Comparative Studies | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015
Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data
Amruta N. Deshmukh, Komal B. Bijwe
In this world all data proprietor can outsource their data to the cloud. But cloud cannot faith on the outsource data that data should be encrypted. Because of that all, the lots of problem can be occur. Such as, how can the authorized data users search over a data owners outsourced. How can the data users be assured that the capabilities to the data users Solve these all question we propose the cryptographic solution called as Attribute base search is more realistic over the outsource encrypted data. There is a need to allow the data users to verify whether the cloud faithfully executed the search operations or not. To the best of our knowledge, existing solutions cannot achieve these objectives simultaneously. as for all that problems. We the applicability of our construction to sharing of audit-log information and broadcast encryption. We verify whether the cloud can perform the appropriate search operation or not, and check that data owners outsources search over the encrypted data.
Keywords: Attribute-based encryption, Bilinear map, Encryption, search over encrypted data
Edition: Volume 4 Issue 3, March 2015
Pages: 1788 - 1790
How to Cite this Article?
Amruta N. Deshmukh, Komal B. Bijwe, "Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB152484, Volume 4 Issue 3, March 2015, 1788 - 1790
118 PDF Views | 95 PDF Downloads
Similar Articles with Keyword 'Attribute-based encryption'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1788 - 1790Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data
Amruta N. Deshmukh, Komal B. Bijwe
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014
Pages: 639 - 642A Review On Cloud Storage Architectures
Pallavi D. Dudhe, P. L. Ramteke
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1324 - 1327Enhancing Organization Security using Attribute-Based Encryption for Data Sharing
Priya D. Tangde, A. S. Chhajed
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1687 - 1689Enhancing Security and Effectiveness in Characteristic Based Information Offering
Ashwini Ahire, Prashant Jawalkar
Similar Articles with Keyword 'Encryption'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Similar Articles with Keyword 'search over encrypted data'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 969 - 973Improved Indexing and Advanced Relevance Ranking Score for Multi-Keyword Search over Encrypted Cloud Data
Amol D. Sawant, M. D. Ingle
Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1788 - 1790Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data
Amruta N. Deshmukh, Komal B. Bijwe
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017
Pages: 2463 - 2466Fuzzy Search Engine for Cloud Encrypted Data
Swara Saoji, Nitin Bhil
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 1162 - 1165Survey on Keyword Search in Encrypted Data With Privacy Preservation
Sonal Rahul Jamdade, Jyoti N. Nandimath
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017
Pages: 1495 - 1500Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
Nirupama Devangaon, Dr Suvarna Nandyal