Loading

Secured Service Chains Tuned Resource Sharing using Nsdp
VijayAnand R1, Prabhu J2, MuthamilSelvan T3, Thanapal P4, Manivannan S.S5

1Dr.VijayAnand R, School of Information Technology and Engineering ,Vellore Intitute of Technology ,Vellore-632014,
2Dr. Prabhu J, School of Information Technology and Engineering ,Vellore Intitute of Technology ,Vellore-632014,
3Dr. MuthamilSelvan T, School of Information Technology and Engineering ,Vellore Intitute of Technology ,Vellore-632014,
4Dr. Thanapal P, School of Information Technology and Engineering ,Vellore Intitute of Technology ,Vellore-632014,
5Dr. Manivannan S.S, School of Information Technology and Engineering ,Vellore Intitute of Technology ,Vellore-632014,

Manuscript received on 02 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 August 2019 | PP: 2195-2198 | Volume-8 Issue-10, August 2019 | Retrieval Number: J94100881019/2019©BEIESP | DOI: 10.35940/ijitee.J9410.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the current network area, cloud service providers offer infinite storage space and computing power for users to manage their data in the cloud. To enjoy these services, individuals or organizations store their private data on cloud servers. However, in the case of security breaches, users’ private data stored in the cloud are no longer safer. When users outsource their data to cloud servers, they expect complete privacy of their data stored in the cloud storage. To enjoy these services, individuals or organizations store their private data on cloud servers. The semantic-based keyword search over encrypted cloud data becomes of paramount importance. Protecting the privacy and data of users has remained a very crucial problem for cloud servers Additionally, the existing approaches only process them as single words, the flexibility of the encryption policy and the description of users’ rights, and it changes from a one-one to one-many scenario during the encryption and decryption phases, calculation method to measure the semantic similarity between compound concepts. Keyword has been widely used in many scenarios, particularly in cloud computing. In this Project in the proposed scheme we use the trusted authority to generate the trapdoor .The generated trapdoor will be send to the user’s e-mail ID, the user will search.
Keywords: has been widely used in many scenarios, particularly in cloud computing. In this Project in the proposed scheme we use the trusted authority to generate the trapdoor .The generated trapdoor will be send to the user’s e-mail ID, the user will search.
Scope of the Article: Network Architectures