International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022
p-ISSN: 2395-0072
www.irjet.net
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BASED DATA SHARING KUNTAPALLI JAYACHANDRAREDDY1, S.V.S. GANGA DEVI2 PG Research Scholar, Dept. of Computer Applications, Madanapalle Institute of Technology and Science Professor, Dept. of Computer Applications, Madanapalle Institute of Technology and Science, Andhra Pradesh, India -------------------------------------------------------------------***-------------------------------------------------------------------ABSTRACT 2. LITERATURE SURVEY With the advancement of cloud computing technologies, data exchange over the cloud is becoming more common. New technology bring new security concerns, particularly when it comes to data privacy in cloud-based sharing services. One of the finest way for balancing data privacy and usability is searchable encryption. Due to the lack of some essential features such as parallel search and forward security, most existing searchable encryption systems do not match the requirements for both high search capacity and robust security at the same time. To address this issue, we propose parallel and forward private searchable public-key encryption as a variation searchable encryption with parallel and forward privacy (PFP-SPE). At the tradeoff of slightly increased storage costs, the PFP-SPE system accomplishes both parallelism and forward privacy. PFP-SPE provides a similar search functionality to various other programmes. Keywords: sharing.
Security
,Encryption
,Decryption
The concept of Public-key Authenticated Encryption with Keyword Search (PAEKS) to address the problem of a data sender who not only encrypts but also authenticates a keyword so that a verifier is convinced that the encrypted keyword can only be generated by the sender. The authors present a concrete and efficient architecture of PAEKS and show its security under the stated security models using simple and static assumptions in the random oracle model [1] The purpose of searchable encryption (SE) is to allow a client to search encrypted data on an untrusted server while maintaining some level of privacy for both the encrypted contents and the search queries. Recent research has concentrated on establishing effective SE techniques at the risk of allowing some minor, welldefined "(information) leakage" about files and/or queries to the server. However, the practical significance of this leakage is unknown. On the query privacy of single keyword and conjunctive SE schemes, the authors investigate file-injection attacks in which the server transmits files to the client, which the client subsequently encrypts and saves. they show that even with only a few injected files, such attacks can leak the client's requests [2].
,Data
1. INTRODUCTION Cloud-based data sharing has emerged as a viable alternative for easy access to massive amounts of data on demand. Its multiple advantages, such as cheaper costs, better resource utilisation, and higher agility, have industrial and academic interest. Cloud-based data sharing solutions are already in use across a wide range of industries, including education, logistics, healthcare, and finance. Diagram 1 depicts the traditional cloudbased data sharing application scenarios. However, as security issues (such as celebrity images being leaked in Cloud) continue to arise, people are becoming increasingly concerned about privacy protection while appreciating the convenience of cloud storage. To promote the widespread use of cloud-based data sharing, secure procedures balancing privacy and data consumption are urgently needed.
The industrial Internet of Things is thriving, thanks to the extraordinary rapid growth of wireless sensor networks (WSNs) with cloud computing aid. New cyber security threats will emerge as a result of the new generation of technology, including data confidentiality in cloud-assisted WSNs (CWSNs). SPE (searchable public-key encryption) is a promising solution to this issue. In theory, sensors can post public-key cipher texts to the cloud, and its owners can safely delegate a keyword search to the cloud and obtain the desired data while retaining data secrecy. However, in terms of creating cipher texts and searching keywords, all existing and semantically safe SPE techniques have high costs. As a result, this research presents an LSPE (lightweight SPE) scheme[3].
To promote the widespread use of cloud-based data sharing, secure procedures balancing privacy and data consumption are urgently needed.
© 2022, IRJET
|
Impact Factor value: 7.529
|
ISO 9001:2008 Certified Journal
| Page 1097