'Searchable encryption' presentation slideshows

Searchable encryption - PowerPoint PPT Presentation



A Survey on Web Based Application of Secure Online Voting System

A Survey on Web Based Application of Secure Online Voting System

Data Mining is an analysis tool which is used to extract various knowledge from the vast amount of data with security for the effective decision making. Online voting system uses data mining technique, to increase transparency at the highest level and to increase operational effectiveness to minimize piracy of data and also to have faster access for effective decision making with secure data. Since some years ago, different methods, such as the punch card systems or the secret ballot method have been held to carry on electoral processes, where people have to visit the booth to cast their votes in the existing system. Since then fast evolution of Information Technology, voting systems have emerged, which allow a voter to be part of an automated process that can only be possible through Voting Systems. The proposed system is online and hence even people who live out of their home town can also vote. Increasing the voting percentage is the major goal. The main objective of proposed system is to provide, a quick and efficient retrieval of information. Shanthi S | Ilakkiyavani R | Amsaveni P "A Survey on Web Based Application of Secure Online Voting System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: https://www.ijtsrd.com/papers/ijtsrd11483.pdf Paper URL: http://www.ijtsrd.com/engineering/computer-engineering/11483/a-survey-on-web-based-application-of-secure-online-voting-system/shanthi-s

84 views • 6 slides


Secure and Effectual Cloud Data Deduplication Verification

Secure and Effectual Cloud Data Deduplication Verification

Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy preserving manner. However, in practice, the returned query results may be incorrect or incomplete in the dishonest cloud environment. For example, the cloud server may intentionally omit some qualified results to save computational resources and communication overhead. Thus, a well functioning secure query system should provide a query results verification mechanism that allows the data user to verify results. In this paper, we design a secure, easily integrated, and fine grained query results verification mechanism, by which, given an encrypted query results set, the query user not only can verify the correctness of each data file in the set but also can further check how many or which qualified data files are not returned if the set is incomplete before decryption. The verification scheme is loose coupling to concrete secure search techniques and can be very easily integrated into any secure query scheme. We achieve the goal by constructing secure verification object for encrypted cloud data. Furthermore, a short signature technique with extremely small storage cost is proposed to guarantee the authenticity of verification object and a verification object request technique is presented to allow the query user to securely obtain the desired verification object. Performance evaluation shows that the proposed schemes are practical and efficient. Lingeshwaran. B | Tamilselvan. V | Vigneshwaran. V "Secure and Effectual Cloud Data Deduplication Verification" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: https://www.ijtsrd.com/papers/ijtsrd11501.pdf Paper URL: http://www.ijtsrd.com/computer-science/data-processing/11501/secure-and-effectual-cloud-data-deduplication-verification/lingeshwaran-b

82 views • 6 slides


View Searchable encryption PowerPoint (PPT) presentations online in SlideServe. SlideServe has a very huge collection of Searchable encryption PowerPoint presentations. You can view or download Searchable encryption presentations for your school assignment or business presentation. Browse for the presentations on every topic that you want.