Loading

Optimal integrity Policy for Secure Storage of Encrypted Data using Cloud Computing
T.N. Ranganadham1, G.I.K. Durga Bhavani2, M. Rudra Kumar3

1T.N.Ranganadham, Assistant Professor, Department of CSE, Annamacharya Institute of Technology & Sciences, Rajampet, Andhrapradesh, India-516126.
2G.I.K.Durga Bhavani, PG Student, Department of CSE, Annamacharya Institute of Technology & Sciences, Rajampet, Andhrapradesh, India-516126.
3M. Rudra Kumar, Professor & HOD, Department of CSE, Annamacharya Institute of Technology & Sciences, Rajampet, Andhrapradesh, India-516126.

Manuscript received on 20 August 2019. | Revised Manuscript received on 03 September 2019. | Manuscript published on 30 September 2019. | PP: 1773-1776 | Volume-8 Issue-11, September 2019. | Retrieval Number: K17600981119/2019©BEIESP | DOI: 10.35940/ijitee.K1760.0981119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is very common at reduced price because of its computing and storage ability. To reduce storage costs, an ever increasing number of information are being moved to the cloud. Then again, since the cloud isn’t completely dependable, they are usually encrypted before uploading to shield information protection from outsiders and even the cloud server. However, many activities on encrypted information, such as searching, are difficult to conduct. Searchable encryption has emerged to solve this issue. It is much less effective to search for encryption in multi-user environment than in single-user environment. As a foundation of attribute-based encryption to solve this issue a multi-user searchable system is suggested. Our system also keeps information safe in opposition to the cloud server in the cloud. It enables users with suitable permissions to conduct encrypted information search activities. Furthermore, customers generate search tokens instead of information holders. We demonstrate that in our system, token privacy and index privacy are all around ensured. No helpful data about search tokens and ciphertexts can be obtained from the cloud server and illegal users. Our scheme’s ciphertexts are constant in size, reducing our scheme’s time-complexity and bandwidth overhead.
Keywords: Token privacy , Index privacy, Cloud Computing, Encryption and Decryption.
Scope of the Article: Cloud Computing