{"title":"采用Paillier加密算法的安全验证项请求技术","authors":"L. Priyanka, P. Vijay Kumar, K. Jyothsna Reddy","doi":"10.1109/ICESE46178.2019.9194691","DOIUrl":null,"url":null,"abstract":"A defended exploration strategies over encrypted cloud statistics permit an authorized consumer to query records files of interest with the aid of using filing encrypted query key phrases to the cloud server in a privateness-retaining manner. However, in exercise, the lower again query effects can also moreover furthermore be incorrect or incomplete inside the dishonest cloud environment. For instance, the cloud server also can intentionally miss a few certified consequences to computing sources and conversation overhead. Thus, a first-class-functional defended query framework want to provide a question results verification mechanism that lets in the statistics user to confirm consequences. On this paper, we construct a included, successfully unified, and notable-grained query effects authentication framework, by means of which, given an encrypted query outcomes set, the query character not most effective can affirm the correctness of every information document inside the set however can also similarly take a look at how many or which certified records documents aren't rebound if the set is incomplete earlier than decryption. The verification scheme is unfastened-coupling to concrete at ease are attempting to find techniques and may be very consequences easily included into any relaxed query scheme. We obtain the intention thru building defended verification item for encrypted cloud facts. Furthermore, a quick signature technique with extensively small garage charge is planned to guarantee the authenticity of verification object and a verification item request technique is offered to allow the question consumer to securely achive the favored verification item performance evaluation shows that the planned schemes are feasible and adequate.","PeriodicalId":137459,"journal":{"name":"2019 International Conference on Emerging Trends in Science and Engineering (ICESE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Secure Verification Item Requesting Technique by way of Adopting Paillier Encryption Algorithm\",\"authors\":\"L. Priyanka, P. Vijay Kumar, K. Jyothsna Reddy\",\"doi\":\"10.1109/ICESE46178.2019.9194691\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A defended exploration strategies over encrypted cloud statistics permit an authorized consumer to query records files of interest with the aid of using filing encrypted query key phrases to the cloud server in a privateness-retaining manner. However, in exercise, the lower again query effects can also moreover furthermore be incorrect or incomplete inside the dishonest cloud environment. For instance, the cloud server also can intentionally miss a few certified consequences to computing sources and conversation overhead. Thus, a first-class-functional defended query framework want to provide a question results verification mechanism that lets in the statistics user to confirm consequences. On this paper, we construct a included, successfully unified, and notable-grained query effects authentication framework, by means of which, given an encrypted query outcomes set, the query character not most effective can affirm the correctness of every information document inside the set however can also similarly take a look at how many or which certified records documents aren't rebound if the set is incomplete earlier than decryption. The verification scheme is unfastened-coupling to concrete at ease are attempting to find techniques and may be very consequences easily included into any relaxed query scheme. We obtain the intention thru building defended verification item for encrypted cloud facts. Furthermore, a quick signature technique with extensively small garage charge is planned to guarantee the authenticity of verification object and a verification item request technique is offered to allow the question consumer to securely achive the favored verification item performance evaluation shows that the planned schemes are feasible and adequate.\",\"PeriodicalId\":137459,\"journal\":{\"name\":\"2019 International Conference on Emerging Trends in Science and Engineering (ICESE)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Emerging Trends in Science and Engineering (ICESE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICESE46178.2019.9194691\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Emerging Trends in Science and Engineering (ICESE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICESE46178.2019.9194691","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secure Verification Item Requesting Technique by way of Adopting Paillier Encryption Algorithm
A defended exploration strategies over encrypted cloud statistics permit an authorized consumer to query records files of interest with the aid of using filing encrypted query key phrases to the cloud server in a privateness-retaining manner. However, in exercise, the lower again query effects can also moreover furthermore be incorrect or incomplete inside the dishonest cloud environment. For instance, the cloud server also can intentionally miss a few certified consequences to computing sources and conversation overhead. Thus, a first-class-functional defended query framework want to provide a question results verification mechanism that lets in the statistics user to confirm consequences. On this paper, we construct a included, successfully unified, and notable-grained query effects authentication framework, by means of which, given an encrypted query outcomes set, the query character not most effective can affirm the correctness of every information document inside the set however can also similarly take a look at how many or which certified records documents aren't rebound if the set is incomplete earlier than decryption. The verification scheme is unfastened-coupling to concrete at ease are attempting to find techniques and may be very consequences easily included into any relaxed query scheme. We obtain the intention thru building defended verification item for encrypted cloud facts. Furthermore, a quick signature technique with extensively small garage charge is planned to guarantee the authenticity of verification object and a verification item request technique is offered to allow the question consumer to securely achive the favored verification item performance evaluation shows that the planned schemes are feasible and adequate.