IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K.

Size: px
Start display at page:

Download "IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K."

Transcription

1 Volume 119 No , ISSN: (on-line version) url: IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2 M.HEMAMALINI, 3 K.C.NISHITHA Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College Avadi,Chennai hemamohan1997@gmail.com,kavyavelayudham@gmail.com, nishitha@veltechmultitech.org Abstract Personality based (ID-based) Remote Data Integrity Checking (RDIC) amid its procedure releases no data of the put away information to the verifier. Although this process of providing data privacy is based on the password, it doesn t provide an effective and efficient security. In this paper, we propose a mechanism in which RDIC process makes use of OTP for providing enhanced level of data integrity and security. Along with this OTP, the concept of time session is also given which makes the users to use the OTP in an efficient manner. For the secured file sharing the OTP will be generated and issued to the selected clients ID which will be sent via SMTP protocol. The usage of this protocol is low cost and the delivery of the messages will be done in a faster manner. In addition to this security mechanism at the front end, we also provide the security at the back end. This back end security is provided by storing the data in the encrypted form. For this we make use of two algorithms, Blowfish algorithm and AES algorithm. By combining these two Algorithms the back end security is achieved. Keywords data privacy, OTP, Session, File sharing. I. INTRODUCTION Circulated processing, which is a kind of Internet-based enrolling gives shared planning resources and data to PCs and diverse contraptions on ask. The on-ask for access to a common pool of configurable handling resources can be enabled by using this model. Conveyed figuring give customers distinctive capacities to store and process their data in the pariah server ranches. It relies upon sharing of resources for achieve clarity and economies of scale, similar to an utility (like the power structure) over a framework. Circulated processing is a model for enabling all inclusive, invaluable, on-ask for sort out access to a common pool of configurable figuring resources (e.g., frameworks, servers, storing, applications and organizations) that can be immediately provisioned and released with immaterial organization effort. Supporters affirm that appropriated processing empowers associations to evade candid establishment costs, and focus on wanders that different their associations as opposed to on structure. Protectors in like manner affirm that circulated figuring empowers endeavors to get their applications up and running snappier, with upgraded sensibility and less help, and engages IT to more rapidly adjust resources for meet fluctuating and flighty business ask. Cloud providers commonly use a "pay as you go" illustrate. This can provoke startlingly high charges if heads don't acclimate to the cloud esteeming model. 995

2 The present availability of high-restrain frameworks, insignificant exertion PCs and limit devices and what's more the no matter how you look at it allotment of gear virtualization, advantage masterminded plan, and autonomic and utility preparing have incited an improvement in conveyed figuring. Associations can scale up as figuring needs augment and a short time later cut back again as solicitations decrease. Disseminated figuring has transformed into an astoundingly asked for organization or utility due to the advantages of high handling power, poor cost of organizations, tip top, versatility, transparency and furthermore openness. Some cloud merchants are experiencing advancement rates of half per annum, however due to being in a period of beginning periods, in spite of all that it has snares that need fitting respect for make circulated registering organizations more tried and true and straightforward. Circulated figuring is the result of the improvement and choice of existing developments and perfect models. The goal of conveyed processing is to empower customers to take benefit by these progressions, without the prerequisite for significant data about or fitness with each and every one of them. The cloud intends to cut costs, and empowers the customers to base on their inside business instead of being deterred by IT obstructions. The guideline enabling advancement for conveyed processing is virtualization. Virtualization programming detaches a physical considering device along with no less than one "virtual" devices, each one of which can be successfully used and made sense of how to perform preparing errands. With working system level virtualization fundamentally making a versatile game plan of different independent enrolling devices, sit without moving figuring resources can be apportioned and used more gainfully. Virtualization gives the agility required to quicken IT errands, and diminishes cost by growing establishment utilize. Autonomic figuring automates the methodology through which the customer would arrangement be able to resources on-ask. By constraining customer consideration, automation quickens the system, diminishes work expenses and declines the probability of human errors. II. OBJECTIVES The procedure of check is utilized by the information proprietor to confirmation the information clients. The document sets and its file are put away in the cloud in the wake of being scrambled by the information proprietor amid the pre processing and ordering stages. The information client looks through the documents as indicated by a watchword by sending a demand to the cloud server in the pursuit and recovery forms. III. EXISTING SYSTEM In the existing system, the PKI information security insurance instrument for distributed storage framework, in which an information sender is permitted to encode the information with learning of the character of a recipient just, while the collector is required to utilize the two his/her mystery key and a security gadget to access the information. Our answer upgrades the privacy of the information, as well as offers the revocability of the gadget so once the gadget is renounced, the comparing figure content will be refreshed consequently by the cloud server with no notice of the information proprietor. Besides, we introduced the security confirmation and productivity examination for our framework. 996

3 IV. PROPOSED SYSTEM At present, numerous inquires about concentrated on building up the scrambled pursuit effectiveness with watchwords positioning. Wang et al. executed a one - round outing look conspire which could analyze the encoded information. It was worth seeing that watchword positioned hunt may obtain more genuine Keywords-documents Association Loss issue. In the event that assailants watched the catchphrases and returned records to take in a few connections amongst watchwords and documents, through remote correspondence channels for portable cloud. Cao et al. executed security ration strategy for multicatchphrase encoded seek with an approach to control the "twofold key misfortune". In a fluffy multicatchphrase, fluffy pursuit conspire was without a doubt, however it experiences from broken inquiry time with two round-trip correspondences. Multiwatchword is most likely the future standard encoded seek conspire with more prominent looking precision, yet directly on-going examination can't give a legitimate strategy. Consequently, we will apply the single catchphrase with OPE TF-IDF encryption strategy to set up an all the more intense and movement proficient scrambled information look engineering. A. ARCHITECTURE B. ALGORITHMS BLOWFISH ALGORITHM An encryption algorithm that uses the private or the secret key block cipher of variable length key is called the blowfish algorithm. 997

4 A 64 bit plain instant message is first partitioned into 32 bits. The left 32 bits are XORed with the primary component of the P cluster to make an esteem called P', gone through a change called F, at that point XORed with right 32 bits of the message to create another esteem called F'. F' at that point replaces the left 50% of the message and P' replaces the correct half, and the procedure is rehashed 15 times with progressive individuals from the P cluster. The coming about P' and F' are then XORed with the last two passages in the P exhibit (sections 17 &18), and recombined to create the 64 bit figure content. AES ALGORITHM AES is standard encryption algorithm handling 128 bit blocks, using keys sized at 128, 192, and 256 bits. AES treats the 128 bits of a plaintext hinder as 16 bytes. These 16 bytes are organized in four sections and four columns for preparing as a grid. AES utilizes 10 rounds for 128-piece keys, 12 rounds for 192-piece keys and 14 rounds for 256- piece keys. Every one of these rounds utilizes an alternate 128-piece round key, which is figured from the first AES key. V. CONCLUSION In this venture, we advanced another design, Blowfish as an essential endeavor to make an activity and vitality effective encoded catchphrase seek device on to versatile cloud stockpiles. We started with the presentation of an essential plan that we contrasted with past encoded look devices for distributed computing and we introduced their wastefulness in a versatile cloud conditions. Blowfish is additional time and vitality expending than watchword look over plain-content, yet at the same time it spares huge vitality identified with conventional methodologies advancing a comparative security level. In view of Blowfish, this work can be extended for more other novel executions. We have proposed a solitary watchword seek plan to make scrambled information look able. In any case, there are conceivable expansions of our present work remaining. 998

5 REFERENCES [1] A. Akavia, S. Goldwasser, and V. Vaikuntanathan, Simultaneous hardcore bits and cryptography against memory attacks, in Proc. 6th Theory Cryptography Conf., 2009, pp [10] H. C. H. Chen, Y. Hu, P. P. C. Lee, and Y. Tang, NCCloud: A network- coding-based storage system in a cloud-of-clouds, IEEE Trans. Comput., vol. 63, no. 1, pp , Jan [2] S. S. Al-Riyami and K. G. Paterson, Certificateless public key cryptography, in Proc. 9th Int. Conf. Theory Appl. Cryptol., 2003, pp [3] M. H. Au, J. K. Liu, W. Susilo, and T. H. Yuen, Certificate based (linkable) ring signature, in Proc. Inf. Security Practice Experience Conf., 2007, pp [4] M. H. Au, Y. Mu, J. Chen, D. S. Wong, J. K. Liu, and G. Yang, Malicious KGC attacks in certificateless cryptography, in Proc. 2nd ACM Symp. Inf., Comput. Commun. Security, 2007, pp [5] M. Blaze, G. Bleumer, and M. Strauss, Divertible protocols and atomic proxy cryptography, in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 1998, pp [6] A. Boldyreva, V. Goyal, and V. Kumar, Identitybased encryption with efficient revocation, in Proc. ACM Conf. Comput. Commun. Security, 2008, pp [7] D. Boneh, X. Ding, and G. Tsudik, Fine-grained control of security capabilities, ACM Trans. Internet Techn., vol. 4, no. 1, pp , [8] D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, in Proc. 21st Annu. Int. Cryptol. Conf., 2001, pp [9] R. Canetti and S. Hohenberger, Chosenciphertext secure proxy re-encryption, in Proc. ACM Conf. Comput. Commun. Security, 2007, pp

6 1000

International Journal on Electronics & Wireless Communication Engineering (IJEWCE) ISSN: Volume 10 Issue 10 March 2018.

International Journal on Electronics & Wireless Communication Engineering (IJEWCE) ISSN: Volume 10 Issue 10 March 2018. MULTI-VISUAL CRYPTOGRAPHY FOR BIOMETRICS(FINGERPRINT & IRIS) USING LION OPTIMIZATION ALGORITHM Mr. S. Rajesh, Assistant Professor, Department of CSE, Avvaiyar College of Engineering & Technology for Women,

More information

Vol-3 Issue INTRODUCTION IJARIIE-ISSN (O)

Vol-3 Issue INTRODUCTION IJARIIE-ISSN (O) SECURED EMAIL BROADCASTING USING IDENTITY BASED ENCRYPTION R.Bombale 1, Prof.S.M.Rokade 2 1 M.E., Computer Engineering Department, Maharashtra, India 2 HOD, Computer Engineering Department, Maharashtra,

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav

Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Abstract: Distributed computing is area that permits clients to store the information. Distributed

More information

[Patil*, 4(7): July, 2017] ISSN Impact Factor: 2.805

[Patil*, 4(7): July, 2017] ISSN Impact Factor: 2.805 KEY AGGREGATE SEARCHABLE ENCRYPTION FOR SHARING THE DATA ON MULTI CLOUD R. U. Patil *1 & Prof. A. J. Kadam 2 M.E, Department of Computer Engineering, All India Shri Shivaji Memorial Society's, College

More information

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp

Abstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp Vol.2, No.2, June 30 (2016), pp. 35-41 http://dx.doi.org/10.21742/apjcri.2016.06.05 1) 2) Abstract Cloud computing gives an adaptable and helpful route for information sharing, which brings different advantages

More information

Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud

Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Anusha K 1, Babitha M N 2 PG Student, Department of Computer Science & Engineering, SSIT, Tumakuru, Karnataka, India 1 Assistant Professor,

More information

Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing

Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing 1 Naveen Kumar.B 2 Mr.Praveen Babu.G 1 M.Tech Student, Software Engineering, School of Information Technology JNTUH, Village

More information

Exploration Encryption Mechanism Using Single Key for Public Cloud Storage

Exploration Encryption Mechanism Using Single Key for Public Cloud Storage International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/v3i05.07 Exploration Encryption Mechanism Using Single Key for Public Cloud

More information

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,

ABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid

More information

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18,  ISSN International Journal of Computer Engineering and Applications, Volume XII, Special Issue, May 18, www.ijcea.com ISSN 2321-3469 SECURE MOBILE HEALTH CARE SYSTEM THROUGH SHARABLE AND TRACEABLE FEATURES

More information

SUBSCRIBE SYSTEMS WITH SECURITY AND ERADICATING INTERMEDIARIES THROUGH IDENTITY BASED ENCRYPTION TECHNIQUE

SUBSCRIBE SYSTEMS WITH SECURITY AND ERADICATING INTERMEDIARIES THROUGH IDENTITY BASED ENCRYPTION TECHNIQUE SUBSCRIBE SYSTEMS WITH SECURITY AND ERADICATING INTERMEDIARIES THROUGH IDENTITY BASED ENCRYPTION TECHNIQUE Sepuri Kranthi Kumar 1, K Krishna Reddy 2 1 M.tech Scholar CSE, 2 Associate Professor, Dept. of

More information

Implementation of IBE with Outsourced Revocation technique in Cloud Computing

Implementation of IBE with Outsourced Revocation technique in Cloud Computing Implementation of IBE with Outsourced Revocation technique in Cloud Computing M.MOHANRAO, POCKLA PAVANI Assistant Professor, M.TECH STUDENT Dept of CSE,Megha Institute of Engineering & Technology For womens,edulabad,ghatkesar

More information

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms

Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,

More information

Secure Socket Layer Based Load Balancing Methodology In Distributed Servers

Secure Socket Layer Based Load Balancing Methodology In Distributed Servers 1st International Conference on Applied Soft Computing Techniques 22 & 23.04.2017 In association with International Journal of Scientific Research in Science and Technology Secure Socket Layer Based Load

More information

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud

More information

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT: CRYPTOGRAPHY AND NETWORK SECURITY K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 1 Email:lakshmikpriya3698@gmail.com, 2 Email:rubhapandian@gmail.com, 3 Email:niranjanamurugan@gmail.com, Nadar Saraswathi College

More information

On the Security of Group-based Proxy Re-encryption Scheme

On the Security of Group-based Proxy Re-encryption Scheme On the Security of Group-based Proxy Re-encryption Scheme Purushothama B R 1, B B Amberker Department of Computer Science and Engineering National Institute of Technology Warangal Warangal, Andhra Pradesh-506004,

More information

Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically

Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically G. Sunil Santhosh Kumar 1, M. Swapna 2 1 Assistant Professor, Marri Laxman Reddy Institute of Technology and Management, Telangana

More information

Enhanced Key Expansion Algorithm for Advanced Encryption Standard using Different S- Box Implementation on FPGA

Enhanced Key Expansion Algorithm for Advanced Encryption Standard using Different S- Box Implementation on FPGA GRD Journals- Global Research and Development Journal for Engineering Volume 1 Issue 5 April 2016 ISSN: 2455-5703 Enhanced Key Expansion Algorithm for Advanced Encryption Standard using Different S- Box

More information

A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage

A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage A Secure & Encrypted Multi-Keyword Ranked Search in Cloud Storage Jeniphar Francis #, Chetna Getme # Priyanka Bagde # Ruchika Bansod # Prof. Ashish Palandurkar * # Student, Dept. of Information Technology

More information

Ramesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju

Ramesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Dynamic Secure Multi-Keyword Ranked Search over

More information

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department

More information

Received on Accepted on

Received on Accepted on ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com EFFICIENT SEARCHING WITH MULTIPLE KEYWORD OVER ENCRYPTED CLOUD DATA BY BLIND STORAGE K.Santhi* 1, M.Deepa 2, M.Lawanya

More information

Multi-Keyword Ranked Search in Encrypted Cloud Storage

Multi-Keyword Ranked Search in Encrypted Cloud Storage Multi-Keyword Ranked Search in Encrypted Cloud Storage Akshay Kasulkar, Sahil Kamble, Nikhil Shettiwar, Tejaswini Dongre Prof. Vijay Masne UG Student, Dept. of Computer Science & Engineering, DBACER College,

More information

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY CONTENT Introduction Problem statements Literature Review Existing system Proposed system Application Conclusion Future work MOTIVATIONS

More information

An Efficient And Secure Data Sharing By Preventing Collusion Attack In Cloud

An Efficient And Secure Data Sharing By Preventing Collusion Attack In Cloud An Efficient And Secure Data Sharing By Preventing Collusion Attack In Cloud Jyoti Pingat 1, Swati Mandwade 2, 1Student, Savy Software Pvt.Ltd,Pune 2 Student,,Savy Software Pvt.Ltd,Pune Email: jyotipingat123@gmail.com

More information

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18,  ISSN International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 ENHANCED SECURED LOAD BALANCING METHODOLOGY IN CLUSTER BASED SERVERS 1 G.SRILAKSHMI,

More information

SECURE SCHEME ON CRYPTOGRAPHY

SECURE  SCHEME ON CRYPTOGRAPHY SECURE EMAIL SCHEME ON CRYPTOGRAPHY 1 Ms.Karthika.M 2 Mr.Mitun Kumar.M.B 3 Ms.Nithya.A 4 Dr. Kalaikumaran.T 1 Department of Computer Science And Engineering, SNS College of Technology, Coimbatore, India

More information

Dynamic Secure Multi-Keyword Ranked Search over Encrypted Cloud Data

Dynamic Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Volume 2, Issue 3, ISSN [O]: 2455-4545 Macaw International Journal of advanced Research in Computer Science and Engineering (MIJARCSE) Available online at: http://www.macawpublications.com Dynamic Secure

More information

AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT

AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT 1 MANIKANDAN.G, 2 MANIKANDAN.R, 3 RAJENDIRAN.P, 4 KRISHNAN.G, 5 SUNDARGANESH.G 1 Assistant Professor, School of Computing, SASTRA University,

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

Protection Framework for Receiving of Information Using Digital Signature Algorithm

Protection Framework for Receiving of Information Using Digital Signature Algorithm Protection Framework for Receiving of Information Using Digital Signature Algorithm D. Chand Basha 1, G. Sivaranjani 2 1 Student, Dept of Master of Computer Applications, Rayalaseema Institute of Information

More information

A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data

A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data Purva Jain 1, Dr. Abhijit Banubakode 2 ( Computer, RSCOE, University of Pune, Pune, Maharashtra India) 1 ( I.T., RSCOE, University

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Reliable Proxy

More information

Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage

Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Mr. Ramesh 1, Prof. Girish Kumar D 2, Student, M.tech(Computer Networking) 1,, Assistant Professor, Computer

More information

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116

ISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 e-issn (O): 2348-4470 p-issn (P): 2348-6406 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 A SURVEY

More information

Catch You in the event that You Misbehave Ranked Keyword Search Results Verification in Cloud Computing

Catch You in the event that You Misbehave Ranked Keyword Search Results Verification in Cloud Computing International Journal for Modern Trends in Science and Technology Volume: 03, Issue No: 09, September 2017 ISSN: 2455-3778 http://www.ijmtst.com Catch You in the event that You Misbehave Ranked Keyword

More information

ROLE BASED ACCESS CONTROL TO PROTECT CLOUD DATA USING R3 SCHEME

ROLE BASED ACCESS CONTROL TO PROTECT CLOUD DATA USING R3 SCHEME ROLE BASED ACCESS CONTROL TO PROTECT CLOUD DATA USING R3 SCHEME S. Ranjith Kumar1, G. Pandian1, D. Saravanan1, Mr. R. Raja2 1 2 Department of Computer Science and Engineering, Velammal Institute of Technology,

More information

LOAD BALANCING AND DEDUPLICATION

LOAD BALANCING AND DEDUPLICATION LOAD BALANCING AND DEDUPLICATION Mr.Chinmay Chikode Mr.Mehadi Badri Mr.Mohit Sarai Ms.Kshitija Ubhe ABSTRACT Load Balancing is a method of distributing workload across multiple computing resources such

More information

Identity Based Encryption and Data Self Destruction in Cloud Computing

Identity Based Encryption and Data Self Destruction in Cloud Computing Identity Based Encryption and Data Self Destruction in Cloud Computing Madhavi S. Langute M.E (Computer) Department of Computer Engineering, Jayawantrao Sawant College of Engineering, Savitribai Phule

More information

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION 132 International Journal of Research in Computer Applications And Robotics, x(x): xx-xx INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 BLOWFISH ALGORITHM ON ITS

More information

Security User Data in Local Connectivity Using Multicast Key Agreement

Security User Data in Local Connectivity Using Multicast Key Agreement Security User Data in Local Connectivity Using Multicast Key Agreement Shahela A. Khan Dept. Of Computer Science And Engg. ACE Nagthana Shahelakhan27@yahoo.in Prof. Dhananjay M. Sable Dept. Of Computer

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

Identification of Fake Location Based Service Providers Using Secure Abstraction of Top-K Query Processing

Identification of Fake Location Based Service Providers Using Secure Abstraction of Top-K Query Processing ISSN No: 2454-9614 Identification of Fake Location Based Service Providers Using Secure Abstraction of Top-K Query Processing *Corresponding Author: P. Shyamala E-mail: shyamala.se14@bitsathy.ac.in P.

More information

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Sushma T Shanbhogue 1, Poonguzhali E 2 P.G. Student, Department of Computer Engineering, AMC Engineering College, Bangalore,

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

A Procedural Based Encryption Technique for Accessing Data on Cloud

A Procedural Based Encryption Technique for Accessing Data on Cloud A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,

More information

A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS

A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS Volume 116 No. 6 2017, 149-153 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET

More information

Secure Sensitive Data

Secure Sensitive Data Secure Sensitive Data Praneet Mohanbala 1, Manisha Parida 2, Dr.Roopa R 3 U.G. Student, Department of Information Science &Engg, BMS College of Engineering, Bangalore, India 1 U.G. Student, Department

More information

An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing

An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing Presented By: Arinjita Paul Authors: S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan TCS Lab, Department of CSE, IIT Madras.

More information

Modern health care services are serving patients needs by

Modern health care services are serving patients needs by ELECTRONIC HEALTHCARE SYSTEM Deepali Gholap 1, Priya Surve 2, Purvi Thale 3, Vaishnavi Saswade 4, Sharad Adsure 5 Student, Department of Computer Engineering, JSPM s B.S.I.O.T.R., Wagholi, Maharashtra,

More information

Result Analysis: Decentralized Access Control with Anonymous Authentication

Result Analysis: Decentralized Access Control with Anonymous Authentication Result Analysis: Decentralized Access Control with Anonymous Authentication Prof D.S.Thosar 1, Punam S.Jadhav 2,Shruti S.Thosar 3,Swapnali D.Sarode 4 1 Assistant Prof. Computer Department, 2,3,4 Student

More information

Efficient Approach for Query Based Search in Data Mining

Efficient Approach for Query Based Search in Data Mining International Journal of Private Cloud Computing Environment and Management Vol. 3, No. 2, (2016), pp. 1-6 http://dx.doi.org/10.21742/ijpccem.2016.3.2.01 Efficient Approach for Query Based Search in Data

More information

Assistant Professor, Dept of CSE, Vasireddy Venkatadri Institute of Technology (VVIT), Nambur (v), Guntur, Andhra Pradesh, India

Assistant Professor, Dept of CSE, Vasireddy Venkatadri Institute of Technology (VVIT), Nambur (v), Guntur, Andhra Pradesh, India Volume 5, Issue 10, October-2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Efficient User

More information

INFORMATION SECURITY AND PRIVACY IN CLOUD USING HYBRID CRYPTOGRAPHIC ALGORITHM

INFORMATION SECURITY AND PRIVACY IN CLOUD USING HYBRID CRYPTOGRAPHIC ALGORITHM INFORMATION SECURITY AND PRIVACY IN CLOUD USING HYBRID CRYPTOGRAPHIC ALGORITHM PRIYA K Assistant Professor, Information Science and Engineering, MVJ College Of Engineering, Bangalore, India Abstract From

More information

COPY RIGHT. To Secure Your Paper As Per UGC Guidelines We Are Providing A Electronic Bar Code

COPY RIGHT. To Secure Your Paper As Per UGC Guidelines We Are Providing A Electronic Bar Code COPY RIGHT 2018IJIEMR.Personal use of this material is permitted. Permission from IJIEMR must be obtained for all other uses, in any current or future media, including reprinting/republishing this material

More information

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam

More information

Linear Programming Solution for Secure and Outsourcing in Cloud Computing

Linear Programming Solution for Secure and Outsourcing in Cloud Computing Linear Programming Solution for Secure and Outsourcing in Cloud Computing V.SANDEEP PG Scholar, Dept. Computer Science Engineering, Kakinada Institute Of Engineering Technology, KORANGI, KAKINADA. CH.SUBHASH

More information

Sankeeth Kumar Chinta.

Sankeeth Kumar Chinta. Sankeeth Kumar Chinta. # 991730264 Sept 18, 2015 Contents 1 Introduction 2 2 History 4 3 Description of Algorithm: 4 3.1 Key Expansion.......................... 5 3.2 Data Encryption.........................

More information

ISSN Vol.04,Issue.05, May-2016, Pages:

ISSN Vol.04,Issue.05, May-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG

More information

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption

More information

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN. Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation. 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data

More information

Cloud Storage Security Based on Trusted Third Party Auditing

Cloud Storage Security Based on Trusted Third Party Auditing Cloud Storage Security Based on Trusted Third Party Auditing Priyanka S. Nangare 1, Prof. Varsha Dange 2 M.E. Student, Dept. of Computer Engineering, DPCOE, Pune, India 1 Assistant Professor, Dept. of

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health

More information

Certificateless Public Key Cryptography

Certificateless Public Key Cryptography Certificateless Public Key Cryptography Mohsen Toorani Department of Informatics University of Bergen Norsk Kryptoseminar November 9, 2011 1 Public Key Cryptography (PKC) Also known as asymmetric cryptography.

More information

A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme

A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme G. Lakshmeeswari *, D. Rajya Lakshmi, Y. Srinivas, and G. Hima Bindu GIT, GITAM University, Visakhapatnam, Andhra Pradesh {lak_pr,rdavuluri}@yahoo.com,

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,

More information

Encryption I. An Introduction

Encryption I. An Introduction Encryption I An Introduction Reading List ADO and SQL Server Security A Simple Guide to Cryptography Protecting Private Data with the Cryptography Namespaces Using MD5 to Encrypt Passwords in a Database

More information

Blowfish Algorithm with Verifiable Outsourced in Cloud Computing

Blowfish Algorithm with Verifiable Outsourced in Cloud Computing Blowfish Algorithm with Verifiable Outsourced in Cloud Computing 1 Bawya.M, PG scholar/cse, Tagore Institute of Engineering and Technology, aglya08@gmail.com 2 Raja.K, Assistant Professor/CSE, Tagore Institute

More information

On the security of a certificateless signature scheme in the standard model

On the security of a certificateless signature scheme in the standard model On the security of a certificateless signature scheme in the standard model Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang State Key Laboratory of Networking and Switch Technology, Beijing University

More information

Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image

Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image N.Mahesh Chandra M.Tech Student, Sreenidhi Institute of Science and Technology. Abstract: In this paper,

More information

Real-Time Detection from Various Social Network Using SSO

Real-Time Detection from Various Social Network Using SSO 2017 IJSRSET Volume 3 Issue 2 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology Real-Time Detection from Various Social Network Using SSO ABSTRACT C. Jayaseelan,

More information

Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing

Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing International Journal of Computer Engineering and Applications, Special Edition www.ijcea.com ISSN 2321-3469 Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing Sonu Kumar

More information

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS Ms.T P Rani 1, Dr. C Jaya Kumar 2 1 Research Scholar, Anna University of Technology,Chennai 1 ranitp.2010@gmail.com 2 Department of Computer

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017 RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,

More information

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Based on Distance Comparison Shortest Path Algorithm

Based on Distance Comparison Shortest Path Algorithm Volume 118 No. 20 2018, 853-860 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Based on Distance Comparison Shortest Path Algorithm 1 Y. NavyaSri, 2 K. Meghana, 3 D. Nageswari and

More information

On the Security of an Efficient Group Key Agreement Scheme for MANETs

On the Security of an Efficient Group Key Agreement Scheme for MANETs On the Security of an Efficient Group Key Agreement Scheme for MANETs Purushothama B R 1,, Nishat Koti Department of Computer Science and Engineering National Institute of Technology Goa Farmagudi, Ponda-403401,

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been

More information

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18,   ISSN LOAD BALANCING TECHNIQUES ON DYNAMIC NETWORKING WEB SERVER CLUSTERS S.Tamilarasi., Dr. K.Kungumaraj 1 Research Scholar of,mother Teresa University, Kodaikanal. Head and Assistant Professor, 2 Department

More information

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United

More information

Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices

Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices Volume 03 - Issue 10 October 2018 PP. 30-34 Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices Pranav Nair 1, Hitesh Patil 2, Tukaram Gore 3, Yogesh Jadhav 4 1 (Computer

More information

Implementation of Security in Cloud Systems Based using Encryption and Steganography

Implementation of Security in Cloud Systems Based using Encryption and Steganography Implementation of Security in Cloud Systems Based using Encryption and Steganography 1 A.Mahesh Babu, 2 G.A. Ramachandra, 3 M.Suresh Babu 1,2 Department of Computer Science & Technology, Sri Krishnadevaraya

More information

Improving Keyword Query Suggestions On Document Proximity With Using LKS Framework And PA Algorithm

Improving Keyword Query Suggestions On Document Proximity With Using LKS Framework And PA Algorithm Improving Keyword Query Suggestions On Document Proximity With Using LKS Framework And PA Algorithm 1 N.VARUN KUMARI 2 MRS. P. SREE LAKSHMI 1 M. Tech Student, Department of CSE, B.V. Raju Institute of

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] Rajalakshmi V., Jothi Nisha V. and Dhanalakshmi S. Faculty of Computing, Sathyabama University, Chennai,

More information

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique

Secure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Proxy re encryption schemes for IoT and crowd sensing

Proxy re encryption schemes for IoT and crowd sensing Proxy re encryption schemes for IoT and crowd sensing Conference or Workshop Item Accepted Version Díaz Sánchez, D., Sherratt, R. S., Arias, P., Almenares, F. and Marín López, A. M. (2016) Proxy re encryption

More information

Hierarchical Attribute Based Revocable Data Access Control For Multi Authority Cloud Storage

Hierarchical Attribute Based Revocable Data Access Control For Multi Authority Cloud Storage IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 4, Ver. I (Jul - Aug 2017), PP 91-97 www.iosrjournals.org Hierarchical Attribute Based Revocable Data

More information