Effective Modular Order Preserving Encryption on Cloud UsingMHGD
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 4
Abstract
Abstract: Cloud computing strengthens its presence in the public sector, Organizations and individuals arelooking for cloud services to improve productivity, security and reduce costs. Apart from communication, filestorage is the main requirement for common people. Traditional data centers consist of large collections ofserver farms implementing perimeter-security measures. Public cloud offersa multitenant service, in which theconcept of the network perimeter evaporates. For the former concern, data encryption before outsourcing is thesimplest way to protect data privacy. But encryption also makes deploying traditional data utilization services — a difficult. This problem on how to search encrypted data has recently gained attention and led to thedevelopment of searchable encryption techniques. In this work we are try to implement Modular OrderPreserving Encryption(MOPE), a primitive which allowing a efficient modular range queries on encrypteddocuments. This is a kind of Searchable Encryption Scheme. MOPE improves the security of OPE in the sense,as it does not leak any information about the location of plaintext, Boldyvera et.al. Main goal of this work is toimprove the security provided by the existing MOPE approaches with the help of Multivariate HypergeometricDistribution (MHGD).
Authors and Affiliations
N. Jayashri , T. Chakravarthy
An Effective Solution to Adequate and Operative Duplicate Detection in Stratified Data
Abstract: Data Mining is considered as a nontrival extraction of implicit, previously unknown and potentially usefull information from data. Although there is a long line of work on identifying duplicates in relati...
Component Based Representation Using Probabilistic NeuralNetwork Classifier
Abstract: The law enforcement agency make use of face recognition system for the identification of criminals.In some cases, the photograph of criminals is not available. In this situation,sketch is drawn by the inf...
An approach for human gait identification based on area
In recent investigations related to security issues, biometrics plays an important role in recognition of individuals based on their physiological or behavioral characteristics. Gait as a biometric behavioral tra...
Effect of Thermal Radiation on Unsteady Gravity Flow of a Power-Law Fluid with Viscous Dissipation through a Porous Medium
Abstract:In this work, we studied the effect of thermal radiation on unsteady gravity flow of a power-law fluid with viscous dissipation through a porous medium. The modified Darcy’s law is considered together with...
A Review Paper on Image Forgery Detection In Image Processing
Abstract: The image forensics is the technique which is applied to hide image important information. In the base paper, the technique of SIFT algorithm is applied to mark the objects in the image. In the SIFT algorithm w...