International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 110

Comparative Studies | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data

Amruta N. Deshmukh, Komal B. Bijwe

In this world all data proprietor can outsource their data to the cloud. But cloud cannot faith on the outsource data that data should be encrypted. Because of that all, the lots of problem can be occur. Such as, how can the authorized data users search over a data owners outsourced. How can the data users be assured that the capabilities to the data users Solve these all question we propose the cryptographic solution called as Attribute base search is more realistic over the outsource encrypted data. There is a need to allow the data users to verify whether the cloud faithfully executed the search operations or not. To the best of our knowledge, existing solutions cannot achieve these objectives simultaneously. as for all that problems. We the applicability of our construction to sharing of audit-log information and broadcast encryption. We verify whether the cloud can perform the appropriate search operation or not, and check that data owners outsources search over the encrypted data.

Keywords: Attribute-based encryption, Bilinear map, Encryption, search over encrypted data

Edition: Volume 4 Issue 3, March 2015

Pages: 1788 - 1790

Share this Article

How to Cite this Article?

Amruta N. Deshmukh, Komal B. Bijwe, "Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152484, Volume 4 Issue 3, March 2015, 1788 - 1790

Enter Your Email Address


Similar Articles with Keyword 'Encryption'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'search over encrypted data'

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 969 - 973

Improved Indexing and Advanced Relevance Ranking Score for Multi-Keyword Search over Encrypted Cloud Data

Amol D. Sawant, M. D. Ingle

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2463 - 2466

Fuzzy Search Engine for Cloud Encrypted Data

Swara Saoji, Nitin Bhil

Share this Article

Similar Articles with Keyword 'encryption'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Similar Articles with Keyword 'Bilinear'

Downloads: 101

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this Article

Downloads: 120

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 438 - 440

Survey on Public Auditing and Data Dynamics in Cloud Data Storage

Snehal. P. Sawant, Aaradhana. A. Deshmukh

Share this Article

Similar Articles with Keyword 'map'

Downloads: 4

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 627 - 631

A Survey based IoT Model to Maintain Social Distancing

Deepa Sonal

Share this Article

Downloads: 26

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1720 - 1723

Key Phrase Extraction Using Recurrent Neural Network

Aakib Jabbar, Preeti Sondhi

Share this Article
Top