Main Reference PaperAttribute-Based Keyword Search over Hierarchical Data in Cloud Computing, IEEE Transactions on Services Computing, 2018[Java].
  • We propose a versatile Search Encryption scheme over hierarchical data to efficiently share and search encrypted data by leveraging the Ciphertext Policy-attribute based encryption technique. Then, two improved schemes, which support multi-keyword search and user revocation respectively, are presented in order to gain extensive applications in practice. We assure that our schemes are secure against the CPA and CKA in random oracle model.

Description
  • We propose a versatile Search Encryption scheme over hierarchical data to efficiently share and search encrypted data by leveraging the Ciphertext Policy-attribute based encryption technique. Then, two improved schemes, which support multi-keyword search and user revocation respectively, are presented in order to gain extensive applications in practice. We assure that our schemes are secure against the CPA and CKA in random oracle model.

  • To allow users to perform search queries over encrypted data and provide security against attacks.

Aim & Objectives
  • To allow users to perform search queries over encrypted data and provide security against attacks.

  • The keyword and range searches are taking into focus.

Contribution
  • The keyword and range searches are taking into focus.

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit