An Additive Order And Privacy Preserving Function Family (AOPPF)
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 1
Abstract
The plentiful benefits of cloud computing, for privacy concerns, individuals and enterprise users are disinclined to outsource their susceptible data, including emails, personal health records and government confidential files, to the cloud. This is as once sensitive data are outsourced to a inaccessible cloud, the analogous data owners lose direct control of these data. We identify a multi-owner model for privacy preserving keyword search over encrypted cloud data. We recommend an capable data user , which not only prevents attackers from eavesdropping secret keys and imaginary to be illegal data users performing searches, but also facilitate data user certification and revocation.
Authors and Affiliations
V. Gowtham| Dept. of CSE, Srinivasa Institute of Engineering and Technology, Cheyyeru.E.G,AP,India, B. Srinivas| Dept. of CSE, Srinivasa Institute of Engineering and Technology, Cheyyeru.E.G,AP,India
To Investigate Data Centre Performance and Quality of service in IaaS Cloud Computing Systems
Cloud record management is a major key problem due to the single and multi-clouds strategies that can be provide range from the VM placement to the federation with other clouds. Performance evaluation of Cloud Comput...
Detection of Masquerade Attacks using Data-Driven Semi-Global Alignment Approach
The broad utilization of virtualization in representing security basis conveys unrivaled security worries for inhabitants or clients and presents an extra layer that itself must be totally arranged and secured. Gatec...
We propose a close real-time and cost-effective semantic questions based approach, called FAST. The thought behind FAST is to investigate and abuse the semantic connection inside and among datasets by means of relati...
To Provide A Classification Mechanism To Avoid Useless Data From Osn Walls
It recommends an automated system called Filtered Wall able to filter unwanted messages from OSN user walls to involuntarily allocate with each short text message a set of categories based on its content. In OSNs ther...
A Mobility Prediction Algorithm To Estimate The Contact Opportunities For Smartphone Users
The objective is to consent users to issue queries for content stored on other smart phones wherever in the network and to measure the chances of obtaining the information needed. We take for granted that smart phone...