A Secure Cloud Storage Based Multi-Server Public Key Encoding for Keyword Word

Mohammed Abdul Samad, MdAteeq Ur Rahman


Accessible catchphrase is of extraordinary enthusiasm for protecting the data protection in secure accessible distributed storage. In this paper, we have an attempted to explore the security of an outstanding logical control crude, in particular, open key encoding with catchphrase search (PEKS) that is incredibly useful in a few uses of distributed storage. Unfortunately, it's been demonstrated that the standard PEKS system experiences partner degree natural uncertainty known as inside watchword gauge assault (KGA) propelled by the malevolent server. To manage this security defenselessness, we tend to propose a shiny new PEKS system named double server PEKS (DS-PEKS). As another primary commitment, we tend to diagram a fresh out of the plastic new variation of the smooth projective hash capacities (SPHFs) expressed as straight and homomorphic SPHF (LH-SPHF). we tend to then demonstrate a conventional development of secure DS-PEKS from LH-SPHF. for example the practicability of our new system, we offer partner degree affordable portrayal of the last structure from a decision Diffie–Hellman-based LH-SPHF and demonstrate that it can do the hearty protection from inside the KGA. Accessible cryptography will be cultivated in either respective or uneven cryptography setting. In, Song et al. anticipated watchword search on ciphertext, alluded to as Searchable reciprocal cryptography (SSE) and later numerous south southeast plans , were intended for upgrades. despite the fact that south southeast plans get joy from high power, they experience the ill effects of modern mystery key dispersion. Unequivocally, clients should immovably share mystery keys that square measure utilized for encryption.


Else they're incapable to share the encoded data re-appropriated to the cloud. To determine this drawback, Boneh et al. Presented an extra adaptable crude, explicitly Public Key cryptography with Keyword Search (PEKS) that enables a client to go glimpsing encoded data inside the uneven cryptography setting. in an exceedingly PEKS framework, exploitation the recipient's open key, the sender connects some scrambled watchwords (alluded to as PEKS ciphertexts) with the encoded data. The collector at that point sends the trapdoor of a to-be-scanned catchphrase to the server for data looking. Given the trapdoor and furthermore the PEKS ciphertext, the server will investigate whether the watchword fundamental the PEKS ciphertxt is up to the one choose by the collector. Provided that this is true, the server sends the coordinating encoded data to the collector.

Full Text:


Copyright (c) 2019 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 

Paper submission: ijr@pen2print.org