Server-Designation Preventive Scheme for Public key Encryption with Keyword Search Cryptographic Primordial
Journal: International Journal of Computer Techniques (Vol.4, No. 4)Publication Date: 2017-07-01
Authors : A.Senthil Kumar S.Vimal;
Page : 27-30
Keywords : Secure Cloud Storage; Encryption; Cloud Computing; Security; Encryption Techniques;
Abstract
In this work, we travel around the security of an exceptional cryptographic primordial, in meticulous Public Key Encryption with Keyword Search (PEKS) which is outstandingly helpful in numerous utilizations of scattered storage. Horrendously, it has been verified that the customary PEKS classification experiences an incontrovertible instability called inside Keyword Guessing Attack (KGA) propelled by the spiteful server. Cloud storages in cloud data centres can be used for enterprises and persons to store and access their data remotely anywhere anytime without any further load. By data outsourcing, users can be relieved from the encumber of local data storage and protection. we consider refuge of the well-known cryptographic primitive, namely, public key file encryption with keyword search (PEKS) that is very helpful in lots of applying cloud storage. Regrettably, it's been proven the traditional PEKS framework is affected with a natural insecurity known as inside keyword guessing attack (KGA) launched through the malicious server. To deal with this security vulnerability, we advise a brand new PEKS framework named dual-server PEKS (DS-PEKS). Then we show a normal construction of secure DS-PEKS from LH-SPHF. We then show a generic construction of secure DS-PEKS from LH-SPHF. To illustrate the feasibility of our new framework, we provide an efficient instantiation of the general framework from a DDHbased LH-SPHF and show that it can achieve the strong security against inside KGA.
Other Latest Articles
- CRM Through Customer Online Reviews and Analysis
- Automated Phishing Website Detection Using URL Features and Machine Learning Technique
- Incorporated Keyword Search Using Characteristic Based Encryption for Electronic Health Records in Vapours
- A Review on Different Spam Detection Approaches
- Analysis & Induction Hardening On Excavator Pins
Last modified: 2018-05-18 20:44:44