Mining Online Product Evaluation System based on Ratings and Review

YEAR : 2022


In proxy re-encryption schemes, users delegate their encrypted files to other users by using re-encryption keys, which elegantly transfers the users’ burden to the cloud servers. Moreover, one can adopt conditional proxy re-encryption schemes to employ their access control policy on the files to be shared. However, we recognize that the size of re-encryption keys will grow linearly with the number of the condition values, which may be impractical in low computational devices. data security has become a critical issue in various kinds of applications. Users may prefer storing their files in an encrypted manner and delegating decryption rights efficiently. In order to protect the files stored in the clouds, the owners can encrypt the files by using their keys before uploading the files to the clouds. Still, a user needs to be online to share her encrypted files because she needs to send her keys to her friends. It is extremely inefficient because of the heavy overhead on the user. Fortunately, proxy re-encryption schemes, enable users to share their encrypted files with other users by using re-encryption keys.



System : Intel i3 and above
Hard Disk : 40GB
RAM : Minimum 4GB
Processer : 64-bit, four-core, 2.5 GHz minimum per core


Front End Language : HTML, CSS, JAVA, JSP SERVELTS
Backend : My SQL
Operating System : Windows 10 or 11


There are no reviews yet.

Be the first to review “Mining Online Product Evaluation System based on Ratings and Review”

Your email address will not be published. Required fields are marked *

Product Enquiry