BRINTHA.K
BRINTHA.K
BRINTHA.K
PRESENTED BY GUIDED BY
K.BRINTHA PROF.A.Sharfudeen,AP/MCA
813521622008
ABSTRACT
• The first scheme, which adopts the Message Authentication Code (MAC)
to verify the search results, works fine with static cloud data .
• If the cloud server returns a result including a pair of non-updated file and
MAC, it can pass the verification.
DISADVANTAGES
Level 0
Level 1
Level 2
Use Case Diagram
MODULES
1. PHR
2. Service provider
3. Java
Modules 1 - PHR
HARDWARE REQUIREMENTS:
Operating system : Windows 10
Coding Language : JAVA
Tool : APACHE TOMCAT
Database : SQLSERVER
SOFTWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Monitor : 15 VGA Colour.
Mouse : Logitech.
Ram : 4GB
Screenshots
FUTURE ENHANCEMENT
• The proposed work ensures the secure multi-keyword search and CP-ABE
data retrieval over encrypted cloud data. Multikeyword Ranked Search
over Encrypted in a symmetric scheme.
• Secondly, symmetric CP-ABE schemes usually assume that all the data
users are trustworthy.
THANK YOU