ROLE BASED ACCESS CONTROL TO PROTECT CLOUD DATA USING R3 SCHEME
|
|
- Doreen Haynes
- 5 years ago
- Views:
Transcription
1 ROLE BASED ACCESS CONTROL TO PROTECT CLOUD DATA USING R3 SCHEME S. Ranjith Kumar1, G. Pandian1, D. Saravanan1, Mr. R. Raja2 1 2 Department of Computer Science and Engineering, Velammal Institute of Technology, Panchetti Chennai Assistant Professor, Department of Computer science and Engineering, Velammal Institute of Technology Corresponding Author Address: S. Ranjith Kumar Student Department of Computer Science and Engineering, Velammal Institute of Technology, Chennai, India. ABSTRACT: A key approach to secure cloud computing is for data owner to store encryption data in the cloud. Then issue key to authorized user.when a user is revoked the data owner will issue reencryption commands to the cloud to re-encryption the data to prevent the revoked user from decrypting the data and to generate new decryption key to validate user, so that they can continues to access the data. The essence of Role-Based Access Control (RBAC) is that system permissions are assigned to defined roles rather than to individual users using R3 scheme. The data owner will first generate a shared secret key to the CSP. Then, after the data owner encrypts each file with the appropriate attribute structure and time slice, the data owner uploads the file in the cloud. The CSP will replicate the file to various cloud servers. Each cloud server will have a copy of the shared secret key.let us assume that a cloud server stores an encrypted file F with A and TSi. When a user queries that cloud server, the cloud server first uses its own clock to determine the current time slice. KEYWORDS: cloud computing, re-encryption, R3scheme, secret key, CSP, decryption, RBAC. INTRODUCTION Security is one of the main user concerns for the adoption of Cloud computing. Moving data to the Cloud usually implies relying on the Cloud Service Provider (CSP) for data protection. Although this is usually managed based on legal or Service Level Agreements (SLA), the CSP could potentially access the data or even provide it to third parties. Users may loss control on their data. Even the trust on the federated CSPs is outside the control of the data owner. Encryption is the most widely used method to protect data in the Cloud. Encrypting data avoids undesired accesses. A rule-based approach would be desirable to provide expressiveness. An RBAC approach would be closer to current access control methods, resulting more natural to apply for access control enforcement than ABE-based mechanisms. In terms of expressiveness, it is said that ABAC supersedes RBAC since roles can be represented as attributes. This paper presents SecRBAC, a data-centric access control solution for self-protected data that can run in untrusted CSPs and provides extended Role-Based Access Control Page 60
2 expressiveness. The proposed authorization solution provides a rule-based approach following the RBAC scheme, where roles are used to ease the management of access to the resources. This approach can help to control and manage security and to deal with the complexity of managing access control in Cloud computing. Role and resource hierarchies are supported by the authorization model, providing more expressiveness to the rules by enabling the definition of simple but powerful rules that apply to several users and resources thanks to privilege propagation through roles and hierarchies. Policy rule specifications are based on Semantic Web technologies that enable enriched rule definitions and advanced policy management features like conflict detection. A data-centric approach is used for data self-protection, where novel cryptographic techniques such as Proxy Re-Encryption Encryption (PRE), Identity- Based Encryption (IBE) and Identity-Based Proxy ReEncryption (IBPRE) are used. They allow to re-encrypt data from one key to another without getting access and to use identities in cryptographic operations. These techniques are used to protect both the data and the authorization model. Each piece of data is ciphered with its own encryption key linked to the authorization model and rules are cryptographically protected to preserve data against the service provider access or misbehavior when evaluating the rules. It also combines a user-centric approach for authorization rules, where the data owner can define a unified access control policy for his data. The solution enables a rule based approach for authorization in Cloud systems where rules are under control of the data owner and access control computation is delegated to the CSP, but making it unable to grant access to unauthorized parties. RELATED WORKS Diverse methodologies can be found in the writing to hold control over approval in Cloud figuring. In [13] creators propose to keep the approval choices taken by the information proprietor. The get to model is not distributed to the Cloud but rather kept secure on the information proprietor premises. Be that as it may, in this approach the CSP turns into a minor stockpiling framework and the information proprietor ought to be online to process get to demands from clients. Another approach from [14] manages this issue by empowering a module component in the CSP that permits information proprietors to convey their own security modules. These licenses to control the approval systems utilized inside a CSP. Notwithstanding, it doesn't set up how the approval model ought to be secured, so the CSP could possibly gather data and get to the information. In addition, this approach does not cover Inter-cloud situations, since the module ought to be conveyed to various CSPs. Also, these methodologies don't ensure information with encryption techniques. In the proposed SecRBAC arrangement, data encryption is used to prevent the CSP to access the data or to discharge it bypassing the approval component. In any case, applying information encryption infers extra difficulties identified with approval expressiveness. Taking after a direct approach, one can incorporate information in a bundle encoded for the planned clients. This is generally done when sending a file or archive to a specific collector and guarantees that exclusive the beneficiary with the fitting key can unscramble it. From an approval perspective, this can be viewed as a basic lead where just the client with benefit to get to the Page 61
3 information will have the capacity to decode. Just that basic control can be upheld and only one single lead can apply to every information bundle. Consequently, numerous encoded duplicates ought to be made with a specific end goal to convey similar information to various recipients. To adapt to these issues, SecRBAC takes after an information driven approach that can cryptographically ensure the information while giving access control abilities. A few information driven methodologies, generally in light of Attribute-based Encryption (ABE) [5], have emerged for information security in the Cloud [4]. In ABE, the scrambled cipher text is named with an arrangement of properties by the information proprietor. Clients likewise have an arrangement of qualities defined in their private keys. They would have the capacity to get to information (i.e. unscramble it) or not relying upon the match amongst cipher text and key qualities. The arrangement of properties required by a client to unscramble the information is defined by a get to structure, which is specified as a tree with and additionally hubs. There are two principle approaches for ABE relying upon where the get to structure lives: Key-Policy ABE (KP-ABE) [5] and Ciphertext-Policy ABE (CP-ABE) [3]. In KP-ABE the get to structure or strategy is defined inside the private keys of clients. This permits to scramble information marked with qualities and afterward control the entrance to such information by conveying the proper keys to clients. Be that as it may, for this situation the strategy is truly defined by the key guarantor rather than the encryptor of information, i.e. the information proprietor. Along these lines, the information proprietor ought to put stock in the key guarantor for this to appropriately create a satisfactory get to strategy. To unravel this issue, CP-ABE proposes to incorporate the get to structure inside the ciperthext, which is under control of the information proprietor. At that point, the key guarantor just attests the traits of clients by incorporating them in private keys. In any case, either in KP-ABE or CPABE, the expressiveness of the get to control approach is constrained to mixes of AND-ed or potentially ed traits. The information driven arrangement exhibited in this paper goes a stage forward regarding expressiveness, giving a govern based approach taking after the RBAC plot that is not fixing to the impediments of current ABE approaches. Diverse proposition have been additionally created to attempt to reduce ABE expressiveness confinements. Creators in [15] propose an answer in light of CP-ABE with support for sets. Traits are sorted out in a recursive set structure and get to arrangements can be defined upon a solitary set or consolidating qualities from various sets. This empowers the definition of compound traits and specification of approaches that influence the characteristics of a set. An approach named Hierarchical Attribute-based Encryption is introduced in [16]. It utilizes a various leveled era of keys to accomplish fine-grain get to control, versatility and appointment. Notwithstanding, this approach suggests that traits ought to be managed by the same root domain authority. In[17], authors amplify CP-ASBE with a various leveled structure to clients keeping in mind the end goal to enhance versatility and flexibility. This approach gives progressive key structure. Another approach is Flexible and Efficient Access Control Scheme (FEACS) [2]. It depends on KP-ABE and gives a get to control structure spoke to by an equation including AND, OR and NOT, empowering more expressiveness for KP-ABE. The previously mentioned ABE-based arrangements proposed for understanding access control in Cloud registering depend on the Attribute-based Access Control (ABAC) Page 62
4 display. As remarked in Section 1, both ABAC and RBAC models have their own favorable circumstances and hindrances [7] [9]. On one hand, RBAC may require the definition of countless for fine-grain approval (part blast issue in RBAC). ABAC is additionally simpler to set up without need to try on part investigation as required for RBAC. On another hand, ABAC may bring about countless since a framework with n credits would have up to 2n conceivable rule combinations(rule explosion problem in ABAC).ABAC isolates approval rules from client properties, making it difficult to decide authorizations accessible to a specific user, while RBAC is deterministi can privileges can be effortlessly controlled by the information proprietor. In addition, the cryptographic operations utilized as a part of ABE methodologies typically confine the level of expressiveness gave by the get to control rules. Solidly, part chain of importance and protest progression abilities gave by SecRBAC can't be accomplished by current ABE plans. Also, private keys in ABE ought to contain the qualities of the client, which tights the keys to consents in the get to control approach. In SecRBAC, client keys just recognize their holders and they are not attached to the approval display. That is, client benefits are totally free of their private key. At last, no client driven approach for approval guidelines is given by current ABE arrangements. In SecRBAC, a solitary get to arrangement defined by the information proprietor can ensure more than one bit of information, bringing about a client driven approach for govern administration. Moreover, the proposed arrangement offers help for the ontological portrayal of the approval demonstrate, giving extra thinking instruments to adapt to issues, for example, recognition of conflicts between various approval rules. PROPOSED METHODOLOGY We proposed a reliable re-encryption scheme in unreliable cloud.r3 is the time based reencryption scheme,which allows each cloud services to automatically re-encrypt data based on its internal clock. The basic idea of this R3 is to associate the data with an access control and access time. Each user is issued key associated with attibutes and attribute effective time. Data-centric solution with data protection for the Cloud Service Provider to be unable to access it. Rule-based approach for authorization where rules are under control of the data owner. High expressiveness for authorization rules applying the RBAC scheme with role hierarchy and resource hierarchy. Role Manager Role Manager provides user registration service to register user profile that includes a user ID, password, and provide a small amount of additional information, including affiliation, country, and a valid address and importantly role of the users. This information is never provided to any application without a user's explicit permission. Encryption/Decryption Algorithm: Blowfish is a symmetric block cipher algorithm for encryption/decryption. Blowfish is accepted as a fast and strong encryptison algorithm because it has not been cracked. Blowfish is fixed 64 bit block cipher and a takes key length from bits. Total 16 processing Page 63
5 rounds of data encryption is performed in Blowfish. This algorithm is divided into two parts(i) Key expansion and (ii) Data encryption. In key expansion process 448 bits key is converted into 4168 bytes. The advantages of blowfish algorithm are that it is secure and easy to implement and best for hardware implementation, but the disadvantage is it require more space for the cipher text because of difference between key size and block size. Time Based One Time Password: Time-based One-time Password Algorithm (TOTP) is an algorithm that computes a one-time password from a shared secret key and the current time. It has been adopted as Internet standard RFC 6238,[1] is the cornerstone of Initiative For Open Authentication (OATH) and is used in a number of authentication systems. TOTP is an example of a hash-based message authentication code (HMAC). It combines a secret key with the current timestamp using a cryptographic hash function to generate a onetime password. The timestamp typically increases in 30-second intervals, so passwords generated close together in time from the same secret key will be equal. User Login A login, logging in or logging on is the entering of identifier information into a system by a user in order to access that system (e.g., a computer or a website). It is an integral part of computer security procedures.a login generally requires the user to enter two pieces of information, first a user name and then a password. This information is entered into a login window on a GUI (graphical user interface) or on the command line in a console (i.e., an all-text mode screen), depending on the system and situation. A user name, also referred to as an account name, is a string (i.e., sequence of characters) that uniquely identifies a user. User names can be the same as or related to the real names of users, or they can be completely arbitrary. Key Generator Login: A key generator is used in many cryptographic protocols to generate a sequence with many pseudo-random characteristics. SETUP AND RESULTS Given Below we have provided the setup of the portal Figure-1 Overall Architecture Diagram Page 64
6 During this process the user can register through client interface and get their data encrypted using re-encryption. One public key will be handled by the cloud server and private key will be maintained by the data owner. CSP will handle the private key which encrypt the data in the privacy table. when another user tried to access or modify the data in cloud,propwer access permission is needed. Once permission is issued data is accessed without any retriction. The key manager is responsible for generating the key and sending requested key to client through mail. Once key is received, the user will decrypt the data.role manager is respsible for assigning the roles to users. Cloud admin taking the accessibilities of role manager. Figure-2 Index Page Figure-3 Client registration interfaces Figure-4 Client upload files Figure-5 View of uploaded file before encryption Figure-6 Encrypted file view Figure-7 Key Generator to send key CONCLUSION In this article, we have investigated the privacy challenges in the Cloud computing by first identifying the data privacy requirements and then discussing whether existing privacypreserving techniques are sufficient for data processing. We have also introduced an efficient Page 65
7 and privacy-preserving Two-level encryption in response to the efficiency and privacy requirements of data mining in the cloud. REFERENCES 1. IBM, Big Data at the Speed of Business, X. Wu et al., Data Mining with Big Data, IEEE Trans. Knowledge DataEng., vol. 26, no. 1, 2014, pp S. Liu, Exploring the Future of Computing, IT Professional, vol. 15, no.1, 2013, pp Oracle, Oracle Big Data for the Enterprise, Big Data at CSAIL, 6. R. Lu et al., EPPA: An Efficient and Privacy-Preserving Aggregation Shemefor Secure Smart Grid Communications, IEEE Trans. Parallel Distrib. Sys.,vol. 23, no. 9, 2012, pp P. Paillier, Public-Key Cryptosystems based on Composite Degree Residuosity Classes, EUROCRYPT, 1999, pp M. Li et al., Toward Privacy-Assured and Searchable Cloud Data StorageServices, IEEE Network, vol. 27, no. 4, 2013, pp A. Cavoukian and J. Jonas, Privacy by Design in the Age of Big Data, Office of the Information and Privacy Commissioner, R. Lu, X. Lin, and X. Shen, SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency, 11. J. W. Byun and D. H. Lee, On a security model of conjunctive keyword search over encrypted relational database, J. Syst. Softw., vol. 84, no. 8, pp , M. Ding, F. Gao, Z. Jin, and H. Zhang, An efficient public key encryption with conjunctive keyword search scheme based on pairings, in Proc. 3rd IEEEInt. Conf. Netw. Infrastruct. Digit. Content (IC-NIDC), Beijing, China, Sep. 2012, pp J. Shao, Z. Cao, X. Liang, and H. Lin, Proxy re-encryption with keyword search, Inf. Sci., vol. 180, no. 13, pp , W.-C. Yau, R. C.-W. Phan, S.-H. Heng, and B.-M. Goi, Proxy re-encryption with keyword search re-encryption with keyword search: New definitions and algorithms, in Proc. Int. Conf. Security Technol., vol Jeju Island, Korea, Dec. 2010, pp L. Fang, W. Susilo, C. Ge, and J. Wang, Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search, Theoretical Comput. Sci., vol. 462, pp , Nov X. A. Wang, X. Huang, X. Yang, L. Liu, and X. Wu, Further observation on proxy reencryption with keyword search, J. Syst. Softw., vol. 85, no. 3, pp , R. Canetti, O. Goldreich, and S. Halevi, The random oracle methodology, revisited, J. ACM, vol. 51, no. 4, pp , M. Bellare, A. Boldyreva, and A. Palacio, An uninstantiable randomoracle-model scheme for a hybrid-encryption problem, in Proc. Int. Conf. Theory Appl. Cryptogr. Techn. (EUROCRYPT), vol Interlaken, Switzerland, May 2004, pp Page 66
8 19. J. W. Byun, H. S. Rhee, H.-A. Park, and D. H. Lee, Offline keyword guessing attacks on recent keyword search schemes over encrypted data, in Proc. 3rd VLDB Workshop Secure Data Manage. (SDM), vol Seoul, Korea, Sep. 2006, pp W.-C. Yau, R. C.-W. Phan, S.-H. Heng, and B.-M. Goi, Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester, Int. J. Comput. Math., vol. 90, no. 12, pp , Page 67
Efficient Privacy Preservation Techniques for Maintaining HealthCare Records Using Big Data
Efficient Privacy Preservation Techniques for Maintaining HealthCare Records Using Big Data S.Jegadeesan, S.Pooja, Vidhya.T Assistant Professor/IT, Dept of Information Technology, Velammal Institute of
More informationS. Indirakumari, A. Thilagavathy
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 A Secure Verifiable Storage Deduplication Scheme
More informationA Procedural Based Encryption Technique for Accessing Data on Cloud
A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,
More informationSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds Dr.K.Rameshwaraiah *1 G. Shiva Prasad *2 *1 Professor Department of Computer Science and Engineering *2 M.Tech *123 Nalla Narasimha Reddy Educational Society s Group
More informationIMPLEMENTATION OF E-HEALTH CLOUD SYSTEM USING TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION (RE-DTPECK)
IMPLEMENTATION OF E-HEALTH CLOUD SYSTEM USING TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION (RE-DTPECK) U.Sarath priyan 1, K.Gunasekaran 2 ABSTRACT: E-Health record system is a major application which provides
More informationSECURITY is one of the main user concerns for the adoption
IEEE TRANSACTIONS ON SERVICES COMPUTING 1 SecRBAC: Secure data in the Clouds Juan M. Marín Pérez, Gregorio Martínez Pérez, Antonio F. Skarmeta Gómez Abstract Most current security solutions are based on
More informationEFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE
EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,
More informationSecure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption
Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud
More informationAttribute Based Encryption with Privacy Protection in Clouds
Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India
More informationOn the Security of Group-based Proxy Re-encryption Scheme
On the Security of Group-based Proxy Re-encryption Scheme Purushothama B R 1, B B Amberker Department of Computer Science and Engineering National Institute of Technology Warangal Warangal, Andhra Pradesh-506004,
More informationABSTRACT I. INTRODUCTION
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,
More informationEfficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage
Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Mr. Ramesh 1, Prof. Girish Kumar D 2, Student, M.tech(Computer Networking) 1,, Assistant Professor, Computer
More informationDecentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav
Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Abstract: Distributed computing is area that permits clients to store the information. Distributed
More informationDual-server public-key encryption with keyword search for secure cloud storage
ISSN:2348-2079 Volume-6 Issue-2 International Journal of Intellectual Advancements and Research in Engineering Computations Dual-server public-key encryption with keyword search for secure cloud storage
More informationA LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE
A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,
More informationPRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.
Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS
More informationHIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES
HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent
More informationSecure Data Deduplication with Dynamic Ownership Management in Cloud Storage
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage Dr.S.Masood Ahamed 1, N.Mounika 2, N.vasavi 3, M.Vinitha Reddy 4 HOD, Department of Computer Science & Engineering,, Guru Nanak
More informationConjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud
Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud Mrs. Rashi Saxena 1, N. Yogitha 2, G. Swetha Reddy 3, D. Rasika 4 1 Associate
More informationEnhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms
Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Reliable Proxy
More informationUser Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe
User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe T.Radhika 1, S.Vasumathi Kannagi 2 P.G.Scholar, Department of CSE, Info Institute of Engineering, Coimbatore, India 1 Assistant
More informationVolume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article /
More informationClock-Based Proxy Re-encryption Scheme in Unreliable Clouds
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds Qin Liu [1][2], Guojun Wang [1], and Jie Wu [2], [1] Central South University, China [2] Temple University, USA 1 Outline 1. 1. Introduction
More informationSecure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been
More informationAdvanced Searchable Encryption Scheme for Secure Data Sharing in Cloud
Advanced Searchable Encryption Scheme for Secure Data Sharing in Cloud Anusha K 1, Babitha M N 2 PG Student, Department of Computer Science & Engineering, SSIT, Tumakuru, Karnataka, India 1 Assistant Professor,
More informationEfficient Auditable Access Control Systems for Public Shared Cloud Storage
Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,
More informationConjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re- Encryption in Health Cloud
IJIRST International Journal for Innovative Research in Science & Technology Volume 4 Issue 3 August 2017 ISSN (online): 2349-6010 Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 05, May -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 PRIVACY-PRESERVING
More informationThree Levels of Access Control to Personal Health Records in a Healthcare Cloud
Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United
More informationA compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationExploration Encryption Mechanism Using Single Key for Public Cloud Storage
International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 DOI: http://dx.doi.org/10.18535/ijetst/v3i05.07 Exploration Encryption Mechanism Using Single Key for Public Cloud
More informationIDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING FOR CLOUD STORAGE BASED ON OTP 1 S.V.KAVYA, 2M.HEMAMALINI, 3 K.
Volume 119 No. 15 2018, 995-1000 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ IDENTITY BASED REMOTE DATA INTEGRITY CHECKING WITH PERFECT DATA PRIVACY PRESERVING
More informationA Two-Fold Authentication Mechanism for Network Security
Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1
More informationSharing of PHR s in Cloud Computing
86 Sharing of PHR s in Cloud Computing Dussa Manasa K.Rajesh Khanna In Cse Dept, Vaagdevi Engineering college, Warangal, Andhra Pradesh, India Abstract Personal health records (PHRs) grant patients access
More informationSelf Destruction Of Data On Cloud Computing
Volume 118 No. 24 2018 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Self Destruction Of Data On Cloud Computing Pradnya Harpale 1,Mohini Korde 2, Pritam
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM
ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM Ms. S. P. Vidhya Priya 1, Dharani.N.R 2, Gokilavani.M 3, Jeevitha.R 4 1,2,3,4 Department of Information Technology, Kathir College
More informationDual-Server Public-key Encryption with Keyword Search for Secure Cloud Storage
Dual-Server Public-key Encryption with Keyword Search for Secure Cloud Storage A.VIJAYA DURGA 1, N. KOTESWARAMMA 2, B. LAKSHMI PRAVEENA 3 1,2 Dept. of MCA, VVIT, Guntur, AP 3 Dept. of IT, VVIT, Guntur,
More informationAn Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara
An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara 1 M.Tech, Dept of CSE,Shri Shirdi Sai Institute of Science and Engineering, Affiliated
More informationA Compatible Public Service Platform for Multi-Electronic Certification Authority
Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,
More informationInternational Journal of Advance Research in Engineering, Science & Technology
Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)
More informationISSN Vol.04,Issue.05, May-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG
More informationPrivileged Document Access In Google Cloud Environment
Privileged Document Access In Google Cloud Environment 1 Miss. S.V. Sarode, 2 Prof. K.N.Shedge 1 PG student, 2 Assi. Professor 1 Computer Engineering Department, 1 SVIT, Chincholi, Sinner, Nashik, India
More informationLOAD BALANCING AND DEDUPLICATION
LOAD BALANCING AND DEDUPLICATION Mr.Chinmay Chikode Mr.Mehadi Badri Mr.Mohit Sarai Ms.Kshitija Ubhe ABSTRACT Load Balancing is a method of distributing workload across multiple computing resources such
More informationBlowfish Algorithm with Verifiable Outsourced in Cloud Computing
Blowfish Algorithm with Verifiable Outsourced in Cloud Computing 1 Bawya.M, PG scholar/cse, Tagore Institute of Engineering and Technology, aglya08@gmail.com 2 Raja.K, Assistant Professor/CSE, Tagore Institute
More informationENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING
ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.
More informationVoid main Technologies
Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified
More informationAssistant Professor, Dept of CSE, Vasireddy Venkatadri Institute of Technology (VVIT), Nambur (v), Guntur, Andhra Pradesh, India
Volume 5, Issue 10, October-2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Efficient User
More informationManagement of Heterogeneous Data Storage Using Deduplication in Cloud Computing
Management of Heterogeneous Data Storage Using Deduplication in Cloud Computing 1 Naveen Kumar.B 2 Mr.Praveen Babu.G 1 M.Tech Student, Software Engineering, School of Information Technology JNTUH, Village
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationSecure Data De-Duplication With Dynamic Ownership Management In Cloud Storage
Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,
More informationIMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING
IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health
More informationENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2,
ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, DEPARTMENT OF CSE SAHAJA INSTITUTE OF TECHNOLOGY & SCIENCES FOR WOMEN, KARIMNAGAR ABSTRACT: The
More informationTime-Based Proxy Re-encryption Review
Time-Based Proxy Re-encryption Review Meghatai Maruti Bhoite 1, I Govardhan Rao 2 CSE, University College of Engineering Osmania University, Hyderabad, India Abstract :- Fundamentals approach for secure
More informationAccumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust
Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,
More informationAn Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings Debasis Giri and P. D. Srivastava Department of Mathematics Indian Institute of Technology, Kharagpur 721 302, India
More informationA Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing
A Less Weight Secure Data Sharing Scheme for Mobile Cloud Computing P. Likitha Department of Computer Science and Engineering, MJR College of Engineering & Technology, Piler, A.P - 517214, India. ABSTRACT:
More informationAbstract. Asia-pacific Journal of Convergent Research Interchange Vol.2, No.2, June 30 (2016), pp
Vol.2, No.2, June 30 (2016), pp. 35-41 http://dx.doi.org/10.21742/apjcri.2016.06.05 1) 2) Abstract Cloud computing gives an adaptable and helpful route for information sharing, which brings different advantages
More informationA NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME
VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam
More informationISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department
More informationVarious Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi 2 M. Navinkumar 3
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Various Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi
More informationOn the security of a certificateless signature scheme in the standard model
On the security of a certificateless signature scheme in the standard model Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang State Key Laboratory of Networking and Switch Technology, Beijing University
More informationABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid
More informationCRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:
CRYPTOGRAPHY AND NETWORK SECURITY K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 1 Email:lakshmikpriya3698@gmail.com, 2 Email:rubhapandian@gmail.com, 3 Email:niranjanamurugan@gmail.com, Nadar Saraswathi College
More informationCryptography (Overview)
Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography
More informationAUTHENTICATION AND LOOKUP FOR NETWORK SERVICES
Vol.5, No.1, pp. 81-90, 2014 doi: 10.7903/ijecs.1040 AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Daniel J. Buehrer National Chung Cheng University 168 University Rd., Min-Hsiung Township, Chiayi County,
More informationVol-3 Issue INTRODUCTION IJARIIE-ISSN (O)
SECURED EMAIL BROADCASTING USING IDENTITY BASED ENCRYPTION R.Bombale 1, Prof.S.M.Rokade 2 1 M.E., Computer Engineering Department, Maharashtra, India 2 HOD, Computer Engineering Department, Maharashtra,
More informationMULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY
ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationSecure Data Storage in Clouds by Using Decentralized Access Control Scheme
Secure Data Storage in Clouds by Using Decentralized Access Control Scheme N. Suneel Kumar 1, A. NarayanaRao 2 M.Tech., (Ph.D.) 1 Computer Science and Engineering, Shree Institute of Technical Education
More informationOn the Security of an Efficient Group Key Agreement Scheme for MANETs
On the Security of an Efficient Group Key Agreement Scheme for MANETs Purushothama B R 1,, Nishat Koti Department of Computer Science and Engineering National Institute of Technology Goa Farmagudi, Ponda-403401,
More informationSecure Sensitive Data
Secure Sensitive Data Praneet Mohanbala 1, Manisha Parida 2, Dr.Roopa R 3 U.G. Student, Department of Information Science &Engg, BMS College of Engineering, Bangalore, India 1 U.G. Student, Department
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop
More informationRamesh Polisetti, Chikram Sridhar, Chenagoni Nagaraju
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Dynamic Secure Multi-Keyword Ranked Search over
More informationImplementation of Decentralized Access Control with Anonymous Authentication in Cloud
Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud
More informationMobile Health Monitoring Based On New Power Management Approach
Mobile Health Monitoring Based On New Power Management Approach R.Kanimozhi 1, M.Suguna 2 Department of Information Technology, SNS College of Technology, Coimbatore, Tamilnadu, India 1, 2 ABSTRACT- Mobile
More informationAUTHENTICATED SMART CARD APPLICATION USING MULTI CROSS CLOUD TECHNOLOGY
AUTHENTICATED SMART CARD APPLICATION USING MULTI CROSS CLOUD TECHNOLOGY Sujolincy J 1 and Murari Devakannan Kamalesh 2 1 Computer Science and Engineering Sathyabama University Chennai, Tamil Nadu, India
More informationSecure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically
Secure Multi-Keyword Ranked Search over Encrypted Cloud Data Dynamically G. Sunil Santhosh Kumar 1, M. Swapna 2 1 Assistant Professor, Marri Laxman Reddy Institute of Technology and Management, Telangana
More informationAttribute-based encryption with encryption and decryption outsourcing
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing
More informationProtected and Effective Transmission of Data in Peer-To-Peer Network Using SGA
Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Sushma T Shanbhogue 1, Poonguzhali E 2 P.G. Student, Department of Computer Engineering, AMC Engineering College, Bangalore,
More informationMilitary Secured Network Data Transmission
Military Secured Network Data Transmission Shubham Jain 1, Umesh Dusane 2, Smita Lokhande 3, Vinod Kadam 4, Asst. Prof. Neha Jamdar 5 1University of Pune, Sinhgad Institute of Technology and Science, jains7272@gmail.com
More informationENCRYPTION IN USE FACT AND FICTION. White Paper
White Paper Table of Contents The Case for Encryption... Encryption in Use Not Some Kind of Magic... Evaluating Encryption in Use Claims... 3 4 4 The Vaultive Approach... 5 2 Risk-conscious enterprises
More informationEnhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage
Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,
More informationA Simple User Authentication Scheme for Grid Computing
A Simple User Authentication Scheme for Grid Computing Rongxing Lu, Zhenfu Cao, Zhenchuai Chai, Xiaohui Liang Department of Computer Science and Engineering, Shanghai Jiao Tong University 800 Dongchuan
More informationA Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks
International Journal of Engineering and Technical Research (IJETR) A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks Ms. Arati Phadtare,
More informationAn Efficient And Secure Data Sharing By Preventing Collusion Attack In Cloud
An Efficient And Secure Data Sharing By Preventing Collusion Attack In Cloud Jyoti Pingat 1, Swati Mandwade 2, 1Student, Savy Software Pvt.Ltd,Pune 2 Student,,Savy Software Pvt.Ltd,Pune Email: jyotipingat123@gmail.com
More informationFine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing
wwwijcsiorg 10 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing Yinghui Zhang 12 1 National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications
More informationDATA SECURITY IN CLOUDS USING DECENTRALIZED ACCESS CONTROL, ANONYMOUS AUTHENTICATION AND RSA BASED ENCRYPTION
DATA SECURITY IN CLOUDS USING DECENTRALIZED ACCESS CONTROL, ANONYMOUS AUTHENTICATION AND RSA BASED ENCRYPTION 1 VARALATCHOUMY.M, 2 PRATEEK. S. BHARADWAJ, 3 R. ROHITH, 4 NAGACHANDRA. K. P, 5 PRAVEEN. M
More informationSDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data
SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,
More informationInternational Journal of Modern Electronics and Communication Engineering (IJMECE) ISSN: Volume No.-4, Issue No.
A Review on Multi-Keyword Based Image Retrieval System for Encrypted Image Data Stored On Cloud Pawandeep 1, Hardeep Singh 2 1 Student, CSE department, CGC-COE Landran, Pawandeep.saini@gmail.com 2 Asst.
More informationAn efficient and practical solution to secure password-authenticated scheme using smart card
An efficient and practical solution to secure password-authenticated scheme using smart card R. Deepa 1, R. Prabhu M.Tech 2, PG Research scholor 1, Head of the Department 2 Dept.of Information Technology,
More informationADVANCES in NATURAL and APPLIED SCIENCES
ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy
More informationA Survey on Phrase Search over Encrypted Cloud Storage with Multiple Data Owners
A Survey on Phrase Search over Encrypted Cloud Storage with Multiple Data Owners [1] Pavan Kumar Kandukuri, [2] G. Vishnu Murthy [2] Professor, [1] Dept. of Computer Science & Engineering, Anurag Group
More informationSecurity in ECE Systems
Lecture 11 Information Security ECE 197SA Systems Appreciation Security in ECE Systems Information security Information can be very valuable Secure communication important to protect information Today
More informationFINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
FINE-GRAINED QUERY RESULTS VERIFICATION FOR SECURE SEARCH SCHEME OVER ENCRYPTED CLOUD DATA 1 M MOUNIKA 1 M.Tech Student, Department of CSE, Jyothishmathi institute of Technology & science, karimnagar,
More informationReal-Time Detection from Various Social Network Using SSO
2017 IJSRSET Volume 3 Issue 2 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology Real-Time Detection from Various Social Network Using SSO ABSTRACT C. Jayaseelan,
More informationSession Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption
More informationSecret Key Algorithms (DES)
Secret Key Algorithms (DES) G. Bertoni L. Breveglieri Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used
More informationSECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
Research Manuscript Title SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Dr.B.Kalaavathi, SM.Keerthana, N.Renugadevi Professor, Assistant professor, PGScholar Department of
More information