Secure search over encrypted data in multi cloud

Authors

  • A S Arunkumar Resarch scholar, Dept of IS & E, BGI
  • Sunetra Chatterjee MCA scholar
  • Sunil Kunchoorj Basavaraju Data scientist
  • Basavaraju G C HOD, Dept of Math’s

Keywords:

cloud computing, searchable encryption, keyword, security, asymmetric

Abstract

A two-thing information protection protection mechanism with element revocability for cloud storage machine. Our gadget permits a sender to send an encrypted message to a receiver thru a cloud storage server. The sender best desires to understand the identification of the receiver however no other information (including its public key or its certificates). The receiver needs to own two things so that it will decrypt the cipher text. The first element is his/her mystery key stored in the pc. The second aspect is a completely unique private safety tool which connects to the computer. It is impossible to decrypt the cipher text without either piece. More importantly, once the safety tool is stolen or lost, this tool is revoked. It cannot be used to decrypt any cipher text. This can be achieved through the cloud server with the intention to right now execute some algorithms to exchange the existing cipher text to be un-decrypt able via this device. This process is absolutely transparent to the sender. Furthermore, the cloud server cannot decrypt any cipher text at any time. The security and performance evaluation display that our gadget is not best steady but also realistic.

Downloads

Download data is not yet available.

References

T. Mather, S. Kumaraswamy, and S. Latif, Cloud security and privacy: an enterprise perspective on risks and compliance: O'Reilly, 2009.

S. Pearson and A. Benameur, "Privacy, security and trust issues arising from cloud computing," in Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, 2010, pp. 693-702.

S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, pp. 1-11, 2011.

H. Takabi, J. B. Joshi, and G.-J. Ahn, "Security and privacy challenges in cloud computing environments," Security & Privacy, IEEE, vol. 8, pp. 24-31, 2010.

M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, "Security and privacy in cloud computing: A survey," in Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on, 2010, pp. 105-112. [6] D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Generation Computer Systems, vol. 28, pp. 583-592, 2012.

Published

19-10-2022

How to Cite

Arunkumar, A. S., Chatterjee, S., Basavaraju, S. K., & Basavaraju, G. C. (2022). Secure search over encrypted data in multi cloud. International Journal of Health Sciences, 6(S9), 3880–3884. Retrieved from https://sciencescholar.us/journal/index.php/ijhs/article/view/13502

Issue

Section

Peer Review Articles