International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110

Comparative Studies | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015


Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data

Amruta N. Deshmukh [2] | Komal B. Bijwe [4]


Abstract: In this world all data proprietor can outsource their data to the cloud. But cloud cannot faith on the outsource data that data should be encrypted. Because of that all, the lots of problem can be occur. Such as, how can the authorized data users search over a data owners outsourced. How can the data users be assured that the capabilities to the data users Solve these all question we propose the cryptographic solution called as Attribute base search is more realistic over the outsource encrypted data. There is a need to allow the data users to verify whether the cloud faithfully executed the search operations or not. To the best of our knowledge, existing solutions cannot achieve these objectives simultaneously. as for all that problems. We the applicability of our construction to sharing of audit-log information and broadcast encryption. We verify whether the cloud can perform the appropriate search operation or not, and check that data owners outsources search over the encrypted data.


Keywords: Attribute-based encryption, Bilinear map, Encryption, search over encrypted data


Edition: Volume 4 Issue 3, March 2015,


Pages: 1788 - 1790


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Amruta N. Deshmukh, Komal B. Bijwe, "Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 1788-1790, https://www.ijsr.net/get_abstract.php?paper_id=SUB152484

Similar Articles with Keyword 'Encryption'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article
Top