Research on Decryption Methodologies and Key Aggregate Searchable Encryption for Data Security Storage in Cloud

Authors

  • Sunaina Bagga RIMT University, Mandi Gobindgarh, Punjab, India Author

Keywords:

Cloud Data Protection Shares, Cloud Data Security, Data Leakage, Encryption Keys, Key Aggregate Searchable Encryption (KASE) Scheme

Abstract

Numerous firm’s architectures  management of data guarantees substantially alter  method, gain access to maintain private commercial  business. Occur additional facts protection problems.  Existing statistics safety methods have limits in  preventing records legal assaults, in particular these  performed by utilizing companion diploma business  executives to the cloud dealer to monitor data get right of  entry to within the cloud and find out unusual records get  right of entry to. Sorts require method of building a  machine robust protection privateer’s statistic through  files person team customer’s technique much documents.  Not simply the encryption keys but also the search keys  need to be utilized and consumers have to keep their keys  resistant and disseminated. The cutting-edge current  gadget the place the facts proprietor can solely share one  key with the user, whether or not it is any kind of  document, massive or small variety of documents, and  the function of the person is to cross a lure in the cloud of  overall performance checking out and safety evaluation  of shared documents, which is an impenetrable and  superb proposed gives schemes. And consumers are also  extremely concerned about data sharing storage,  inexplicable information leak in the cloud, and harmful  attackers. In the article, an experiment is done to format a  method for encryption for impenetrable statistics  allocation. 

Downloads

Download data is not yet available.

References

. Ma S, Huang Q, Zhang M, Yang B. Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensics Secur. 2015;10(3):458–70.

. Dutta C, Singhal N. A cross validated clustering technique to prevent road accidents in VANET. In: Proceedings of the 2018 International Conference on System Modeling and Advancement in Research Trends, SMART 2018. 2018.

. Singh P, Tyagi N. Radial Basis Function For Handwritten Devanagari Numeral Recognition. Int J Adv Comput Sci Appl. 2011;

. Singh R, Singhal N. An enhanced vehicle parking management using artificial intelligence. In: Proceedings of the 2018 International Conference on System Modeling and Advancement in Research Trends, SMART 2018. 2018.

. Jha A, Kumar M. Two wheels differential type odometry for mobile robots. In: Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization. IEEE; 2014. p. 1–5.

. Sharma BK, Agarwal RP, Singh R. An efficient software watermark by equation reordering and FDOS. In: Advances in Intelligent and Soft Computing. 2012.

. Goel S, Mamta. GA based trip attraction model for DUA. In: 2015 International Conference on Computing for Sustainable Global Development, INDIACom 2015. 2015.

. Mehdi M, Ather D, Rababah M, Sharma MK. Problems issues in the information security due to the manual mistakes. In: Proceedings of the 10th INDIACom; 2016 3rd International Conference on Computing for Sustainable Global Development, INDIACom 2016. 2016.

. Khan G, Gupta B, Gola KK. MDS3C: Modified digital signature scheme for secure communication. In: Advances in Intelligent Systems and Computing. 2017.

. Jain A, Dwivedi R, Kumar A, Sharma S. Scalable design and synthesis of 3D mesh network on chip. In: Advances in Intelligent Systems and Computing. 2017.

. Priya R, Belwal R. An analysis of resolution of deadlock in mobile agent system through different techniques. In: Advances in Intelligent Systems and Computing. 2017. [12]. Li H, Liu D, Dai Y, Luan TH, Shen XS. Enabling efficient

multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Top Comput. 2015;

. Shukla S, Agarwal AK, Lakhmani A. MICROCHIPS: A leading innovation in medicine. In: Proceedings of the 10th INDIACom; 2016 3rd International Conference on Computing for Sustainable Global Development, INDIACom 2016. 2016.

. Shukla S, Lakhmani A, Agarwal AK. Approaches of artificial intelligence in biomedical image processing: A leading tool between computer vision & biological vision. In: Proceedings - 2016 International Conference on Advances in Computing, Communication and Automation, ICACCA 2016. 2016.

. Pandey P, Joshi G, Gola KK. A zone based improved disk scheduling algorithm. In: Proceedings - 2016 International Conference on Advances in Computing, Communication and Automation, ICACCA 2016. 2016.

. Tahira M, Ather D, Saxena AK. Modeling and evaluation of heterogeneous networks for VANETs. In: Proceedings of the 2018 International Conference on System Modeling and Advancement in Research Trends, SMART 2018. 2018.

. Sengupta I, Kumar A, Kumar Dwivedi R. Study of SigmoidSpectral Composite Kernel based noise classifier with entropy in handling non linear separation of classes. In: 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering, UPCON 2018. 2018.

. Choudhary P, Dwivedi RK, Umang. A novel framework for prioritizing emergency vehicles through queueing theory. Int J Eng Adv Technol. 2019;

. Gupta A, Pant V, Kumar S, Bansal PK. Bank loan prediction system using machine learning. In: Proceedings of the 2020 9th International Conference on System Modeling and Advancement in Research Trends, SMART 2020. 2020.

. Zhu H, Wang L, Ahmad H, Niu X. Key-Policy Attribute Based Encryption with Equality Test in Cloud Computing. IEEE Access. 2017;

. Wang Q, Peng L, Xiong H, Sun J, Qin Z. Ciphertext Policy Attribute-Based Encryption with Delegated Equality Test in Cloud Computing. IEEE Access. 2017;

. Tseng YM, Tsai TT, Huang SS, Huang CP. Identity-based encryption with cloud revocation authority and its applications. IEEE Trans Cloud Comput. 2018;

. Sun Y, Zhang F, Shen L, Deng RH. Efficient revocable certificateless encryption against decryption key exposure. IET Inf Secur. 2015;

. Park S, Lee K, Lee DH. New constructions of revocable identity-based encryption from multilinear maps. IEEE Trans Inf Forensics Secur. 2015;

. Li J, Li J, Chen X, Jia C, Lou W. Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput. 2015;

. Li J, Yao W, Zhang Y, Qian H, Han J. Flexible and Fine Grained Attribute-Based Data Storage in Cloud Computing. IEEE Trans Serv Comput. 2017;

Downloads

Published

2021-11-30

How to Cite

Research on Decryption Methodologies and Key Aggregate Searchable Encryption for Data Security Storage in Cloud . (2021). International Journal of Innovative Research in Computer Science & Technology, 9(6), 314–319. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/11221