EFFECTIVE SECURE SEARCH AND INTENSIVE QUERY RESULT VERIFICATION

Authors

  • Chithra K
  • Gokulpriya
  • Mounica
  • Santhiya
  • Nisha

Keywords:

AES, data owner

Abstract

More and more individuals are starting to save their data on the cloud as cloud computing becomes more commonplace. Easy accessibility, lower costs, rapid deployment, and adaptable resource management are just a few of the many advantages of cloud computing. The cloud enables businesses of all sizes to work together more creatively. While there are many advantages to using cloud computing, some people and businesses are wary of it due to privacy issues. Users are hesitant to save private information on the cloud, such as photographs, medical records, and trade secrets. Because losing control of sensitive data is a real possibility once it has been uploaded to the cloud.

References

“ASPA, The state of counterfeiting in india 2021, https : / / www.aspaglobal.com / pre_upload / nation / 1623216858-

baa0efdb83aba174859af0a3a6a5- Report % 20The % 20State % 20of % 20Counterfeiting % 20in % 20India % 202021.pdf (2021)

Y. Lu, Journal of Management Analytics 5, 1 (2018)

F. Casino, T.K. Dasaklis, C. Patsakis, Telematics Informatics 36, 55 (2019) [4] M. Peck, IEEE Spectrum 54, 26 (2017)

S. Idrees, M. Nowostawski, R. Jameel, A. Mourya, Electronics 10, 951 (2021)

Zignuts Technolab, How blockchain architecture works? basic understanding of blockchain and its architecture., https : / / www.zignuts.com / blogs/how blockchain- architecture- works basic understanding- of- blockchain- and its- architecture/ (2022)

J. Ma, S.Y. Lin, X. Chen, H.M. Sun, Y.C. Chen, H. Wang, IEEE Access 8, 77642 (2020)

M.J.L.M.J.M. Bohli, N. Gruschka, IEEE 10, 9 (2013)

C. Shaik, Computer Science & Engineering: An International Journal (CSEIJ) 11 (2021)

M.A. Benatia, D. Baudry, A. Louis, Journal of Ambient Intelligence and Humanized Computing pp. 1–10 (2020)

G. Khalil, R. Doss, M. Chowdhury, IEEE Access 8, 47952 (2020)

M.A. Habib, M.B. Sardar, S. Jabbar, C.N. Faisal, N. Mahmood, M. Ahmad, Blockchain-based supply chain for the automation of transaction process: Case study based validation, in 2020 International Conference on Engineering and Emerging Technologies (ICEET) (IEEE, 2020), pp. 1–7

E. Daoud, D. Vu, H. Nguyen, M. Gaedke, Improving Fake Product

Detection Using Ai-Based Technology, in 18th International Conference e-Society (2020)

Downloads

Published

2023-06-30

How to Cite

Chithra K, Gokulpriya, G., Mounica, Santhiya, & Nisha. (2023). EFFECTIVE SECURE SEARCH AND INTENSIVE QUERY RESULT VERIFICATION. Universal Research Reports, 10(2), 76–83. Retrieved from https://urr.shodhsagar.com/index.php/j/article/view/1098

Issue

Section

Original Research Article