Secure keyword search using dual encryption in cloud computing
- PDF / 1,228,814 Bytes
- 10 Pages / 595.276 x 790.866 pts Page_size
- 117 Downloads / 221 Views
ORIGINAL RESEARCH
Secure keyword search using dual encryption in cloud computing Husna Tariq1 • Parul Agarwal1
Received: 4 July 2017 / Accepted: 18 January 2018 Bharati Vidyapeeth’s Institute of Computer Applications and Management 2018
Abstract This paper manages the secure searching, stockpiling and recovery of client information in the cloud framework. Different services of cloud, security issues and security necessities of cloud information being talked about. We have utilized fuzzy keyword searching scheme to seek and recover the encrypted data by utilizing wild card technique. We have devised a new approach of double encryption framework in light of authentication of the server to give more grounded security to the current fuzzy keyword searching techniques. We have coordinated symmetric and asymmetric encryption algorithms to improve information security. This work, for the most part, concentrates on authentication of the server to enhance the security framework and shield sensitive client’s information from unauthorized exposure. Keywords Dual encryption Authentication RSA AES Fuzzy keyword search Abbreviations AES Advances encryption algorithm API Application Programming Interface DES Data encryption standard DoS Denial of service IaaS Infrastructure as a service RSA Ron Rivest, Adi Shamir, and Leonard Adleman algorithm & Parul Agarwal [email protected] Husna Tariq [email protected] 1
Department of Computer Science, Jamia Hamdard, Hamdard Nagar, New Delhi 110062, India
PaaS SSE SaaS
Platform as a service Searchable symmetric encryption Software as a service
1 Introduction The cloud computing provides a web-based platform to varieties of applications running on more than a large number of PCs and servers to simultaneously work together. With the growth of cloud computing now it has turned out to be less demanding for clients to store, recover and share their information among themselves. It offers different advantages to clients and additionally service providers. It gives adaptability to work from anyplace and anytime. It additionally gives low-spending administrations, refreshes programming consequently, raises joint effort among clients and administration sellers and a great deal more [1]. The most broadly embraced utilization of cloud computing is distributed storage. The clients store a huge amount of data on cloud servers consistently. This data needs security from various types of digital dangers [2]. To keep up information privacy and for secure stockpiling, different kinds of encryption techniques are developed for shielding data from unauthorized exposure. Nonetheless, it was difficult to perform searching over encrypted data. But with the introduction of keyword-based searching, this task has become quite easier, and the needed file is retrieved efficiently by providing associated keywords. The conventional strategies for keyword search were restricted to the exact keyword search. These days, implementation of fuzzy keyword searching has been given by various researcher
Data Loading...