International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Science , Computer Science and Engineering

Volume5,February 2018,

Topic : Efficient and Expressive Keyword Search over Encrypted Data in the Cloud

Authors:Balne Sridevi || Siddi Sravani

Abstract:In today’s world, there are many new challenges for the security of data and access control when users outsource sensitive data for sharing on third party server known as cloud servers, which are not within the same trusted domain as data owners. The existing technique used to maintain the confidentiality of personal medical record (PMR) against untrusted servers by disclosing data decryption keys only to authorized users. However, in doing so, these solutions inevitably introduce complexity in key management also burden on the data owner in data management well as in key management. The problem of simultaneously achieving security and data confidentiality and ingrainedness of access control still remains unresolved. This paper addresses this challenge 1) Key management, 2) Defining and enforcing access policies based on data attributes, and, 3) Keyword search over the encrypted data. PMR(patient medical record)system users need to deal with complicated key management problem to accomplish fine-grained access control when their PMRs are encrypted using symmetric key cryptography or asymmetric key cryptography.With our scheme multi-authority attribute based access control (MAABAC) we can reduce the key management complexity for owners and users. For this users are divided into the two domains; professional domain and personal domain. To achieve security of PMR, key management, user revocation and efficient keyword search exploiting KP-ABE, Multi-authority attribute based access control(MA-ABAC), and uniquely combining it with techniques of proxy re-encryption..

Keywords: Attribute based encryption, Cloud computing, Fine-grained access control, KP-ABE, MA-ABAC, User Revocation, Proxy Re-encryption.

Download Paper

DOI: 01.1617/vol5/iss2/pid16490

Related Articles

Wormhole Attack Prevention and Detection Approaches in Mobile Ad hoc Networks: A Survey.

Authors: Avinash Singh || Ram Singar Verma

Doi : 01.1617/vol4/iss03/pid34591

Volume4 ,March 2018.

Developing a GIS Platform for Tourism marketing and promotion In Nigeria: Case Study Of Bauchi State

Authors: Abubakar Siddiq Ango || Abdulsalam Waheed Abdulfatah, Idrissa Djibo

Doi : 01.1617/vol3/iss09/pid91783

Volume3 ,September 2018.

Decentralized Trust Management and Trust Worthiness of Cloud Environments

Authors: Qhubaib Syed || Syed Afzal Ahmed,Syed Abdul Haq

Doi : 01.1617/vol4/iss4/pid21386

Volume4 ,April 2018.

Brain Controlled Chess Based on Virtual Reality Control for Paralyzed Patients

Authors: Sindhura Rao || Ashwini S,Kusuma Mohanchandra

Doi : 01.1617/vol4/iss4/pid82074

Volume4 ,April 2018.

Multilevel Authentication System

Authors: Nichita Silva Lobo || Beverly Rodrigues,Pavni Alluri,Prathibha Singh,Nicole Alvares

Doi : 01.1617/vol4/iss4/pid82135

Volume4 ,April 2018.

Stock Prediction Using Clustering And Regression Techniques

Authors: Shalini Lotlikar || Megha Ainapurkar

Doi : 01.1617/vol4/iss4/pid39708

Volume4 ,April 2018.

Brain Tumor Detection using Image Segmentation

Authors: Siddhi N. Nerurkar ||

Doi : 01.1617/vol4/iss4/pid02845

Volume4 ,April 2018.

Video Mining using Query by Example

Authors: Rosebud Valadares ||

Doi : 01.1617/vol4/iss4/pid89542

Volume4 ,April 2018.

Fuzzy Opinion Mining for Product Recommender System

Authors: Aarti Bandodker ||

Doi : 01.1617/vol4/iss4/pid03652

Volume4 ,April 2018.

Aadhaar and Server based Electoral system

Authors: Yugansh Garg || Sakshi Mishra

Doi : 01.1617/vol4/iss4/pid69053

Volume4 ,April 2018.



Editor Image

Dr. Allon Guez
Professor, Drexel University,

View more



Google Scholar Profile

Thomson Reuters ID : q-6288-2016.
ORCiD Research ID : 0000-0001-9540-6799

All Issues


Journal Code : IJERCSE
Electronic ISSN : 2394-2320
Impact Factor : 4.890
Frequency : monthly
Contact :