Open Access Open Access  Restricted Access Subscription Access

Keyword Search mechanism Using Multiple Authorities on Encrypted Cloud Data

Anupama T A, Megha M A

Abstract


Storage pools, which are hosted by third parties, can be used to store data on the cloud. Cloud data needs an internet connection. But everybody in the globe has access to the cloud data. Security is therefore a major problem for cloud data. Usually, cloud data is encrypted using asymmetric encryption. However, this is insufficient. Because it's possible to steal the private key. It calls for improved security measures. So, for access control, we choose for two-factor data security. IBE (Identity Based Encryption) is how we operate. To encrypt the data in this case, the sender just needs to know who the recipient is. There is no requirement for extra subtleties. The beneficiary can download the encoded information that the shipper shipped off the cloud. The underpinning of our answer is a two-factor information encryption procedure with revocability capacity. The information should be decoded two times by the recipient. Their mystery key is utilized as the primary stage, trailed by an exceptional security gadget like a USB or Bluetooth. To decode the information, two variables are required.


Full Text:

PDF

References


C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou. Toward secure and dependable storage services in cloud computing. IEEE T. Services Computing, 5(2):220–232, 2012.

H. Wang. Proxy provable data possession in public clouds. IEEE T. Services Computing, 6(4):551–559, 2013.

V. Varadharajan and U. K. Tupakula. Security as a service model for cloud environment. IEEE Transactions on Network and Service Management, 11(1):60–75, 2014.

C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou. Privacy- preserving public auditing for secure cloud storage. IEEE Trans. Computers, 62(2):362–375, 2013.

A. Boldyreva, V. Goyal, and V. Kumar. Identity-based encryption with efficient revocation. In P. Ning, P. F. Syverson, and S. Jha, editors, ACM Conference on Computer and Communications Security, pages 417–426. ACM, 2008.

Sonali Mishra , “SQL Injection Detection using Machine Learning ”, from https:

//scholarworks.sjsu.edu/cgi/viewcontent.cgi?arti c le = 1727context = etdprojects, on 23 May 2019 pp.10 - 29.

BojkenShehu and Aleksander Xhuvani ,”A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and their Prevention and Detection Techniques” from https

://pdfs.semanticscholar.org , Vol. 11, Issue 4, No 1,July 2014 pp 20 - 34.

Suhaimi Ibrahim , ” SQL Injection Detection and Prevention Techniques” from https

://pdfs.semanticscholar.org/ Volume 3, Number 7, August 2011 , pp 85 - 89.

G. Wassermann, Z. Su, “An analysis framework for security in web applications,” In: Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems, fromhttps://link.springer.com/chapter/1

1007/978 − 0 − 387 − 44599 − 15 SAVCBS, pp. 70–78, 2004.

Mei Junjin, “An Approach for SQL Injection Vulnerability Detection,” Proceedings. of the 6th Int. Conf. On Information Technology: New Generations, Las Vegas, Nevada, pp. 14-19, Apr. 2009.

G Buehrer, B.W. Weide, P.A.G Sivilotti, Using Parse Tree Validation to Prevent SQL Injection Attacks, in: 5th InternationalWorkshop on SoftWore Engineering and Middlere, Lisbon, Portugal, 2005, pp. 106-113.

Suhas G.K., Devananda S.N., Jagadeesh R., Pareek P.K., Dixit S. (2021) Recommendation-Based Interactivity Through Cross Platform Using Big Data. In: Tavares J.M.R.S., Chakrabarti S., Bhattacharya A., Ghatak S. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_60

N R, Deepak and G K, Dr. Suhas and B, Bhagappa and Kumar Pareek, Piyush, A Framework for Food recognition and predicting its Nutritional value through Convolution neural network (February 22, 2022). Available at SSRN: https://ssrn.com/abstract=4040968 or http://dx.doi.org/10.2139/ssrn.4040968


Refbacks

  • There are currently no refbacks.