Identity-Based Authentication with Efficient Traceable System in Cloud Storage
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.9, No. 1)Publication Date: 2020-01-30
Authors : R.Prabhu; G.Haripriya; V.S.Janasathyaa; M.Keerthika; T.Pushpalatha;
Page : 137-143
Keywords : Authorized Penetrating Encryption; Traceability; Multiple Keywords Subset Search;
Abstract
Secure search over encrypted remote data is crucial in cloud computing to ensure data privacy and usability. To prevent unofficial data access and usage fine-grained access control is important in the multiuser system. Whereas, an authorized user may intentionally leak the secret key for financial benefit. So, tracing and revoking such maltreat user who abuses secret key needs to be solved. The key escrow free procedure can be used which will effectively prevent the Key Generation Centre (KGC) from unprincipled searching and decrypt all encrypted files of users. The decryption process involves here only requires ultra-lightweight computation, which is a desirable feature for energy-limited devices. If we figure out malevolent user we can efficiently revoke that user. Again if we have adaptable multiple keywords subset search pattern, which will also not affect the order of search results.
Other Latest Articles
- DENSITY BASED TRAFFIC CONTROL USING IoT
- PREVENTION OF CARJACKING USING FACE RECOGNITION
- A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURED DATA FORWARDING
- Privacy-Preserving Healthcare Architecture Using Blockchain
- Aspects of Greek Teachers Concerning Teaching Within Co-educational Classes: An Exploratory Approach to Elementary School
Last modified: 2020-02-03 00:54:39