For Queries/Clarification

alameenpublications@gmail.com

e-ISSN 2455-9288

Why publish with

ijaser

IJASER publishes high-quality, original research papers, brief reports, and critical reviews in all theoretical, technological, and interdisciplinary studies that make up the fields of advanced science and engineering and its applications.

INFORMATION RETRIEVAL IN CLOUD WITH SECURITY AND PRIVACY ASSURANCE

Abstract

Distributed computing give us an administration which is utilize and pay on-request benefits, in this manner the client can have different alternatives for information preparing framework. Cloud administrations make a characteristic test information protection and security. This is a direct result of weakness to assault, multi-occupancy and absence of client control. Thus, a secure encryption system with low calculation is required. Quality based encryption (ABE) innovation has been utilized to configuration fine-grained get to control framework, which gives one great strategy to comprehend the security issues in cloud setting. Be that as it may, the calculation cost and figure content size in most ABE plans develop with the multifaceted nature of the entrance strategy. Outsourced ABE(OABE) with fine-grained get to control framework can generally lessen the calculation cost for clients who need to get to encoded information put away in cloud by outsourcing the substantial calculation to cloud specialist co-op (CSP). 
However, as the amount of encrypted files stored in cloud is becoming  very huge, which will hinder efficient query processing. To deal with above problem, we present a new cryptographic primitive called attribute-based encryption scheme with outsourcing key-issuing and outsourcing decryption, which can implement keyword search function (KSF-OABE). The proposed KSF-OABE scheme is proved secure against chosen-plaintext attack (CPA). CSP performs partial decryption task delegated by data user without knowing anything about the plaintext. Moreover, the CSP can perform encrypted keyword search without knowing anything about the keywords embedded in trapdoor. Here we used the algorithm is Set-up Algorithm. 

Author

Mrs. Aafiya Thahaseen .A,Mr. Mohamed Ismail .S,Mr. Sharuk .P.T
Download