Survey Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
Volume: 10 - Issue: 03 - Date: 01-03-2021
Approved ISSN: 2278-1412
Published Id: IJAECESTU269 | Page No.: 107-110
Author: Neha Mishra
Co- Author: Rakesh Kumar Lodhi
Abstract:-Cloud computing could be a revolutionary mechanism that ever-changing way to enterprise hardware and softwaresystem style and procurements. Key encryption is initial topology to classify multiple user and provide security. SearchableEncryption (SE) schemes provide security and privacy to the cloud data. The existing SE approaches enable multiple users toperform search operation Cloud information's are keeping and accessed during a remote server with the help of services providedby cloud service suppliers. Providing security could be a major concern because the information is transmitted to the remoteserver over a channel (internet). Before implementing Cloud computing in a company, security challenges has to be addressedinitial. This study identifies the problems associated with the cloud information storage.
Key Words:-Content based image retrieval, Joint equal contribution, low level features, High level features, Colorhistogram
Area:-Engineering
Download Paper:
Preview This Article