, the I2R loss in a distribution system is significantly high
compared to that in a high-voltage transmission system. The pressure of improving the overall efficiency of
power delivery has forced the power utilities to reduce the loss, especially at the distribution level. Loss
reduction initiatives in distribution systems have been activated due to the increasing cost of supplying
electricity, the shortage in fuel with ever-increasing cost to produce more power, and the global warming
concerns. The total system loss can be decreased by installing capacitor bank and distributed generation.
These two methods can also help maintaining the level of voltage and maintenance power factor. The direct
search algorithm is applied to minimize the loss in radial distribution systems.
Filter Based Solar Power Generation System with a Seven Level InverterIJMTST Journal
This paper proposes a new solar power generation system, which is composed of a DC/DC power converter and a new seven-level inverter. The DC/DC power converter integrates a DC-DC boost converter and a transformer to convert the output voltage of the solar cell array into two independent voltage sources with multiple relationships. This new seven-level inverter is configured using a capacitor selection circuit and a full-bridge power converter, connected in cascade. The capacitor selection circuit converts the two output voltage sources of DC-DC power converter into a three-level DC voltage and the full- bridge power converter further converts this three- level DC voltage into a seven-level AC voltage. In this way, the proposed solar power generation system generates a sinusoidal output current that is in phase with the utility voltage and is fed into the utility. The salient features of the proposed seven-level inverter are that only six power electronic switches are used and only one power electronic switch is switched at high frequency at any time. A prototype is developed and tested to verify the performance of this proposed solar power generation system.
An FPGA Based Floating Point Arithmetic Unit Using VerilogIJMTST Journal
Floating Point (FP) multiplication is widely used in large set of scientific and signal processing computation.
Multiplication is one of the common arithmetic operations in these computations. A high speed floating point
double precision multiplier is implemented on a Virtex-6 FPGA. In addition, the proposed design is compliant
with IEEE-754 format and handles over flow, under flow, rounding and various exception conditions. The
design achieved the operating frequency of 414.714 MHz with an area of 648 slices.
Implementation of a Voltage Multiplier based on High Step-up Converter using FLCIJMTST Journal
A Front end of the Photovoltaic Solar Panel is been proposed based on Step-Up Converter. The use of
distributed energy resources is increasingly being pursued as a supplement and an alternative to large
conventional central power stations. The specification of a power electronic interface is subject to
requirements related not only to the renewable energy source itself but also to its effects on the power-system
operation, especially where the intermittent energy source constitutes a significant part of the total system
capacity. Implementing a voltage multiplier module, an asymmetrical interleaved high step-up converter
obtains high step-up gain without operating at an extreme duty ratio. The voltage multiplier module is
composed of a conventional boost converter and coupled inductors. An extra conventional boost converter is
integrated into the first phase to achieve a considerably higher voltage conversion ratio. The two-phase
configuration not only reduces the current stress through each power switch, but also constrains the input
current ripple, which decreases the conduction losses of metal–oxide–semiconductor field-effect transistors.
In addition, the proposed converter functions as an active clamp circuit, which alleviates large voltage spikes
across the power switches. Finally, the simulation circuitry with a 40V input voltage and 230V output voltage
is operated to verify its performance analysis with respect to the Fuzzy Logic Controller. The highest
efficiency is 97.75%.
Secure Auditing and Deduplicating Data on CloudIJMTST Journal
Cloud computing is a technology that used for storing and accessing. The data on remote location. It is totally internet-based.it is self-service and on Demand technology. That’s why now days it’s mostly used and popular term. Enterprises and organizations used cloud storage for access data to third-party. As like, the single user also use the confidential data anywhere, anytime on earth It is now becoming business standard. Its simplify users accessibility. It is cost saving and flexible for better performance on internet. But is also occur drawbacks like security and integrity on data. Like many times the data is already available on storage but it contain slightly difference. So overcome this problems we introduce two secure system, namely seccloud and seccloud+. Seccloud is used for generating tags on data before uploading and seccloud+ is maintain the integrity auditing and secure de-duplication on data because every customer wants to encrypt their data before uploading. Data integrity and storage efficiency are tw o important aspect of cloud storage. Proof of Retrievability (POR) and Proof of Data Possession (PDP) techniques Assure data integrity for cloud storage. Proof of Ownership (POW) improves Storage efficiency by securely removing unnecessarily duplicated data on the Storage server. Cloud computing is one of the most talked about IT trends today.in cloud more application availability on the cloud. Also cloud increased growth in the market.
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...IJMTST Journal
Fire usually cause serious disasters. Thus, fire detection has been an important issue to protect human life
and property. In this project, I propose a fast and practical real-time image-based fire flame detection method
based on colour pair analysis and intensity level algorithm. Then, based on the above fire flame colour
features model, regions with fire-like colours are roughly separated from each frame of the test videos.
Besides segmenting fire flame regions, background objects with similar fire colours or caused by colour shift
resulted from the reflection of fire flames are also extracted from the image during the above colour
separation process. To remove these spurious fire-like regions, the image difference method and the invented
colour masking technique are applied. The device can detect fire by using Artificial Neural Network (ANN).
Finally device automatically control the fire safety assistance. This method was tested with Raspberry pi B+
Board interface with camera module.
A Three Phase D-STATCOM to Compensate AC and DC loads by using Fuzzy Logic DC...IJMTST Journal
A Fuzzy Logic control the transient response of the distribution static compensator (D-STATCOM) is very
important while compensating rapidly varying unbalanced and nonlinear loads. Any change in the load
affects the dc-link voltage directly. The sudden removal of load would result in an increase in the dc-link
voltage above the reference value; where as a sudden increase in load would reduce the dc-link voltage
below its reference value. The proper operation of D-STATCOM requires variation of the dc-link voltage within
the prescribed limits. Conventionally, a proportional integral (PI) controller is used to maintain the dc-link
voltage to the reference value. A Fuzzy Logic controls the transient response of the distribution static
compensator (D-STATCOM) is very important while compensating rapidly varying unbalanced and nonlinear
loads. It uses deviation of the capacitor voltage from its reference value as its input. However, the transient
response of the conventional PI dc-link voltage controller is slow. In this paper, a fast-acting dc-link voltage
controller based on the energy of a dc-link capacitor is proposed. Mathematical equations are given to
compute the gains of the conventional controller based on fast-acting dc-link voltage controllers to achieve
similar fast transient response. The detailed simulation and experimental studies are carried out to validate
the proposed controller.
A secure and dynamic multi keyword rankednexgentech15
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD ...nexgentechnology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Define and solve the problem of effective and secure ranked keyword search over encrypted cloud data.
Ranked search greatly enhances system usability by returning the matching files in a ranked order regarding to
certain relevance criteria (e.g., keyword frequency), thus making one step closer towards practical deployment of
privecy- preserving data hosting services in Cloud Computing. To improve the security for the data retrieval from
cloud environment, the One Time Password is used. The One Time Passwod is sent to the user mail to view the
original data. The Model exhibits the Querying Process over the cloud computing infrastructure using Secured and
Encrypted Data access and Ranking over the results would benefit the usre for the getting better results.
Fuzzy Keyword Search Over Encrypted Data in Cloud ComputingIJERA Editor
As Cloud Computing becomes prevalent, more and more sensitive information are being centralized into the cloud. For the protection of data privacy, sensitive data usually have to be encrypted before outsourcing, which makes effective data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. This significant drawback makes existing techniques unsuitable in cloud computing as it is greatly affect system usability, rendering user searching experiences very frustrating and system efficiency very low. In this paper, for the first time we formalize and solve the problem of effective fuzzy keyword search over encrypted cloud while maintaining keyword privacy. In our solution, we exploit edit distance to quantify keyword similarity and develop new advanced technique on constructing fuzzy keyword sets which greatly reduces the storage and representation overheads. In this way, we show that our proposed solution is secure and privacy preserving, while realizing the goal of fuzzy keyword search.
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted DataCloudTechnologies
Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data M-Tech IEEE 2017 Projects B-Tech IEEE 2017 Projects Paper Publishing UGC Journals
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
2. 28 International Journal for Modern Trends in Science and Technology
SPCHS Construction for Expeditious Keyword Search in Cipher Text
search to the trapdoor at the server. Utilizer
additionally gives categorical content search.
Server commences the process of finding and
server finds the file which is in an encrypted format
and contained keyword queried by client without
any cognizance of pristine contain of file and
content withal and provides the file to the receiver.
Receiver of the file will decrypt these file and if want
this is a spam then can report to server additionally
II. RELATED WORK
A. Subsisting system
Secure public-key searchable encryption
schemes take search time linear with the total
number of the cipher texts. This makes retrieval
from sizably voluminous-scale databases
prohibitive Subsisting semantically secure PEKS
schemes take search time linear with the total
number of all cipher texts. This betokens that the
subsisting obnubilated structure of cipher texts
stays confidential, since the local privacy only
contains the relationship of the incipient
engendered cipher texts.
Search on encrypted data has been investigated
in recent years. From a Cryptographic perspective,
the existing works fall into two categories, i.e.,
symmetric searchable encryption and public-key
searchable encryption. Searchable symmetric
encryption (SSE) [2] allows a party to outsource the
storage of its data to another party (a server) in a
private manner, while maintaining the ability to
selectively search over it. This problem has been
the focus of active research in recent years. Public
Key Encryption with Keyword Search (PEKS)
scheme enable one to search the encrypted data
with a keyword without revealing any information
and preserving its semantic security
[1].[1]Proposed searchable public-key cipher texts
with hidden structures (SPCHS) for keyword
search as fast as possible without sacrificing
semantic security of the encrypted keywords. In
SPCHS, all keyword-searchable cipher texts are
structured by hidden relations, and with the
search trapdoor corresponding to a keyword, the
minimum information of the relations is disclosed
to a search algorithm as the guidance to find all
matching cipher texts efficiently. [2] Introduced a
new encryption) schemes. The approach is highly
parallelizable and dynamic. Previous the only
method for achieving sub-linear time search is the
inverted index approach, which requires the search
algorithm to access a sequence of memory
locations.
A new approach for designing SSE schemes that
yields constructions with sub-linear search time
but that has none of the limitations of the inverted
index approach. In particular approach is simple,
highly parallel and can easily handle updates.
Scheme also achieves the following important
properties: (a) it enjoys a strong notion of security,
namely security against adaptive chosen-keyword
attacks; (b) compared to existing sub-linear
dynamic SSE schemes updates in our scheme do
not leak any information, apart from information
that can be inferred from previous search tokens;
(c) it can be implemented efficiently in external
memory (with logarithmic I/O overhead). The
technique is simple and uses a red-black tree data
structure. [3] Provides Asymmetric searchable
encryption (ASE) schemes which support two
special features, namely message recovery and
flexible search authorization.
The message recovery feature requires that a
cipher text not only allows the data owner to
recover the plaintext but also allows third-party
servers to search in it. The flexible searchable
authorization feature requires that the data owner
can authorize a third-party server in three different
ways: (1) authorize the server to search any
message at the data owner's interest by assigning a
message-dependent trapdoor (i.e. the server can
only determine whether the message encoded in
the trapdoor is equal to the plaintext inside a
cipher text); (2) authorize the server to search any
message at the server's interests by assigning a
master trapdoor (i.e. the server can choose a
message at its will and see whether it is equal to the
plaintext inside any cipher text); (3) authorize the
server to perform both types of searches. [4]
Proposed PEKS, where a proxy server, who
responds the keyword queries of a receiver, can
know the content of keywords by implementing
KGA. Moreover, it is efficient under the practical
condition that the size of the keyword space is not
more than the polynomial level. [6] Gives broader
view on what can be achieved regarding trapdoor
privacy in asymmetric searchable encryption
schemes, and bridge the gap between previous
definitions, which give limited privacy guarantees
in practice against search patterns. The paper
proposes the notion of Strong Search Pattern
Privacy for PEKS and constructs a scheme that
achieves this security notion.
B. Proposed system
Searchable Public-Key Cipher texts with
Obnubilated Structures (SPCHS) for keyword
search as expeditious as possible without
3. 29 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 09 | September 2016 | ISSN: 2455-3778IJMTST
sacrificing semantic security of the encrypted
keywords. In SPCHS, all keyword-searchable
cipher texts are structured by obnubilated
cognations, and with the search trapdoor
corresponding to a keyword, the minimum
information of the cognations is disclosed to a
search algorithm as the guidance to find all
matching cipher texts efficiently. Proposed to
encrypt structured data and a secure method to
probe these data. To fortify the dynamic update of
the encrypted data proposed the dynamic
searchable symmetric encryption in and further
enhanced its security in at the cost of immensely
colossal index.
C. Advantages
Has the advantage that anyone who kens the
receiver’s public key can upload
keyword-searchable cipher texts to a server. A wins
in the SSCKSA game of the above SPCHS instance
We construct a special keyword balanced binary
tree as the index, and propose a ―Greedy
Depth-first Search‖ algorithm to obtain better
efficiency than linear search with advantage
AdvSS-CKSA SPCHS;A, in which A makes at most
qt queries to oracle QTrap
III. IMPLEMENTATION
Utilizer
In our proposed architecture utilizer is end
utilizer of our application, and data utilizer.
Whenever he wants the data he can probe from our
application, data retrieve from the data engine.
While getting data performs decryption and most
proximate-neighbors results at utilizer side.
Data Owner
In our proposed architecture admin is main
utilizer of our application. He maintains the POI
data. System will perform MOPE & Encryption &
decryption operations. Owner Can Apportion Keys
to users.
Location Privacy Module
As mentioned anteriorly, the dataset of points
of in-tersest represents a paramount asset for the
data owner, and a consequential source of revenue.
Ergo, the coordinates of the points should not be
kenned to the server. We surmise a
veracious-but-curious cloud accommodation
provider. In this model, the server executes
correctly the given protocol for processing kNN
queries, but will additionally endeavor to infer the
location of the data points. It is thus obligatory to
encrypt all information stored and processed at the
server. To sanction query evaluation, a special type
of encryption that sanctions processing on cipher
texts is obligatory. In our case, we utilize the mOPE
technique from .mope is a provably secure
order-preserving encryption method
Database Outsourcing Module
The server receives the dataset of points of
interest from the data owner in encrypted format,
together with some adscititious encrypted data
structures needed for query processing. The server
receives kNN requests from the clients, processes
them and returns the results. Albeit the cloud
provider typically possesses potent computational
resources, processing on encrypted data incurs a
consequential processing overhead, so
performance considerations at the cloud server
represent a consequential. The client has a query
point Q and wishes to find the point’s most
proximate neighbors. The client sends its
encrypted location query to the server, and receives
most proximate neighbors as a result. Note that,
due to the fact that the data points are encrypted,
the client withal needs to perform a minute part in
the query processing itself.
IV. SCHEME FROM COLLISION-FREE FULL – IDENTITY
MALLEABLE IBKEM
A SPCHS scheme is formed with IBE
Collision-free full -Identity Malleable IBKEM with
semantic security [1]. Several interesting
properties are identified i.e. collision-freeness and
full-identity malleability in some IBKEM instances,
and formalized these properties to build a SPCHS.
Given are two collision-free full-identity malleable
IBKEM instances that are completely secured. In
IBKEM, a sender encapsulates a key K to an
intended receiver ID. Of course, receiver ID can DE
capsulate and obtain K, and the sender knows that
receiver ID will obtain K. However, a non-intended
receiver ID1 may also try to DE capsulate and
obtain K1. [1] It is observed that:
1. It is usually the case that K and K1 are
independent of each other from the view of the
receivers.
2. In some IBKEM the sender may also know K1
obtained by receiver ID1.
This can be referred to the former property as
collision-freeness and to the latter as full-identity
malleability. An IBKEM scheme contains some
properties, depending on this property it is said to
be collision-free full-identity malleable if it
possesses both properties. If both underlying
IBKEM and IBE have semantic security and the
privacy of receiver’s identities, the SPCHS is
4. 30 International Journal for Modern Trends in Science and Technology
SPCHS Construction for Expeditious Keyword Search in Cipher Text
semantically secure containing this properties.
Collision-free full-identity malleable IBKEM [1]:
1. K and ID = Sender encapsulate key K to an
intended receiver ID, of course receiver ID can be
DE capsulated to obtain K.
2. K1 and ID1= Non-intended receiver ID1 will also
try to DE capsulate to obtain K1.
Two cases are observed:
1. Collision-free - It is case that K and K1 are
independent of each other from receiver view.
2. Full-identity malleability -In some IBKEM, the
sender may also know K1 obtained by receiver ID1.
Semantic security to SPCHS, includes the
probabilistic polynomial time (PPT) Adversary that
is allowed to know all structure public parts, query
the private part of chosen structure, Query the
trapdoor for keywords and query cipher texts of
keywords.SS-CKSA is Semantic Security of SPCHS
to Chosen Keyword and Structure Attack [10]; the
adversary will choose two challenge
keyword-structure pairs. This SS-CKSA security
means that for cipher texts of one of two challenge
keyword structure pair.
V. SPCHS CONSTRUCTION
The SPCHS definition consists of five
algorithms[1].
Step 1: System Setup{W, 1k}, the system inputs
keyword space W and security parameter 1k.Run
the pair of master keys (PK, SK) = Setup (1k,ID). It
outputs the pair of master public and secret key
{PK, SK}where, PK contains keyword W cipher texts
C.
Step 2: Structure Initialization{PK}, the system
inputs the public key and generates the
encapsulated key. Initialize the hidden structure. It
outputs the hidden relation {Pri, Pub} and
initializing a hidden structure.
Step 3: Structured Encryption{PK,W,Pri}, inputs
the PK,W,Pri. Search for the keyword in Pri and
output the cipher text with keyword W and update
Pri. Where, Pri is hidden relation in C.
Step 4: Trapdoor {SK, W}, inputs the secret key and
keyword W and gives keyword search trapdoor Tw
of W
Step 5: Structure Search{PK,Pub,C,Tw}, inputs the
public key, Pub, C, Tw. And discloses partial
relation to find out cipher texts containing
keywords W with hidden structure
The generic SPCHS is constructed based on the
properties observed in the IBKEM.
VI. EXPERIMENTAL RESULTS
Fig:-1 User Authentication
Fig:-2Key Generation
Fig:-3Encrypted File Data
Fig:-4Evaluation Graph
5. 31 International Journal for Modern Trends in Science and Technology
Volume: 2 | Issue: 09 | September 2016 | ISSN: 2455-3778IJMTST
VII. CONCLUSION
This article presented SPCHS Methodology for
Expeditious Keyword Search as a variant of PEKS
without sacrificing the semantic security for
expeditious keyword search. This incipient concept
sanctions the generation of keyword searchable
cipher texts with the avail of obnubilated structure.
The search algorithm of SPCHS discloses part of
this obnubilated structure for guidance on
ascertaining the cipher texts of the queried
keyword given a keyword search trapdoor.
Semantic security of SPCHS captures the privacy
of the keywords as well as the invisibility of the
obnubilated structure. It has search intricacy
mainly linear with the genuine number of the
cipher texts rather than the total number of cipher
texts containing the queried keyword, thereby
outperforming subsisting PEKS schemes. SPCHS
seems to be a promising implement for solving
some challengeable quandaries in public-key
searchable encryption. One application may be to
achieve retrieval plenariness verification by the
formation of an obnubilated star like structure,
which has not yet achieved in the subsisting PEKS
schemes. Another application may be to filter the
encrypted spams.
REFERENCES
[1] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G.
Persiano, ―Public key encryption with keyword
search,‖ in Advances in Cryptology— EUROCRYPT
(Lecture Notes in Computer Science), vol. 3027, C.
Cachin and J. L. Camenisch, Eds. Berlin, Germany:
Springer-Verlag, 2004, pp. 506–522.
[2] M. Bellare, A. Boldyreva, and A. O’Neill,
―Deterministic and efficiently searchable
encryption,‖ in Advances in Cryptology—CRYPTO
(Lecture Notes in Computer Science), vol. 4622, A.
Menezes, Ed. Berlin, Germany: Springer-Verlag,
2007, pp. 535–552.
[3] D. Boneh and X. Boyen, ―Efficient selective-ID
secure identity-based encryption without random
oracles,‖ in Advances in Cryptology— EUROCRYPT
(Lecture Notes in Computer Science), vol. 3027, C.
Cachin and J. Camenisch, Eds. Berlin, Germany:
Springer-Verlag, 2004, pp. 223–238.
[4] X. Boyen and B. Waters, ―Anonymous hierarchical
identity based encryption (without random oracles),‖
in Advances in Cryptology—CRYPTO (Lecture Notes
in Computer Science), vol. 4117, C. Dwork, Ed.
Berlin, Germany: Springer-Verlag, 2006, pp.
290–307.
[5] C. Gentry, ―Practical identity-based encryption
without random oracles,‖ in Advances in
Cryptology—EUROCRYPT (Lecture Notes in
Computer Science), vol. 4004, S. Vaudenay, Ed.
Berlin, Germany: Springer-Verlag,2006, pp.
445–464.
[6] G. Ateniese and P. Gasti, ―Universally anonymous
IBE based on the quadratic residuosity assumption,‖
in Topics in Cryptology—CT-RSA (Lecture Notes in
Computer Science), vol. 5473, M. Fischlin, Ed.
Berlin, Germany: Springer-Verlag, 2009, pp. 32–47.
[7] L. Ducas, ―Anonymity from asymmetry: New
constructions for anonymous HIBE,‖ in Topics in
Cryptology—CT-RSA (Lecture Notes in Computer
Science), vol. 5985, J. Pieprzyk, Ed. Berlin,
Germany: Springer-Verlag, 2010, pp. 148–164.
[8] M. Abdalla, D. Catalano, and D. Fiore, ―Verifiable
random functions: Relations to identity-based key
encapsulation and new constructions,‖ J. Cryptol.,
vol. 27, no. 3, pp. 544–593, Jul. 2013.
[9] E. S. V. Freire, D. Hofheinz, K. G. Paterson, and C.
Striecks, ―Programmable Hash functions in the
multi linear setting,‖ in Advances in
Cryptology—CRYPTO (Lecture Notes in Computer
Science), vol. 8042, R. Canetti and J. A. Garay, Eds.
Berlin, Germany: Springer-Verlag, 2013, pp.
513–530.
[10]S. Garg, C. Gentry, and S. Halevi, ―Candidate multi
linear maps from ideal lattices,‖ in Advances in
Cryptology—EUROCRYPT (Lecture Notes in
Computer Science), vol. 7881, T. Johansson and P.
Q. Nguyen, Eds. Berlin, Germany: Springer-Verlag,
2013, pp. 1–17.