Loading...
Please wait, while we are loading the content...
Similar Documents
A Novel User Revocation And Secure Multi Keyword Ranked Search Scheme Over Encrypted Data
| Content Provider | Semantic Scholar |
|---|---|
| Author | Gorremuchu, Beulah Rani Mulugu, Naga Sriharsha |
| Copyright Year | 2016 |
| Abstract | Cloud Computing is an emerging technology now days in this connection in order to store and share huge volume of data over internet we required Cloud Services like IaaS (Infrastructure as a Service) where it can manage storage and share data securely with reduced cost thus sensitive data should be encrypted before outsource onto public cloud for the sake of users data privacy. As our existing system we noticed some of the privacy challenges over multi-keyword ranked search from the cloud server. i.e user revocation and lack of encryption scheme over index structure. In this paper we proposed a novel policy for user revocation for avoiding user revocation issues for dynamic updation over encrypted data by an authority i.e Trusted Key manager(TKM) which manages keys by Diffie Hellman Algorithms: This algorithm is basically used to generate keys., and Ciphertext-Policy Attribute-based Encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage systems, because it gives the data owner more direct control on access policies and does not require the data owner to distribute keys. In CP-ABE scheme, there is an authority (TKM) that is responsible for key management. The data owner defines the access policies and encrypts data under the policies using SHA-1 (Symmetric ES). Each user will be issued a secret key according to its attributes. A user can decrypt the ciphertext only when its attributes satisfy the access policies under the fine grained approach scheme. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://iosrjournals.org/iosr-jce/papers/Vol18-issue5/Version-5/J1805056063.pdf |
| Language | English |
| Access Restriction | Open |
| Subject Keyword | Access control Algorithm Attribute-based encryption Cerebral Palsy Ciphertext Cloud computing Cloud storage Data access Data integrity Diffie–Hellman key exchange EPILEPSY, FEMALE-RESTRICTED, WITH MENTAL RETARDATION (disorder) Information privacy Key (cryptography) Key management Keyword Numerous Outsourcing Policy Reduced cost SHA-1 Server (computing) Solutions Virtual private server |
| Content Type | Text |
| Resource Type | Article |