A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data

Snehal Rahul Patil, Shiwani Sthapak

This paper proposes a novel biometrics-based Single Sign On user authentication scheme in Telematics system, in order to enable to protect user account privacy. The focus during this work is to develop a secure and versatile multi-factor authentication to telematic environments with key management. to supply security in the use of remote crypt logical functions, we propose an authentication service embedded associate degree exceedingly in a very} key management system asatrusty third party.the most characteristics of the planned model are: flexibility, ability, safety and quality. Enabling Associate in Nursing encrypted cloud data search service is of predominant importance. Considering the massive form of data users and documents inside the cloud, it's a necessity to allow multiple keywords inside the search request and are available documents inside the order of their connectedness to those keywords. connected works on searchable encoding specialise in single keyword search or man of science keyword search, and barely sort the search results. throughout this paper, for the 1st time, we've an inclination to stipulate and solve the tough disadvantage of privacy presering multi-keyword stratified search over encrypted cloud knowledge (MRSE).We establish a group of strict privacy wants for such a secure cloud data utilization system. Among varied multikeyword linguistics, during this paper, for the first time we've an inclination to stipulate and solve the matter of multi-keyword stratified search over encrypted cloud knowledge, and establish a variety of privacy wants. Among varied multi-keyword linguistics, we tend to elect the economical similarity live of ?coordinate matching?, i.e., as many matches as accomplishable, to effectively capture the connectedness of outsourced documents to the question keywords, and use ?inner product similarity? to quantitatively decide such similarity live. For meeting the challenge of supporting multi-keyword linguistics while not privacy breaches, we've an inclination to propose a basic arrange of MRSE mistreatment secure complex quantity computation. Then we've an inclination to supply a pair of improved MRSE schemes to achieve varied tight privacy requirements in a pair of completely totally different threat models. Thorough analysis work privacy and efficiency guarantees of projected schemes is given, and experiments on the real-world dataset show our projected schemes introduce low overhead on every computation and communication. we tend to first propose a basic arrange for the MRSE supported secure complex quantity computation, thus provide 2 significantly improved MRSE schemes to achieve varied rigorous privacy wants in a pair of completely totally different threat models.

Keywords: Privacy Preservation, Multikey authentication, Biometric

Edition: Volume 3 Issue 12, December 2014

Pages: 2469 - 2472

Share this Article

How to Cite this Article?

Snehal Rahul Patil, Shiwani Sthapak, "A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB141035, Volume 3 Issue 12, December 2014, 2469 - 2472

62 PDF Views | 49 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'Privacy Preservation'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1592 - 1597

Privacy Conserving Gradient Descent Method Applied for Neural Network with Distributed Datasets

Sachin P. Yadav, Amit B. Chougule

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2435 - 2438

A Scalable Approach for Scheduled Data Anonymization Using MapReduce on Cloud

Surumi K S, Joyal Ulahannan

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1982 - 1985

Review: Firewall Privacy Preservation By Packet Filtering Management

Akshay Dattatray Kachare, Geeta Atkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 658 - 661

A Better Approach for Privacy Preserving Data Publishing by Slicing

Mohd Faquroddin, G. Kiran Kumar

Share this Article

Similar Articles with Keyword 'Biometric'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ear's Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1907 - 1913

Human Gait Recognition Using Multisvm Classifier

Saranya Sasidharan, Smitha K S, Minu Thomas

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2717 - 2720

Multi Biometrics: Overview and User Perception Survey

Harendra Singh Mahour, Hemant Makwana

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1216 - 1220

Finger Vein Weightage Calculation of Imaginary Curve between Minutiae Points for Person Recognition

Reetika, Kiran Gupta

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3173 - 3178

An Overview of Pattern Recognition Applications and Its Approaches: A Review

Rajleen Kaur

Share this Article
Top