Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

A Robust Encryption and Searching System to Share Confidential Data onto the Cloud

Author : Mr. Thejas S 1 Dr. G. Raghavendra Rao 2

Date of Publication :18th April 2017

Abstract: as cloud computing provides storing and sharing records via a cloud service because of on demand resource access and elasticity. For secure record sharing requires encryption of records before outsourcing. Key management system is one of the important aspects of the system. For sharing large number of documents, each record needs to be encrypted using different keys. Since to decrypt these records requires all keys which is very different task. Hence this approach uses aggregated key system, which aggregates all the keys. Later at the time of decryption of all records it requires one aggregated key. Considering large number of records in the cloud. For the efficient access of these records, it is necessary to search for the records over encrypted file. For this purpose , required to build for the index file. Multi keyword entries searches for the relevance record by matching keywords with the index file

Reference :

    1. B. Wang, B. Li, and H. Li, "Oruta: PrivacyPreserving Public Auditing for Shared Data in the Cloud," in IEEE Cloud, June 2012, pp. 295-302
    2. Dynamic Audit Services for Outsourced Storages in Clouds Yan Zhu, Member, IEEE, Gail-Joon Ahn, Senior Member, IEEE, Hongxin Hu, Member, IEEE, Stephen S. Yau, Fellow, IEEE, Ho G. An, and Chang-Jun Hu.
    3. M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute Based Encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131–143, Jan. 2013
    4. L. Ibraimi, M. Asim, and M. Petkovic, “Secure Management of Personal Health Records by Applying Attribute-Based Encryption,” in Proceedings of the 2009 6th International Workshop on Wearable Micro and Nano Technologies for Personalized Health, Jun. 2009, pp. 71–74.
    5. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute Based Encryption,” in Proceedings of the 2007 IEEE Symposium on Security and Privacy, May 2007, pp. 321–334.

Recent Article