Downloads: 110
Comparative Studies | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015
Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data
Amruta N. Deshmukh [2] | Komal B. Bijwe [4]
Abstract: In this world all data proprietor can outsource their data to the cloud. But cloud cannot faith on the outsource data that data should be encrypted. Because of that all, the lots of problem can be occur. Such as, how can the authorized data users search over a data owners outsourced. How can the data users be assured that the capabilities to the data users Solve these all question we propose the cryptographic solution called as Attribute base search is more realistic over the outsource encrypted data. There is a need to allow the data users to verify whether the cloud faithfully executed the search operations or not. To the best of our knowledge, existing solutions cannot achieve these objectives simultaneously. as for all that problems. We the applicability of our construction to sharing of audit-log information and broadcast encryption. We verify whether the cloud can perform the appropriate search operation or not, and check that data owners outsources search over the encrypted data.
Keywords: Attribute-based encryption, Bilinear map, Encryption, search over encrypted data
Edition: Volume 4 Issue 3, March 2015,
Pages: 1788 - 1790
Similar Articles with Keyword 'Encryption'
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish