Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 129 , Downloads: 115 | CTR: 89 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal

Search over encrypted data is a critically important enabling technique in cloud computing, where encryption-before outsourcing is a crucial answer for ensuring user information security in the untrusted cloud server condition. In this work we focus on Role- based authentication is a combination of symmetric key cryptography and public key cryptography where by every encryption process needs Data, Public Key, Group Key, The Policy is a set of rule that can be specified as chain also for e.g., in the context of hospital a policy can be given as {doctor, patient} which means anybody from the doctors group or patient group can simultaneously decrypt the document on the other hand a policy can be specified as chain policy for instance{doctor}, {patient} This is known as nested policy.In such cases a patient can decrypt the document only when that is decrypted by doctors first, Policy based encryption is becoming popular in an enterprise context where different authorities require different permission and privacy settings for the access of the records. In this work we have develop a novel CP-ABE (Cryptography-Attributed based Encryption) based technique in an enterprise hospital context deployed in a local cloud with fog computing architecture.Our proposed system provides different level of encryption, decryption, authentication, authorization and privacy setting for doctors in the context of patients, medical image, image feature records. The data used for communication between doctor and patient is images of skin cancer and related symptoms. Both text and image is encrypted and decrypted by AES (Advanced Encryption Standard) during data transfer. Further machine learning Bayesian Classifier approach is used to diagnose abnormality in the skin cancer image. In this work we demonstrate the use of CP-ABE with human entities as well as in the context of machine learning.The overall work demonstrate the entire process of medical scanning in an enterprise hospital application both plain record encryption and image encryption with the help of CP-ABE. In order to demonstrate the efficiency of the system we have developed a simple medical application where doctor encrypt text and image which can visualize only their own patients data and the usability of machine learning image classification technique which automatically can retrieve the observation of the image as abnormal or normal. This proves machine learning and performance evaluation shows efficiency of our system.

Keywords: Cloud computing, CP-ABE, AES, Text and Image Search, Symmetric key Cryptography

Edition: Volume 6 Issue 6, June 2017

Pages: 1495 - 1500

Share this Article

How to Cite this Article?

Nirupama Devangaon, Dr Suvarna Nandyal, "Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20174567, Volume 6 Issue 6, June 2017, 1495 - 1500

129 PDF Views | 115 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud computing'

Views: 201 , Downloads: 173 | CTR: 86 %

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Views: 122 , Downloads: 96 | CTR: 79 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Views: 151 , Downloads: 97 | CTR: 64 % | Weekly Popularity: ⮙5

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Similar Articles with Keyword 'CP-ABE'

Views: 129 , Downloads: 101 | CTR: 78 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this Article

Views: 144 , Downloads: 105 | CTR: 73 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2165 - 2166

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Princy.B, Nishley Elizabeth Joseph

Share this Article

Views: 136 , Downloads: 107 | CTR: 79 % | Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 639 - 642

A Review On Cloud Storage Architectures

Pallavi D. Dudhe, P. L. Ramteke

Share this Article

Views: 145 , Downloads: 110 | CTR: 76 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2128 - 2130

A High Degree of Patient Privacy in PHR Patient-Centric Model of Health Information Exchange Using Cloud Security Technique

Rasal Swati A., Pawar B. V.

Share this Article

Similar Articles with Keyword 'AES'

Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Views: 139 , Downloads: 98 | CTR: 71 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2084 - 2088

A Survey on Learning Crowdsourced User Preferences for Visual Summarization of Image Collections

Rupali Tanaji Waghmode, Nikita J. Kulkarni

Share this Article

Views: 152 , Downloads: 103 | CTR: 68 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Views: 130 , Downloads: 104 | CTR: 80 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1398 - 1401

A Review on Encryption Techniques to Secure a Cloud

Ramandeep Kaur, Ashish Verma

Share this Article

Views: 158 , Downloads: 104 | CTR: 66 %

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1435 - 1439

Review on Encryption Techniques in Multimedia Data

Ashwini G. Kamble, Prof. Nikita J. Kulkarni

Share this Article

Similar Articles with Keyword 'Symmetric key Cryptography'

Views: 164 , Downloads: 112 | CTR: 68 %

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Views: 129 , Downloads: 115 | CTR: 89 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1495 - 1500

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal

Share this Article

Views: 132 , Downloads: 119 | CTR: 90 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 105 - 108

A Security Enhancing Scheme in Leach using Homomorphic Encryption

Neha Chhabra, Parikshit Singla

Share this Article

Views: 160 , Downloads: 134 | CTR: 84 % | Weekly Popularity: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 413 - 418

A Study on Threats in Wireless Sensor Networks

Muruganandam. A, Bagyalakshmi. P

Share this Article
Top