International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 109

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014


A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data

Snehal Rahul Patil, Shiwani Sthapak


Abstract: This paper proposes a novel biometrics-based Single Sign On user authentication scheme in Telematics system, in order to enable to protect user account privacy. The focus during this work is to develop a secure and versatile multi-factor authentication to telematic environments with key management. to supply security in the use of remote crypt logical functions, we propose an authentication service embedded associate degree exceedingly in a very} key management system asatrusty third party. the most characteristics of the planned model are: flexibility, ability, safety and quality. Enabling Associate in Nursing encrypted cloud data search service is of predominant importance. Considering the massive form of data users and documents inside the cloud, it's a necessity to allow multiple keywords inside the search request and are available documents inside the order of their connectedness to those keywords. connected works on searchable encoding specialise in single keyword search or man of science keyword search, and barely sort the search results. throughout this paper, for the 1st time, we've an inclination to stipulate and solve the tough disadvantage of privacy presering multi-keyword stratified search over encrypted cloud knowledge (MRSE). We establish a group of strict privacy wants for such a secure cloud data utilization system. Among varied multikeyword linguistics, during this paper, for the first time we've an inclination to stipulate and solve the matter of multi-keyword stratified search over encrypted cloud knowledge, and establish a variety of privacy wants. Among varied multi-keyword linguistics, we tend to elect the economical similarity live of ?coordinate matching?, i. e. , as many matches as accomplishable, to effectively capture the connectedness of outsourced documents to the question keywords, and use ?inner product similarity? to quantitatively decide such similarity live. For meeting the challenge of supporting multi-keyword linguistics while not privacy breaches, we've an inclination to propose a basic arrange of MRSE mistreatment secure complex quantity computation. Then we've an inclination to supply a pair of improved MRSE schemes to achieve varied tight privacy requirements in a pair of completely totally different threat models. Thorough analysis work privacy and efficiency guarantees of projected schemes is given, and experiments on the real-world dataset show our projected schemes introduce low overhead on every computation and communication. we tend to first propose a basic arrange for the MRSE supported secure complex quantity computation, thus provide 2 significantly improved MRSE schemes to achieve varied rigorous privacy wants in a pair of completely totally different threat models.


Keywords: Privacy Preservation, Multikey authentication, Biometric


Edition: Volume 3 Issue 12, December 2014,


Pages: 2469 - 2472


How to Cite this Article?

Snehal Rahul Patil, Shiwani Sthapak, "A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB141035, Volume 3 Issue 12, December 2014, 2469 - 2472

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Privacy Preservation'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2144 - 2147

Survey on Privacy Preservation in Content Based Information Retrieval

Bhagyashree V. Khapli, Manjushri A. Mahajan

Share this Article

Similar Articles with Keyword 'Biometric'

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 69 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 890 - 894

A Survey on Types of Crawlers and Web Searching Algorithms

T. Yogameera, Dr. D. Shanthi

Share this Article

Similar Articles with Keyword 'Privacy'

Downloads: 134

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Similar Articles with Keyword 'Preservation'

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1598 - 1606

A Design and Implementation of Efficient Algorithm for Materialized View Selection with its Preservation in a Data Warehouse Environment

Sapna Choudhary, Roshna Mahajan

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Similar Articles with Keyword 'authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article
Top