Downloads: 123 | Views: 292 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper | Computer Science & Engineering | India | Volume 6 Issue 1, January 2017 | Popularity: 6.5 / 10
A Survey on Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
Ghorpade Sneha, Dr. S. N. Kini
Abstract: Searchable encryption is of expanding enthusiasm for ensuring the information protection in secure searchable distributed storage. In this work, we explore the security of an outstanding cryptographic primitive, in particular Public Key Encryption with Search (PEKS) which is exceptionally helpful in numerous utilizations of distributed storage. Shockingly, it has been demonstrated that the customary PEKS system experiences an inalienable instability called inside Guessing Attack (KGA) propelled by the malevolent server. To address this security defenselessness, we propose another PEKS structure named Dual-Server Public Key Encryption with Search (DS-PEKS). As another fundamental commitment, we characterize another variation of the Smooth Projective Hash Functions (SPHFs) alluded to as straight and homomorphism SPHF (LH-SPHF). We then demonstrate a bland development of secure DS-PEKS from LH-SPHF. To represent the possibility of our new structure, we give a proficient instantiation of the general system from a DDH-based LH-SPHF and demonstrate that it can accomplish the solid security against inside KGA.
Keywords: Hash Functions, Guessing Attack, SPHFs, DS-PEKS
Edition: Volume 6 Issue 1, January 2017
Pages: 1113 - 1116
DOI: https://www.doi.org/10.21275/ART20164283
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 724 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 704 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 691 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera