News Updates Monday 25th Nov 2024 :
  • Welcome to INPRESSCO, world's leading publishers, We have served more than 10000+ authors
  • Articles are invited in engineering, science, technology, management, industrial engg, biotechnology etc.
  • Paper submission is open. Submit online or at editor.ijcet@inpressco.com
  • Our journals are indexed in NAAS, University of Regensburg Germany, Google Scholar, Cross Ref etc.
  • DOI is given to all articles

An efficient ranked multi-keyword search, fuzzy keyword Search for multiple data owners over encrypted cloud data


Author : Ms. Shireen I. Kudle and Dr. Swapnaja A. Ubale

Pages : 507-512
Download PDF
Abstract

With the happening to distributed computing, it has ended up being giving security to data. In the existing system, data users can access them without authentication Cipher text-Policy Attributebased Encryption (CP-ABE) can be utilized to conduct fine-grained and owner-centric access control. In a cloud computing system, we have developed the system providing security for information. In this system, the data owner can upload the different files using the AES algorithm in the encrypted format for maintaining security. For insurance concerns, secure endeavour over scrambled cloud data has propelled a couple of research works under the single proprietor model. In our system, we developed this system for multiple owners’ models with different functionality. In this system, implemented plans to tree-based ranked multikeyword search scheme for multiple data owners (TBMSM), to efficiently develop novel search protocol based on bilinear pairing, which enables different data owners to use different keys to encrypt their keywords and trapdoors. In the cloud server module, view all users, data owners, and all encrypted files also. The user also views the attacker of the system. The data user can search over encrypted data using the hash value md5 algorithm. Data Users can also fuzzy keyword algorithm search technique also used moreover; Users can download the file at a particular place only as well as at particular times only. Also, find out an attacker of the system if any user enters three times wrong key.

Keywords:  Advanced Encryption Standard, Attacker, Fuzzy Keyword Search, Hash Value, Ranked keyword Search

Call for Papers
  1. IJCET- Current Issue
  2. Issues are published in Feb, April, June, Aug, Oct and Dec
  3. DOI is given to all articles
  • Inpressco Google Scholar
  • Inpressco Science Central
  • Inpressco Global impact factor
  • Inpressco aap

International Press corporation is licensed under a Creative Commons Attribution-Non Commercial NoDerivs 3.0 Unported License
©2010-2023 INPRESSCO® All Rights Reserved