Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage
Journal: International Journal of Trend in Scientific Research and Development (Vol.4, No. 6)Publication Date: 2020-10-08
Authors : A. Brahma Reddy K. V. Ranga Rao V. Vinay Kumar;
Page : 1560-1567
Keywords : Encryption; DS-PEKS; LH-SPHF; Cryptographic Primitive;
Abstract
Accessible encryption Technique is expanding the enthusiasm to ensure the information protection in secure accessible distributed storage. In this task, explore the security of a notable cryptographic crude, specifically, public key encryption with watchword search PEKS which is valuable in numerous utilizations of distributed storage. Tragically, it has been demonstrated that the customary PEKS structure experiences an intrinsic frailty called inside watchword speculating assault KGA dispatched by the malignant worker. To address this security weakness, we propose another PEKS structure named double worker PEKS DS PEKS . As another fundamental commitment, characterize another variation of the smooth projective hash capacities SPHFs alluded to as straight and homomorphic SPHF LH SPHF . at that point show a conventional development of secure DS PEKS from LH SPHF. To represent the plausibility of our new system, it give an effective launch of the overall structure from a Decision Diffie–Hellman based LH SPHF and show that it can accomplish the solid protection from inside the KGA. A. Brahma Reddy | K. V. Ranga Rao | V. Vinay Kumar "Double Server Public-Key Encryption with Keyword Search for Secure Cloud Storage" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35726.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35726/double-server-publickey-encryption-with-keyword-search-for-secure-cloud-storage/a-brahma-reddy
Other Latest Articles
- Role of Women Entrepreneurship in India Women Empowerment
- Identity based Encryption Utilizing Revocable Capacity of Distributed Computing in Secure Information
- Review on Novel Drug Delivery System of Microsphere Type, Material, Method of Preparation and Evaluation
- Survey on Keyloggers A Monitoring Tool
- Hydrodynamics and Heat Transfer through Corrugated Channels A Review
Last modified: 2020-11-23 19:40:38