AN ENDANGERED AND SEVERAL CONVERSATION PROGRAM IN THE ENCRYPTED DATA EXPLORATION SCHEMA

Padmaja Alapati, Dr. G. Akilarasu

Abstract


We send tree-based secure searches for cloud-coded information, perform many keyword searches, and dynamically manipulate a range of documents. The device is fast searching for Cloud Secure because the user has access to search terms. Many companies have been offering different types of threats to perform different search engines, such as search keywords, search keywords, and many keywords. Due to the important structure of the tree-based index, the search engine will look for the expected distance over time to manage the entire deletion process and enter the documents. The expected outline is defined as queries with multiple keywords, accurate classification of results, and upgrading of documentation diagrams. For high search efficiency we are developing a tree-based index structure and suggest a formula based on an index tree. Even if this concept is not new to RDBMS-based systems, this may be a new model for accessing information about encrypted domains in the cloud that is due to the user's profiles of activity. Among these methods, the search engine search method with multiple search results has become more important because of real performance.


References


Y. Hwang and P. Lee. Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Pairing-Based Cryptography (Pairing 2007), volume 4575 of LNCS, pages 2–22. 2007.

J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In EUROCRYPT’08, pages 146–162, Berlin, Heidelberg, 2008. Springer-Verlag.

M. Li, S. Yu, K. Ren, and W. Lou. Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings. In SecureComm’10, pages 89–106, Sept. 2010.

N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management: extended abstract. In ACM CCS.

D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Proc. of EUROCRYP’04, 2004.

D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Proc. of TCC’07, pages 535–554, 2007.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.