UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 8 Issue 8
August-2021
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2108391


Registration ID:
314194

Page Number

d158-d165

Share This Article


Jetir RMS

Title

Secure and Efficient Product Information Retrieval In Cloud Computing

Abstract

The Publish and Subscribe (pub/sub) framework is a set up worldview to scatter the information from distributers to supporters in an inexactly coupled way utilizing an organization of devoted representatives. Be that as it may, touchy information could be presented to vindictive elements if specialists get bargained or hacked; or far more terrible, if intermediaries themselves are interested to find out about the information. A reasonable component to ensure touchy distributions and memberships is to encode the information before it is dispersed through the merchants. Cutting edge approaches permit dealers to perform encoded coordinating without uncovering distributions and memberships. Nonetheless, if malignant representatives plot with pernicious endorsers or distributers, they can get familiar with the interests of blameless supporters, in any event, when the interests are scrambled. In this article, we present a bar/sub framework that guarantees privacy of distributions and memberships within the sight of untrusted merchants. Moreover, our answer opposes conspiracy assaults between untrusted dealers and malignant supporters (or distributers). At long last, guarantee the security of distributions and memberships. To shield touchy data from untrusted agents[16], a few works propose to scramble the distributions and memberships so that the specialists can in any case coordinate [17]with the memberships against the distributions' labels without learning their substance. Accordingly, memberships and distributions are shielded from representatives. Nonetheless, it is as yet conceivable for malicious merchants to intrigue with endorsers and distributers[18]. In particular, a vindictive endorser could intrigue with an intermediary by unveiling the substance of her memberships. Thusly, regardless of whether the membership from a guiltless supporter is scrambled[19], the representative can in any case induce the substance by checking if the memberships from both an honest endorser and a malevolent endorser match a similar distribution labels[20]. Moreover, a pernicious distributer could mount an information infusion assault, i.e., distribute a phony distribution to gain proficiency with supporters' inclinations. In particular, a pernicious distributer can intrigue with a specialist to uncover the interests coordinating with the phony distribution. In this manner, to successfully guarantee the protection of memberships, it is likewise important to oppose plot assaults between agents, distributers, and supporters. The strategy against conniving supporters and merchants was first concentrated by Raoet al. Lamentably, there is little work done on arrangement assaults with regards to get bar/sub frameworks.

Key Words

security, Efficient product search, cloud computing, information search, unique key

Cite This Article

"Secure and Efficient Product Information Retrieval In Cloud Computing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.8, Issue 8, page no.d158-d165, August-2021, Available :http://www.jetir.org/papers/JETIR2108391.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Secure and Efficient Product Information Retrieval In Cloud Computing", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.8, Issue 8, page no. ppd158-d165, August-2021, Available at : http://www.jetir.org/papers/JETIR2108391.pdf

Publication Details

Published Paper ID: JETIR2108391
Registration ID: 314194
Published In: Volume 8 | Issue 8 | Year August-2021
DOI (Digital Object Identifier):
Page No: d158-d165
Country: West Godavari , Andhra Pradesh, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000471

Print This Page

Current Call For Paper

Jetir RMS