Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Comparative Studies | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015

Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data

Amruta N. Deshmukh, Komal B. Bijwe

In this world all data proprietor can outsource their data to the cloud. But cloud cannot faith on the outsource data that data should be encrypted. Because of that all, the lots of problem can be occur. Such as, how can the authorized data users search over a data owners outsourced. How can the data users be assured that the capabilities to the data users Solve these all question we propose the cryptographic solution called as Attribute base search is more realistic over the outsource encrypted data. There is a need to allow the data users to verify whether the cloud faithfully executed the search operations or not. To the best of our knowledge, existing solutions cannot achieve these objectives simultaneously. as for all that problems. We the applicability of our construction to sharing of audit-log information and broadcast encryption. We verify whether the cloud can perform the appropriate search operation or not, and check that data owners outsources search over the encrypted data.

Keywords: Attribute-based encryption, Bilinear map, Encryption, search over encrypted data

Edition: Volume 4 Issue 3, March 2015

Pages: 1788 - 1790

Share this Article

How to Cite this Article?

Amruta N. Deshmukh, Komal B. Bijwe, "Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152484, Volume 4 Issue 3, March 2015, 1788 - 1790

118 PDF Views | 95 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Attribute-based encryption'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1788 - 1790

Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data

Amruta N. Deshmukh, Komal B. Bijwe

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 639 - 642

A Review On Cloud Storage Architectures

Pallavi D. Dudhe, P. L. Ramteke

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1324 - 1327

Enhancing Organization Security using Attribute-Based Encryption for Data Sharing

Priya D. Tangde, A. S. Chhajed

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1687 - 1689

Enhancing Security and Effectiveness in Characteristic Based Information Offering

Ashwini Ahire, Prashant Jawalkar

Share this Article

Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Similar Articles with Keyword 'search over encrypted data'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 969 - 973

Improved Indexing and Advanced Relevance Ranking Score for Multi-Keyword Search over Encrypted Cloud Data

Amol D. Sawant, M. D. Ingle

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1788 - 1790

Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data

Amruta N. Deshmukh, Komal B. Bijwe

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2463 - 2466

Fuzzy Search Engine for Cloud Encrypted Data

Swara Saoji, Nitin Bhil

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1162 - 1165

Survey on Keyword Search in Encrypted Data With Privacy Preservation

Sonal Rahul Jamdade, Jyoti N. Nandimath

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1495 - 1500

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal

Share this Article
Top