Double Server Public Key Encryption With Keyword Search For Secure Cloud Storage
Double Server Public Key Encryption With Keyword Search For Secure Cloud Storage
Volume 4 Issue 6, September-October 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
1. INTRODUCTION
Cloud computing is the use of computing resources computing entrusts remote services with a user's data,
(hardware and software) that are delivered as a service over software and computation. Cloud computing consists of
a network The name comes from the common use of a cloud- hardware and software resources made available on the
shaped symbol as an abstraction for the complex Internet as managed third-party services.
infrastructure it contains in system diagrams. Cloud
@ IJTSRD | Unique Paper ID – IJTSRD35726 | Volume – 4 | Issue – 6 | September-October 2020 Page 1560
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
Introduced The Off-Line Keyword Guessing Attack Against Peks As Keywords Are Chosen From A Much Smaller Space Than
Passwords And Users Usually Use Well-Known Keywords For Searching Documents. Despite Of Being Free From Secret Key
Distribution, PEKS Schemes Suffer From An Inherent Insecurity Regarding The Trapdoor Keyword Privacy, Namely Inside
Keyword Guessing Attack (KGA). The Reason Leading To Such A Security Vulnerability Is That Anyone Who Knows Receiver’s
Public Key Can Generate The PEKS Ciphertext Of Arbitrary Keyword Himself. Specifically, Given A Trapdoor, The Adversarial
Server Can Choose A Guessing Keyword From The Keyword Space And Then Use The Keyword To Generate A PEKS Ciphertext.
On One Hand, Although The Server Cannot Exactly Guess The Keyword, It Is Still Able To Know Which Small Set The Underlying
Keyword Belongs To And Thus The Keyword Privacy Is Not Well Preserved From The Server. On The Other Hand, Their Scheme
Is Impractical As The Receiver Has To Locally Find The Matching Ciphertext By Using The Exact Trapdoor To Filter Out The
Non-Matching Ones From The Set Returned From The Server.
3. Proposed System:
The contributions of this project are four-fold. formalize a new PEKS framework named Dual-Server Public Key Encryption
with Keyword Search (DS-PEKS) to address the security vulnerability of PEKS.A new variant of Smooth Projective Hash
Function (SPHF), referred to as linear and homomorphic SPHF, is introduced for a generic construction of DS-PEKS. show a
generic construction of DS-PEKS using the proposed Lin-Hom SPHF. To illustrate the feasibility of our new framework, an
efficient instantiation of our SPHF based on the Diffie- Hellman language is presented in this paper. All the existing schemes
require the pairing computation during the generation of PEKS ciphertext and testing and hence are less efficient than our
scheme, which does not need any pairing computation. Our scheme is the most efficient in terms of PEKS computation. It is
because that our scheme does not include pairing computation. Particularly, the existing scheme requires the most
computation cost due to 2 pairing computation per PEKS generation. In our paper it requires another stage for the testing, our
computation cost is actually lower than that of any existing scheme as we do not require any pairing computation and all the
searching work is handled by the server.
4. System Architecture:
Data Owner: Register with cloud server and login (username must be unique). Send request to Public key generator (PKG) to
generate Key on the user name. Browse file and request Public key to encrypt the data, Upload data to cloud service provider.
Verify the data from the cloud. Public Key Generator: Receive request from the users to generate the key, Store all keys based
on the user names. Check the username and provide the private key. Revoke the end user (File Receiver if they try to hack file in
the cloud server and un revoke the user after updating the private key for the corresponding file based on the user). Key
Update: Receive all files from the data owner and store all files. Check the data integrity in the cloud and inform to end user
about the data integrity. Send request to PKG to update the private key of the user based on the date parameter.
5. RESULTS:
@ IJTSRD | Unique Paper ID – IJTSRD35726 | Volume – 4 | Issue – 6 | September-October 2020 Page 1561
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35726 | Volume – 4 | Issue – 6 | September-October 2020 Page 1562
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35726 | Volume – 4 | Issue – 6 | September-October 2020 Page 1563
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35726 | Volume – 4 | Issue – 6 | September-October 2020 Page 1564
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35726 | Volume – 4 | Issue – 6 | September-October 2020 Page 1565
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35726 | Volume – 4 | Issue – 6 | September-October 2020 Page 1566
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35726 | Volume – 4 | Issue – 6 | September-October 2020 Page 1567