Internati
o
nal
Journal of Ele
c
trical
and Computer
Engineering
(IJE
CE)
V
o
l.
6, N
o
. 4
,
A
ugu
st
2016
, pp
. 17
92
~
1
799
I
S
SN
: 208
8-8
7
0
8
,
D
O
I
:
10.115
91
/ij
ece.v6
i
4.9
916
1
792
Jo
urn
a
l
h
o
me
pa
ge
: h
ttp
://iaesjo
u
r
na
l.com/
o
n
lin
e/ind
e
x.ph
p
/
IJECE
A Novel Loom
f
o
r Al
acrit
y
of P
r
ot
ect
ed L
a
wsuit Dealings Using
Cloud Computing Environment
B
.
V.
Sub
ba
R
a
o
,
J.
R
a
je
ndr
a Pr
as
ad,
D
.
Ka
vi
th
a,
J
.
Si
ri
sha,
K.
Sw
a
r
oo
pa
R
a
ni
Dept of
IT, PVP Siddhartha Institute
of
Technolo
g
y
, Vijay
a
wad
a
,
A.P, India
Article Info
A
B
STRAC
T
Article histo
r
y:
Received
Ja
n 13, 2016
Rev
i
sed
Ap
r
11
, 20
16
Accepted Apr 25, 2016
This
paper s
u
g
g
es
t a well-o
r
g
a
niz
e
d inform
ati
on s
y
s
t
em
for faci
lit
ate
the
litig
ation pro
ced
ures Inform
ation
Sy
st
em
courts.
The purpose is t
o
decre
a
se
the dur
ation
of
processing cases in
courts
.
The
a
s
piration
is to
sa
ve th
e t
i
m
e
and effor
t
of
jud
g
es and law
y
er
.
In a
ddition, we
make use of
the
advantages
of electronic s
y
s
t
ems and reducing traffi
c especially
in dev
e
loped countries
.
Advanced
Encr
yption Stand
a
rd is
used to
encr
yp
t all the
m
a
n
i
pula
t
ed
dat
a
for
each
c
a
s
e
. Al
l
read do
cum
e
nt
are
encr
yp
ted
t
o
att
a
in
s
ecur
e
inform
ation
s
y
stem
Li
tiga
tio
n process.
This
is bec
a
use th
e b
i
g dat
a
for
al
l c
a
ses will b
e
stored
on cloud
environment.
Keyword:
Ad
va
nced
enc
r
y
p
t
i
on st
an
dar
d
B
i
g dat
a
C
l
ou
d e
nvi
r
o
n
m
ent
Litig
atio
n
Copyright ©
201
6 Institut
e
o
f
Ad
vanced
Engin
eer
ing and S
c
i
e
nce.
All rights re
se
rve
d
.
Co
rresp
ond
i
ng
Autho
r
:
B.V. Subb
a
Rao
,
Depa
rt
m
e
nt
of
In
fo
rm
at
i
on Te
chn
o
l
o
gy
,
PVP Siddh
art
h
a In
stitu
te of Tech
no
log
y
,
Kan
u
r
u
,
Vi
jay
a
wada
-
7
,
AP
, I
ndia.
Em
a
il: b
v
s
rau@g
m
ail.co
m
1.
INTRODUCTION
C
u
r
r
ant
ce
nt
u
r
y
has wi
t
n
esse
d m
a
ny
devel
o
pm
ent
s
i
n
t
h
e
fi
el
d o
f
sec
u
ri
t
y
and
safet
y
o
f
bi
g
dat
a
i
n
the cloud. Bec
a
use
of the
significan
t
p
r
og
ress th
at th
e whole world h
a
s witn
essed
and
ap
p
e
ared
as
revo
lu
tion
of i
n
f
o
rm
at
i
on
and
com
m
uni
cat
i
on, i
t
has r
e
f
l
ect
ed o
n
al
l
as
pects of life, a
n
d crysta
llized in the em
erge
nce
of
e-co
mm
erce, e-gov
ern
m
en
t an
d
o
t
h
e
r
areas. Th
erefore,
o
r
d
i
n
a
ry litig
ati
o
n
with its traditio
n
a
l con
cep
t
an
d
pape
r
pr
oce
d
u
r
es ha
s bec
o
m
e
un
abl
e
t
o
m
eet
t
h
e chal
l
e
n
g
es
of t
h
e era
t
h
at
cal
l
i
ng a
n
ur
ge
nt
nee
d
f
o
r t
h
e
ex
isten
c
e of an
electron
i
c sy
ste
m
to
facilitate th
e litig
a
tio
n
pro
c
edu
r
es [1
] .Th
e
id
ea o
f
electron
i
c
liti
g
a
tio
n
m
eans m
ovem
e
nt
fr
om
t
h
e t
r
adi
t
i
onal
m
e
t
hod
of
pa
per t
o
el
ect
roni
c
fo
r
m
, and t
h
e rest
ruct
uri
n
g
of t
h
e way
of
d
ealin
g with
lawsu
its i
n
th
e
jud
i
ciary ann
e
x
.
It is an
effective and
ex
cellen
t
m
ean
in
ach
iev
i
ng
p
o
s
itiv
e
resu
lts
in term
s
of cos
ting and secure
the existence of the c
ourt at
any tim
e
and every
w
he
r
e
[2
]. Mo
r
e
ov
er, ado
p
t
i
on
o
f
electron
i
c li
tig
atio
n
sav
e
s ti
m
e
an
d
efforts and
red
u
c
e
costs, in add
itio
n of
o
f
feri
n
g
m
a
n
y
o
t
h
e
r ad
v
a
ntag
es
[3
]
.Th
e
pro
posed
app
r
o
a
ch
(d
esign
a system
to
facilita
te th
e litig
atio
n) i
s
a techn
i
cal i
n
fo
rm
atio
n
a
l syste
m
allo
ws th
e liti
g
a
tio
n
p
a
rties to
su
b
m
it
th
eir lawsu
its to
co
m
p
eten
t co
u
r
t in
electro
n
i
c man
n
e
r, d
e
po
sit th
eir
ev
id
en
ces and
d
o
c
u
m
en
ts electron
i
cally in
prep
aratio
n to get to
th
e
sen
t
encin
g
and
th
en im
p
l
e
m
en
t it.
Th
is syste
m
a
l
so
facilitates
j
udg
es wo
rk
an
d
redu
ces their effo
rts b
y
en
ab
ling
th
em
to
d
i
rectly
litig
atio
n
b
y
this system.Also, it can
n
o
t
b
e
o
v
e
rlook
ed
th
e great im
p
o
r
tan
ce
of t
h
is
p
r
og
ram
in
st
o
r
i
n
g
t
h
e
cou
r
t
dat
a
a
n
d
pr
ot
ect
t
h
em
fr
om
l
o
ss,
m
a
ni
p
u
l
a
t
i
on
or
dam
a
ge, t
h
r
o
ug
h e
n
cry
p
t
e
d
,
t
h
r
o
u
g
h
co
n
v
ert
i
n
g
written words
or
doc
um
ents t
o
num
b
ers or sym
bols that
cannot be
decode
d - accessi
ng t
o
data or information
to
fo
rei
g
n p
a
rties – un
less t
h
ey h
a
v
e
th
e
su
it
ab
le p
a
ssword
[4
].
Perhaps t
h
e numerous
progressions i
n
the fi
eld of i
n
form
at
ion techno
logy in recent
industry, which
can
b
e
ex
actly id
en
tified
in th
e six
ties o
f
th
e last cen
tu
ry, is th
e em
erg
e
n
ce
o
f
clou
d
co
m
p
u
tin
g. Th
i
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
A N
o
vel
L
o
om
f
o
r Al
ac
ri
t
y
of
Prot
ect
ed
Law
s
ui
t
De
al
i
n
g
U
s
i
n
g
C
l
ou
d C
o
mp
ut
i
n
g .
...
(
B
.
V.
S
u
b
b
a
R
ao)
1
793
tech
no
log
y
lead
s to sim
p
lifyi
n
g
of th
e flow
o
f
cl
o
u
d
operatio
n
s
, wh
ich
will
en
ab
le th
e
u
s
er
t
o
elimin
ate
t
e
di
ou
s a
d
m
i
nist
rat
i
v
e t
a
sks
t
h
at
m
i
ght
hi
n
d
e
r
hi
m
duri
n
g t
h
e ac
hi
evem
ent
of
m
o
re i
m
port
a
nt
goal
s
.
1.
1.
Litiga
tion
Pro
cess
Wh
en
a p
e
rson
starts a civ
i
l
lawsu
it, th
e person
evo
l
v
e
s
in
to
a p
r
o
cess
called
lit
ig
atio
n
.
Und
e
r th
e
d
i
fferen
t
ru
les o
f
Civ
il Pro
c
ed
ure t
h
at gov
ern
actio
n
s
in
st
ate an
d fed
e
ral
cou
r
ts, litig
ati
o
n in
clud
es
a
series
o
f
step
s th
at may lead
to
a cou
r
t trial and
u
lti
m
a
tel
y
a reso
l
u
tio
n of t
h
e m
a
tter [5
].
The i
n
t
e
grat
i
o
n
of
j
u
st
i
ce, I
n
fo
rm
ati
on an
d C
o
m
m
uni
cat
i
ons Tech
n
o
l
o
gy
i
s
n
o
w a
ne
w
w
a
y
t
o
be
n
o
t
o
n
l
y in
term
s
o
f
fun
c
tion
a
lity an
d
co
st m
a
n
a
g
e
m
e
n
t
, bu
t also
to
adj
u
st th
e qu
ality stan
d
a
rd
s; it is sh
own
th
e
p
r
o
c
ed
ure
o
f
civ
il tele
m
a
tics in
its arch
itect
u
r
e, in
its
dra
f
t
im
pl
em
ent
a
t
i
on
an
d a
dva
nt
ages a
r
i
s
i
n
g
f
r
o
m
its
act
ual
use
[
6
]
.
The operati
o
n of a legal syste
m
may affect
m
a
ny
b
r
an
ch
es of d
e
v
e
lop
m
en
t: eq
u
ity, th
e o
p
tim
a
l
Allo
catio
n
o
f
resou
r
ces, an
d th
e in
crease
in
t
o
tal factor
p
r
od
u
c
tiv
ity. M
o
reo
v
e
r, th
e
ro
le
o
f
th
e
ju
d
i
cial
syste
m
in
m
easu
r
in
g its d
y
sfun
ction
s
can a
ffect ec
onom
i
c growth.
For
e
x
am
pl
e, whe
n
t
h
e i
nve
st
i
g
at
i
on
o
f
m
oney
l
a
u
nde
ri
ng
cases
, i
t
i
s
k
n
o
w
n t
h
at
b
a
nki
ng
a
n
d
fin
a
n
c
ial in
stit
u
tio
ns activ
ities are carried
ou
t th
ro
ugh
com
p
u
t
ers d
e
v
i
ces wh
ere all d
a
ily tran
sactio
n
s
are
save
d, w
h
e
n
p
ubl
i
c
p
r
osecut
i
ons
o
r
de
red
u
n
l
oadi
n
g
t
h
e c
o
nt
ent
s
o
f
t
h
ese
dat
a
. T
hus
, we
can i
m
agi
n
e the vas
t
am
ount
o
f
d
o
c
u
m
e
nt
s,
evi
d
e
n
ce
an
d dat
a
pa
pers
, whi
c
h wi
l
l
con
n
ect
wi
t
h
case bi
n
d
er
s
i
n
acc
or
da
nce wi
t
h
t
h
e
t
r
adi
t
i
onal
sy
st
em
. Howe
ve
r,
em
pl
oy
i
ng
of
ou
r p
r
o
p
o
sal
s
y
st
em
wi
ll
perm
i
t
downl
oadi
ng a
nd sa
vi
n
g
i
n
an
electro
n
i
c syst
e
m
th
rou
g
h
which
all b
i
g
d
a
ta in
b
i
nd
ers of
l
a
wsu
it
will b
e
an
alyzed
an
d
classified
easily. Th
is
will h
e
lp jud
g
es in
d
ealing
with
the
h
u
g
e
in
fo
rm
atio
n
attach
ed in th
e cases easily.
In add
itio
n, it wi
ll h
e
l
p
othe
r parties in the lawsuit to access and view these la
rge data, thus the proposal
syste
m
will save time,
effo
rts and
co
sts. In
add
ition
to
th
e era crimes, esp
eci
ally t
e
rro
r
ist crim
es
th
at co
n
t
ain
hu
g
e
an
d
nu
m
e
rous
evi
d
e
n
ces t
o
t
h
e e
x
t
e
nt
m
a
ke t
h
ei
r i
n
ve
nt
ory
i
n
g
m
a
y
be di
f
f
i
c
ul
t
t
o
l
i
nk t
h
em
on p
a
per
,
beca
use
of t
h
e
geographical a
r
ea to c
o
mmit the c
r
im
e on the
one
ha
nd
, and
t
h
e m
u
lti
p
licity o
f
t
h
e
p
e
rp
etrators and
the
di
ve
rsi
t
y
of
i
t
s
m
eans o
n
t
h
e ot
he
r
ha
nd
,
whi
c
h m
a
kes
deal
i
n
g
wi
t
h
t
h
e l
a
r
g
e
n
u
m
b
er
of
evi
d
ence
an
d
in
fo
rm
atio
n
Crim
e
Acco
rd
ing
to
th
e p
a
per-b
a
sed
system
,
is v
e
ry d
i
fficu
lt. No
t to
m
e
n
tio
n
th
e IT crim
es
wh
ich
h
a
s sp
read
d
r
am
atical
ly in
th
e presen
t d
a
y as a resu
lt o
f
techn
o
l
og
ical d
e
v
e
lopmen
t, wh
ich
calls fo
r
co
nsid
eri
n
g the larg
e of t
h
e
data, wh
ich is i
m
p
o
r
tan
t
ev
i
d
en
ce
o
f
th
e lawsu
it, wh
et
h
e
r it
was ci
v
il or crimin
al.
We can
n
o
t
forg
et th
at i
n
tern
atio
n
a
l crim
es
as a crim
e of
ge
noci
d
e that
are
too
big data
.
It can
b
e
co
n
c
l
u
d
e
d
th
e ab
ility o
f
ou
r
p
r
op
osed
system
in
ach
iev
i
ng
th
e
h
i
gh
est lev
e
l of ju
stice for
litig
an
ts. Sin
c
e, it facilitate t
h
e jud
g
e
s to
ad
op
ting
and
co
n
s
id
er all th
e ev
id
en
ces in
t
h
e lawsu
its wh
ich
h
e
l
p
to
ach
iev
i
ng
j
u
stice, un
lik
e the trad
ition
a
l syste
m
, wh
ic
h
relies larg
e
p
a
p
e
r d
a
ta t
h
at cann
o
t
b
e
ex
am
in
ed
by
th
e jud
g
e
and th
u
s
j
u
stice
will no
t b
e
ach
iev
e
d
.
1.
2.
Clou
d Com
p
u
t
ing
Envir
o
n
ment
The c
o
ncept
o
f
"cl
o
u
d
c
o
m
put
i
ng"
,
or
com
put
e
r
se
rv
ices
with
in in
tern
et n
e
twork, m
ean
s a set
o
f
t
a
sks rel
a
t
e
d t
o
a set
of c
o
m
m
uni
cat
i
ons
and s
o
ft
ware
t
h
at
em
pl
oy
i
ng t
h
e soft
ware
and
har
d
ware
devi
ces
connected to
network serve
r
s wh
ich
are load
ed
with
th
eir d
a
ta in
a v
i
rtu
a
l clo
u
d
,aimin
g
to
gu
aran
t
eein
g
cont
i
n
u
o
u
s
c
o
nt
act
wi
t
h
out
i
n
t
e
rr
upt
i
o
n
.
T
h
i
s
t
ech
n
o
l
o
gi
cal
bo
om
has
cause
d a
bi
g
shi
f
t
i
n
i
d
ea
s an
d
ap
p
lication
s
related
to
i
n
fo
rm
atio
n
tech
no
log
y
serv
ices,
esp
ecially with
reg
a
rd
t
o
th
e infrastru
cture so
l
u
tio
ns
o
n
wh
ich
th
e co
m
p
an
ies an
d
i
n
stitu
tio
n
s
d
e
pen
d
in
t
h
eir com
p
le
tio
n
and
facilitat
i
n
g
of activ
ities .W
e can
say
t
h
at
t
h
e ad
o
p
t
i
on
o
f
cl
o
ud
c
o
m
put
i
ng t
e
c
h
nol
ogi
es i
s
n
o
l
o
n
g
er a
n
o
p
t
i
on
fo
r
or
gani
zat
i
ons t
h
at
se
ek f
o
r
safety b
u
t
it can
b
e
con
s
id
ered
an
ob
lig
ato
r
y
issu
e in
its strateg
i
cally fate. Natio
n
a
l In
stitu
te o
f
Stand
a
rd
s and
Tech
nol
ogy
ha
s con
f
r
ont
e
d
t
o
det
e
rm
i
n
e t
h
e
m
eani
ng o
f
cl
o
ud c
o
m
put
i
ng,
t
h
i
s
conce
p
t
ha
s som
e
si
gni
fi
c
a
nce
in
ligh
t
of t
h
e
p
r
ev
ailin
g b
e
li
ef is stan
d
a
rd
an
d relying
u
p
o
n
b
y
t
h
em
wh
en d
e
alin
g wi
th
cloud
co
m
p
u
tin
g,
t
h
at
pe
rcept
i
o
n
t
o
t
h
i
s
co
nce
p
t
has
ev
ol
ve
d al
on
g
passa
ge
o
f
t
i
m
e
.
The de
finition
of the Institute
as cloud com
puting is a
m
odel fo
r ena
b
ling a tim
e
ly and perm
anent
access to t
h
e network at a
n
y t
i
m
e
, for t
h
e
pa
rticipation
of a
wide
ra
nge
of com
puting services,
whic
h c
a
n
be
pu
bl
i
s
he
d a
n
d
m
a
de avai
l
a
bl
e
wi
t
h
m
i
nim
a
l
eff
o
rt
or
i
n
teractio
n
with
t
h
e serv
ice prov
ider.
By
the d
e
fi
n
ition
o
f
th
e
Natio
n
a
l
In
stitu
te sev
e
ral ch
aracteristics o
f
clo
u
d
com
p
u
tin
g
can
be ex
tracted
, that are rep
r
esented
b
y
th
e fo
llowing
self-serv
i
ce with
ou
t
sup
p
o
r
t
Easy access to
the net
w
ork
red
u
ci
n
g
of
co
st
s an
d
fl
exi
b
i
l
i
t
y
t
h
ro
ug
h t
h
e
po
ol
i
n
g
of
res
o
urces
Ab
ility to
use a qu
an
titativ
e measu
r
e
Alth
oug
h, all of co
m
p
u
tin
g
serv
ices such
as
softwa
re a
n
d servic
e platform
s and servic
e
infra
struct
ure
,
there is a list of secur
ity-related challenges
and sec
u
rity and
safety o
f
th
e
d
a
ta in
th
e clo
u
d
, we
will rev
i
ew
b
r
i
e
fly in
turn.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
I
J
ECE
Vo
l. 6
,
N
o
. 4
,
Au
gu
st 2
016
:
17
92
–
1
799
1
794
1.
3.
The big da
ta
in court:
Big data s
u
bje
c
t has
occupie
d
a
great
space
of atte
ntion because
of its im
por
tance effe
ct on societ
y
and
cy
ber
s
pac
e
. The
r
e a
r
e
n
u
m
e
rous c
o
nce
p
t
s
an
d
defi
ni
t
i
ons
t
o
w
h
at
i
s
cal
l
e
d "
b
i
g da
t
a
",
bu
t till n
o
w th
ere
i
s
no a
d
opt
i
o
n
of a s
p
eci
fi
c
de
fi
ni
t
i
on
o
r
co
n
cept
o
f
t
h
e m
eani
n
g o
f
bi
g
da
t
a
, fo
r e
x
am
pl
e,
W
i
ki
pe
di
a we
b si
t
e
d
e
fi
n
e
s it, as a b
r
o
a
d
term
fo
r d
a
ta sets with
h
u
g
e
size th
at th
e trad
ition
a
l data p
r
ocessing
ap
p
lication
s
can
n
o
t
process it. In approxim
a
te statistics about bi
g data, it
is found that daily out
put
of them
reache
d
1.7 m
illion
b
illio
n
b
y
tes per m
i
n
u
t
e, in
variou
s web
s
ites, p
a
rticu
l
arly
th
e e-m
a
il an
d
so
cial n
e
two
r
k
i
n
g
sites. Thro
ug
h
t
h
is
fi
g
u
re we ca
n i
m
agi
n
e t
h
e vas
t
am
ount
of
da
t
a
whi
c
h cal
l
s
fo
r ad
dressi
n
g
t
h
e pr
ocessi
ng
and
han
d
l
i
n
g t
h
em
.
we can see
k
the im
portance
of big
data from the a
nnounc
e
released by
Conf
ere
n
ce of
comm
unication and
i
n
f
o
rm
at
i
on t
e
chn
o
l
o
gy
hel
d
i
n
201
3, t
h
at
c
onsi
d
ere
d
bi
g dat
a
a hi
gh
-en
e
rgy
t
o
dri
v
e econ
o
m
i
c devel
opm
ent
th
ro
ugh
th
e creatio
n
o
f
real-ti
m
e an
d qu
ick in
fo
rm
atio
n
and
with
v
e
ry
little
co
st
co
m
p
ared
with
o
t
h
e
r
so
urces.
In
sp
ite of th
e
d
i
fficu
lty o
f
estab
lish
i
ng
a
u
n
ifo
r
m
d
e
fin
ition
fo
r b
i
g
data,
b
u
t
t
h
ere are certain
ch
aracteristics
that can
dia
g
nose wh
ich of th
ese d
a
ta.
The am
ou
nt
o
f
dat
a
:
n
u
m
e
rous
or
h
u
g
e a
m
ount
o
f
t
h
i
s
dat
a
i
s
t
h
e
m
o
st
prom
i
n
ent
feat
ure
f
o
r
t
h
ei
r
descri
ption. For exam
ple, ana
l
ysis of questionnai
r
e da
t
a
t
h
a
t
perf
o
r
m
e
d on
t
h
e ge
neral
po
pul
at
i
o
n gi
ves
a
m
o
re acceptabl
e res
u
lts tha
n
t
h
e a
n
alysis of
a
questionnai
r
e
with lim
ited num
ber as
100
persons.
Flex
ib
ility: b
i
g d
a
ta
g
i
v
e
th
e
in
stitu
tio
n
s
and
indu
strial enterp
rises
g
r
eat
er flex
ib
ility in
d
ealing
with th
e
eco
no
m
i
c reali
t
y an
d
n
eeds of th
e m
a
rk
et. Th
is d
a
ta will h
e
lp
th
em
in
d
ecisio
n
-
m
a
k
e
rs o
n
th
e sp
eed
in
m
a
ki
ng a
p
pr
o
p
r
i
a
t
e
deci
si
o
n
s.
Di
ve
rsi
t
y
:
The
di
ve
rsi
t
y
st
em
s fr
om
bei
n
g
di
s
p
erse
d
dat
a
a
n
d ca
nn
ot
be c
o
unt
e
d
i
n
a
gi
ve
n as
pect
, si
nce
i
t
i
n
cl
ude
s t
e
xt
s
,
ph
ot
o
g
r
ap
hs,
v
i
deos
, m
a
ps et
c...
We can
gr
o
p
e
t
h
e im
port
a
nce
of t
h
i
s
sy
st
em
whe
n
deal
i
ng
wi
t
h
bi
g dat
a
o
f
t
h
e co
urt
s
. We can
fi
n
d
that m
a
ny cases, particularly t
h
e c
r
iminal ones,
have
evi
d
ences
hi
dde
n i
n
si
de el
ect
r
oni
c
d
e
vi
ces.
1.
4.
T
h
e Pri
n
ci
pl
e
s
o
f
D
a
t
a
E
n
c
r
yp
ti
on
Al
gori
t
hm
Because
of the
de
fects a
n
d di
sadvanta
ges t
h
at acco
m
p
anied the
a
pplication
of t
h
e al
gorith
m
3DE
S
,
as it becam
e difficult to use
it the fu
ture.
In the
Nati
onal
Institute of
St
anda
rds a
n
d Technology
rec
e
ived
(NIST) receive
d ideas and proposals fo
r the
developm
ent
of enc
r
yption sta
nda
rd. In 2001, Institute was able
of
t
h
e a
d
opt
i
o
n
of
A
d
vance
d
Enc
r
y
p
t
i
o
n
St
anda
r
d
(
A
E
S
)
i
n
an
of
fi
ci
al
capaci
t
y
(F
IPS
19
7
)
. T
h
e
n
u
m
b
er
o
f
ad
v
a
n
c
ed
algorith
m
s
in
th
e in
stitu
te was 1
5
algo
rith
m
s
. On
ly fiv
e
alg
o
rith
m
s
h
a
v
e
b
e
en
selected
for
co
m
p
etitio
n
an
d
vo
ting
on
the
m
. Th
e fiv
e
alg
o
rith
m
s
are (TWOFISH), (MARS)
, (SERPENT), (RC
6
) and
(R
i
j
n
d
ael
)
.
B
y
t
h
e end o
f
t
h
e vot
e, t
h
e A
E
S al
go
ri
t
h
m
(R
i
j
n
d
ael
)
wo
n an
d has bee
n
ap
pr
ove
d an
d i
ssue
d
officially. Algorithm
(AE
S
)
also known
as
"Rijnd
ael", is
s
upe
rior
on C
o
m
p
aring t
o
its
pre
d
ecess
o
r
3DES in
term
s
o
f
its h
i
g
h
e
r security, an
d
b
e
tter in
p
e
rform
a
n
ce an
d
efficien
cy.
In
ad
d
ition
,
it ex
cels in
term
s
o
f
m
e
m
o
ry
requi
rem
e
nts, flexible soft
ware a
nd
har
d
ware
. Expe
rt
s ha
ve
concl
ude
d t
h
at
t
h
e sym
m
e
tri
c
key
en
cry
p
tio
n algo
rith
m
s
su
ch
as AES are
very resistan
t to
tim
e v
i
o
l
ati
o
n.It is wo
rt
h m
e
n
tio
n
i
n
g
th
at the
Natio
n
a
l In
stitu
te o
n
ado
p
ting
of th
is alg
o
rith
m h
a
s id
en
tified
its
m
a
ss sy
mme
tric av
erag
e with
b
l
o
c
k
len
g
t
h
eq
u
a
l t
o
1
2
8
-
bit, an
d
it is ab
l
e
to
su
ppo
rt
key len
g
t
h (1
28)
,
(
192
)
and
(25
6
)
b
its.(
A
E
S) w
a
s ab
le to
i
m
p
o
s
e
itself as a s
t
andard for enc
r
yption ar
ou
nd
th
e wo
r
l
d
b
ecau
s
e of
its g
o
od sp
ecifications
, especially
its lengt
h of
t
h
e encry
p
t
i
o
n st
anda
rd
, t
h
at
m
a
ki
ng i
t
use
d
i
n
a wi
de ra
ng
e of areas, p
a
rticu
l
arly in
the b
a
nk
ing
in
sti
t
u
tio
n
s
an
d
co
m
p
an
ies, as well as it is in
vo
lv
ed
in
t
o
th
e m
i
litary
u
s
es. Th
is
was
no
tab
l
e esp
ecially after we can
DES
en
cry
p
tio
n
vo
litio
n
in
2
008
after , th
at m
a
k
e
m
a
n
y
p
e
rso
n
s b
e
liev
e
th
at i
t
is n
o
t
safe, an
d
p
a
v
i
ng
th
e
way to
sprea
d
i
n
g
of t
h
e al
g
o
ri
t
h
m
(AES
), be
cause
of t
h
e s
p
eci
fi
cat
i
ons m
e
nt
i
oned a
b
ove
, es
peci
al
l
y
wi
t
h
regar
d
strongly sa
fety.
Alth
oug
h, it is co
mm
o
n
in the app
licatio
n th
at th
e algo
rit
h
m
is a on
e-way stan
d
a
rd
,
bu
t th
ere is no
co
n
c
l
u
siv
e
ev
id
en
ce t
h
at it
was on
e-way
en
cry
p
tio
n
functio
n
.
As fo
r t
h
e po
ssib
ility o
f
d
ecod
i
ng
al
g
o
rith
m
an
d im
p
e
n
e
trab
le it is b
e
liev
e
d
th
ey are
no
t to
d
o
so. Th
e
struct
ure
of
AES algorithm
is describe
d in Figure
1.
Fi
gu
re 1.
Dat
a
Encry
p
t
i
on/
De
cry
p
t
i
o
n
Da
ta
Reg
i
s
t
er F
i
l
e
FSM Co
ntrol
block
Key Regis
t
er
F
ile
Cipher
i
ng &
Decipher
i
n
g
block
Key E
x
p
a
nder
Block
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
A N
o
vel
L
o
om
f
o
r Al
ac
ri
t
y
of
Prot
ect
ed
Law
s
ui
t
De
al
i
n
g
U
s
i
n
g
C
l
ou
d C
o
mp
ut
i
n
g .
...
(
B
.
V.
S
u
b
b
a
R
ao)
1
795
2.
EX
P
E
R
I
M
E
NT
-
PR
O
P
OS
ED
SY
S
T
EM
Th
e app
licatio
n
o
f
t
h
is system
wh
ich
is d
e
sig
n
e
d
t
o
facilitate th
e litig
ati
o
n pro
c
edu
r
es
th
ro
ugh
the
use o
f
m
odern
sci
e
nt
i
f
i
c
dat
a
t
o
im
prove t
h
e perf
o
r
m
a
nce of t
h
e co
urt
s
,
and t
h
e ap
pl
i
cat
i
on o
f
el
ect
ro
ni
c
litig
atio
n
,
will facilitate lit
ig
atio
n
pro
c
edu
r
es, and
ach
i
eve t
h
e
fo
llowing
featu
r
es:
Spee
d and
ac
curacy for
litigants
a
n
d la
wyers.
Whe
r
e
shorte
n t
h
e
lawyer a
lot
of
unnecessary
adm
i
nistrative
revie
w
s of the
courts
and which could be in
his office access to the case file, and view it ,
stu
d
y
and
fo
llow-u
p
, lead
ing
to
th
e
up
grad
ing
o
f
its wo
rk
an
d im
p
r
o
v
e
its p
e
rform
a
n
ce .
Prev
en
t pro
l
o
n
g
th
e litig
atio
n
.
Th
is p
r
ev
en
ts th
e co
ur
t h
eari
n
g
d
e
layed
or d
e
ferred
,
an
d
facilitate
q
u
e
ryi
ng
j
u
d
i
cial transactio
n
s
, and
reliev
e
co
ng
estion
i
n
th
e c
ourts,
al
so reduces
the bicke
r
ing between
a
dve
rsa
r
ies,
especially in fa
mily cases.
It req
u
i
res th
e
u
s
e
o
f
th
is syst
e
m
to
prev
en
t
d
i
sto
r
tion
of
da
ta, speec
h, or i
n
crease
in
, or t
h
e sho
r
tag
e
of
it.
Reduce c
o
sts:
This system
cont
ributes to
reduce ex
pe
ns
es and c
o
sts,
and m
a
kes jus
tice accessible to
every
one
.
Th
e ap
p
lication
of th
is system lead
s to
th
e
redu
ctio
n
of time an
d
effort
for jud
g
e
s, lawyers, litig
an
ts
an
d
pu
bl
i
c
p
r
osecut
i
on.
Thi
s
sy
st
em
also co
nt
ri
b
u
t
e
s t
o
di
spe
n
se j
u
s
t
i
ce huge arc
h
i
v
e, an
d com
p
ensat
e
s fo
r t
h
e l
a
rge st
or
es t
h
at
occupy large
places, and this
li
mits th
e use of the suits have files, or
da
m
a
ge to, or save them
in the wrong
lo
catio
n
.
2.
1.
The Str
u
cture
of the pr
ojected System
for
data
manipul
ati
o
n in
courts
The
pr
o
pos
ed
sy
st
em
consi
s
t
s
o
f
t
h
e m
a
i
n
i
n
t
e
rface
t
h
at
c
ont
ai
n
s
t
w
o
pa
rt
s de
part
m
e
nt
A
d
m
i
n an
d
depa
rt
m
e
nt
us
er
Adm
i
n t
h
e
onl
y
one
t
h
at
encry
p
t
s
t
h
e
d
a
t
a
usi
n
g t
h
e e
n
cry
p
t
i
o
n
key
whi
c
h i
s
t
h
e
o
n
l
y
o
n
e
who
gives a
u
thorization for t
h
e user t
o
acces
s the data
a
nd
decry
p
tion
usi
ng t
h
e sam
e
key to the enc
r
yption i
n
i
t
where t
h
e A
d
m
i
n upl
oad
Dat
a
fo
r t
h
e j
ob a
nd t
h
e
n
e
n
cry
p
t
e
d usi
n
g
t
h
e encry
p
t
i
o
n key
an
d t
h
e
n
gi
ves
aut
h
ori
zat
i
o
n
f
o
r
t
h
e
use
r
a
u
t
h
o
r
i
zed
t
o
acc
ess t
h
e
dat
a
us
i
ng t
h
e sam
e
key
f
o
r
dec
r
y
p
t
i
on.
Th
us,
we
ha
v
e
pr
o
v
i
d
e
d
pr
ot
ect
i
on a
n
d
com
p
l
e
m
e
nt
ary
dat
a
n
o
t
ri
gge
d t
h
em
from
una
ut
ho
ri
zed
pe
rs
on
s as Fi
gu
re
2.
Is evi
d
ent from the chart above t
h
at Adm
i
n is
con
t
ro
lled in
form
atio
n
syste
m
to
th
e case p
e
nd
ing
before the c
o
urt , which alone gives validity and determ
in
es the type of this author
ity to each of
the (judge)
an
d
(p
lain
tiff's co
un
sel) and
(th
e
d
e
fend
an
t 's
lawyer)
and
(DPP) and
(p
lain
tiff) an
d (t
he
defe
n
d
ant
)
, an
d eac
h
one
of t
h
em
a
nd t
h
e validity of the
user int
e
rface th
rough which access
to inform
ation concerning hi
m .The
co
urt clerk
ro
l
e
in
th
e altern
ativ
e wou
l
d
test
th
e v
a
lid
ity o
f
in
pu
t b
e
fo
re sto
r
ing
th
em
in
th
e d
a
tab
a
se an
d
is
sho
w
n i
n
Fi
gu
r
e
3.
Fi
gu
re
2.
The
pr
o
pose
d
i
n
f
o
r
m
at
i
on sy
st
em
fo
r c
o
u
r
t
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
I
J
ECE
Vo
l. 6
,
N
o
. 4
,
Au
gu
st 2
016
:
17
92
–
1
799
1
796
Fig
u
re 3
.
Litigatio
n
p
r
o
c
ed
ures
C
ont
ai
ni
ng
bi
n
d
ers l
a
w
s
ui
t
o
n
m
a
ny
of t
h
e dat
a
, an
d t
h
i
s
dat
a
by
nat
u
re
i
s
not
at
t
h
e sam
e
l
e
vel
of
im
port
a
nce
an
d g
r
a
v
i
t
y
, an
d
can s
u
m
m
ari
z
e dat
a
t
h
at
m
u
st
be t
h
e
foc
u
s
of
pr
ot
ect
i
o
n p
r
oces
s ,
bot
h i
n
t
e
rm
s
o
f
its i
m
p
o
r
tance ,
o
r
in
term
s of co
nfid
en
tiality, as fo
llows:
A) Big im
p
o
r
tan
t
ev
i
d
en
ce:
an
d
it is
g
a
in
i
n
g
im
p
o
r
tan
c
e as th
e
b
a
sis fo
r t
h
e su
it, wit
h
ou
t lo
si
n
g
t
h
eir leg
a
l
pr
ocee
di
n
g
s a
n
d c
o
r
r
o
b
o
rat
i
o
n.
These
are
t
h
e dat
a
:
L
o
an
b
ond
s
,
che
c
k
Form
al and custom
ary editors
C
ont
ract
s
o
f
al
l
ki
n
d
s as
a c
o
nt
ract
of
sal
e
o
r
p
u
r
cha
s
e
or
m
a
nagem
e
nt
cont
ract
s re
pre
s
ent
a
t
i
ons
be
fo
r
e
th
e courts
Medical exam
ination res
u
lts
B) Co
nfid
en
tial d
a
ta: g
a
in
in
g
i
m
p
o
r
tance eith
er b
ecau
s
e
of pre
j
udi
ce
t
o
t
h
e rep
u
t
a
t
i
on
of t
h
e fam
i
l
y
, or
i
ndi
vi
dual
s
,
or
pre
j
udi
ce t
o
t
h
at
St
at
e. The
s
e
are t
h
e
dat
a
:
Minutes
of private m
eetings,
as in
paternity cases,
rape
and sodom
y
Juvenile
cases
with respect
t
o
th
e m
y
stery of
the professi
on
as Do
ctors a
nd lawyers, for e
x
am
ple
C
o
n
f
i
d
e
n
t
i
a
l
expe
rt
re
p
o
rt
s (
p
resi
dent
s a
n
d
seni
o
r
of
ficials’ trial of co
m
p
ro
m
i
sin
g
th
e
secu
rity of th
e
state).
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
A N
o
vel
L
o
om
f
o
r Al
ac
ri
t
y
of
Prot
ect
ed
Law
s
ui
t
De
al
i
n
g
U
s
i
n
g
C
l
ou
d C
o
mp
ut
i
n
g .
...
(
B
.
V.
S
u
b
b
a
R
ao)
1
797
3.
E
X
PERI
MEN
T
AL RES
U
L
T
S
3.
1.
Da
ta
Meas
ure
ments
The propose
d syste
m
has been test
ed on large num
b
er of
data.
The de
vi
ce specification (CPU Core
I
5
2
.
30
G
H
z
,
4
096
RA
M,
W
i
n
dow
s
1
0
Op
er
atin
g System
an
d Mat lab
R
2
013
a) th
at
h
a
s b
e
en
u
s
ed
to cr
eate
t
h
e p
r
og
ram
i
s
sho
w
n i
n
Fi
gu
r
e
4.
Fi
gu
re
4.
M
a
i
n
Pr
og
ram
Form
t
h
at
co
nt
r
o
l
t
h
e
entra
n
ce t
o
the program
as: 1- Judge
2-Me
m
b
er
The case-study scenario c
onsists of two form
s; j
udge F
o
rm
to encry
p
t data and m
e
mber F
o
rm
to
decry
p
t
dat
a
A
s
sh
o
w
n
i
n
Fi
g
u
re
5
(
a,
b
)
.
Pe
rf
orm
a
nce o
f
t
h
e m
e
t
hod
de
p
e
nd
s
on
t
h
e
de
vi
ces s
p
eci
fi
ca
t
i
ons.
Du
ri
n
g
E
x
peri
m
e
nt
s Jud
g
e e
n
cry
p
t
va
ri
o
u
s
num
bers
of
fi
l
e
s sy
st
em
respo
nd
wi
t
h
(Si
ze
o
f
fi
l
e
an
d E
n
c
r
y
p
t
i
o
n
Tim
e
). Mem
b
ers ca
n
decry
p
t the
Files a
g
ain t
h
e syst
e
m
responds
with (Replacem
ents,
Size of
file and
Decry
p
tion Ti
me).
3.
2.
Da
ta
Prese
n
t
a
tion
At
t
h
e be
gi
n
n
i
ng
o
f
t
h
e e
xpe
ri
m
e
nt
s t
h
e syst
em
check t
h
e
t
y
pe of e
n
t
e
re
d pe
rs
on
de
pe
nds
o
n
(t
y
p
e
and
Acc
o
unt
i
n
f
o
rm
at
i
on t
h
e
sy
st
em
ope
n t
h
e
desi
re
d f
o
r
m
). There e
x
i
t
t
w
o
o
p
erat
i
o
na
l
fo
rm
s;
Upl
o
a
d
f
o
rm
that can be accessed via Judge to encry
p
t data and
Downloa
d
form
th
at can be accessed via m
e
mbers t
o
decry
p
t
dat
a
Fi
gu
re 6 (a,
b
)
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
S
SN
:
2
088
-87
08
I
J
ECE
Vo
l. 6
,
N
o
. 4
,
Au
gu
st 2
016
:
17
92
–
1
799
1
798
(a)
(b)
Fi
gu
re
6.
Tw
o
ope
rat
i
o
nal
F
o
r
m
s;
(a)
Upl
o
ad
Fo
rm
for
j
u
dg
e t
o
E
n
cry
p
t
da
t
a
wi
t
h
pri
v
at
e
key
(
b
)
D
o
wnl
o
ad
Fo
rm
for Memb
ers to
Decrypt d
a
ta with th
e
sam
e
p
r
iv
ate
key
As a test
of Encryp
tion
o
f
an
y
file system
p
r
in
t states as
fo
ll
o
w
:
Elap
sed tim
e is
0
.
02
758
3 secon
d
s
.
No
_of
_
C
h
a
r =
68
37
As Test
ex
am
p
l
e o
f
d
e
cryp
tion
o
f
an
y
file syste
m
p
r
in
t states as fo
llow:
Character = m
is dec
r
ypted t
o
=
b
…………
.. // t
o
the
end
of fil
e
Elap
sed tim
e is
0
.
00
322
4 secon
d
s
.
No
_of
_
C
h
a
r =31
Resu
lt of th
e ap
p
lication
can
b
e
seen
Figu
re
7
.
(a)
(b)
Figure
7. Num
b
er of
C
h
aracte
r
s
res
p
ect
to ti
me ;(a)
No
o
f
Encryp
ted Ch
a
r
r
e
spect to tim
e
,(b)
No of
Decry
p
ted C
h
a
r
re
spect t
o
time
4.
RESULTS
A
N
D
DI
SC
US
S
I
ONS
Our system
is
carefu
lly tested
o
n
larg
e nu
m
b
er of
d
a
ta sets.
We
u
s
ed
Core i
5
p
r
ocessor wit
h
2
.
3
0
GH
z and
w
ith
4
G
B
RAM and
u
s
ed
M
a
tr
ix
Labo
r
a
t
o
ry w
ith
W
i
ndow
s
19
O
S
.
W
e
h
a
v
e
cr
eated
t
w
o fo
r
m
s
like Judge Form
and Mem
b
er form
for
enc
r
y
p
t
i
o
n
an
d
dec
r
y
p
t
i
on.
For 6837
c
h
aracters we got an
ela
p
sed
time
as 0.
027583
seconds
and for
31 cha
r
acters
we
got
we
got
a
n
el
apse
d
t
i
m
e
as 0.00
32
24 sec
o
nd
s. T
h
ose res
u
l
t
s
sh
o
w
ed
o
u
r sy
st
e
m
s effi
ci
ency
and
per
f
o
rm
ance wi
t
h
ot
he
r si
m
i
l
a
r sy
st
em
s l
i
k
e Sony
’s B
M
G
sy
s
t
em
and N
e
xt
Gen
case m
a
nagem
e
nt
sy
st
em
s. W
e
f
o
un
d
t
h
at
o
u
r
syste
m
s performance
m
e
trics
are bette
r t
h
a
n
B
M
G an
d
Next
Gen sy
st
e
m
s. The resul
t
s
and e
n
cry
p
t
e
d an
d
decry
p
t
e
d
o
p
er
at
i
onal
f
o
rm
an
d
gra
p
hs
gene
r
a
t
e
d u
s
i
n
g
ou
r
sy
st
em
i
s
sho
w
n at
sect
i
o
n
3.
2
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
J
ECE
I
S
SN
:
208
8-8
7
0
8
A N
o
vel
L
o
om
f
o
r Al
ac
ri
t
y
of
Prot
ect
ed
Law
s
ui
t
De
al
i
n
g
U
s
i
n
g
C
l
ou
d C
o
mp
ut
i
n
g .
...
(
B
.
V.
S
u
b
b
a
R
ao)
1
799
5.
CO
NCL
USI
O
N
An
efficien
t inform
at
io
n
syste
m
fo
r facilitatin
g
th
e litig
ati
o
n
p
r
o
c
ed
ures
h
a
s b
e
en
presen
ted
.
Su
ch
i
n
f
o
rm
at
i
on sy
st
em
wi
l
l
be appl
i
e
d
on
di
ffe
rent
t
y
pes o
f
cou
r
t
s
. T
h
e peri
od
of p
r
ocessi
ng cases i
n
c
o
urt
s
has
been
re
duc
ed
.
In a
d
di
t
i
on,
t
h
e t
i
m
e
and ef
f
o
rt
of
j
u
d
g
es
and
l
a
wy
er
ha
s bee
n
sa
ved
.
Al
l
t
h
e m
a
ni
pul
at
ed
doc
um
ents are
enc
r
ypted to
achieve
secure
inform
ati
on s
y
ste
m
. It is re
commended to use
s
u
ch efficient
syste
m
in
co
urt
s
to
so
lv
e th
e
main
p
r
ob
lem
s
in
d
e
v
e
l
o
p
e
d co
un
tries.
REFERE
NC
ES
[1]
C. Wang,
et al.
, “Privacy
Pr
eserving Public
Auditing for Secure Cloud
Storage,”
IEEE Tr
ans. Computers
,
vol/issue: 62(2), pp.
362–375
,
20
13.
[2]
B. Wang,
et a
l
.
, “Storing Shar
ed Data on
the Cl
oud via Security
-Mediator,” in
Internationa
l Conferen
ce o
n
Distributed Com
puting S
y
stems –
ICDCS
, 2013
.
[3]
C. K. Chu and
W. G. Tzeng
,
“Identity
-
B
a
sed Prox
y
Re-en
c
r
yp
tion without R
a
ndom Oracles,” in
Informatio
n
Security Conference (
I
SC’07)
, ser. LNCS
, vol. 47
79, pp
. 189–202
, 2007.
[4]
C. K. Chu,
et al.
, “Conditional Prox
y
Broad
c
ast Re-En
c
r
y
ption,” in
Australasian Conference on Informatio
n
Security and
Privacy (
A
CISP ’09
)
, ser.LNCS
, vol. 5594, pp. 327–3
42, 2009
.
[5]
S.
S.
M.
Chow,
et al.
, “
E
ffic
i
en
t Unidirec
tiona
l Prox
y
Re-
E
ncr
y
p
t
ion,” in
Progress in Cryptology
-AFRIC
A
CR
YPT
2010, ser. LNCS
, vol. 6055
, pp
. 3
16–332, 2010
.
[6]
G.
Ateniese,
et al.
, “Improved
Prox
y
Re-En
c
r
yption Schemes
with A
pplic
atio
ns
to S
ecure Di
s
t
ributed S
t
or
ag
e,”
ACM Transactio
ns on Informatio
n
and System Security (
T
ISSEC)
,
vol/issue: 9(1)
,
pp. 1–30
, 2006
.
Evaluation Warning : The document was created with Spire.PDF for Python.