Secure search over encrypted data in multi cloud
Keywords:
cloud computing, searchable encryption, keyword, security, asymmetricAbstract
A two-thing information protection protection mechanism with element revocability for cloud storage machine. Our gadget permits a sender to send an encrypted message to a receiver thru a cloud storage server. The sender best desires to understand the identification of the receiver however no other information (including its public key or its certificates). The receiver needs to own two things so that it will decrypt the cipher text. The first element is his/her mystery key stored in the pc. The second aspect is a completely unique private safety tool which connects to the computer. It is impossible to decrypt the cipher text without either piece. More importantly, once the safety tool is stolen or lost, this tool is revoked. It cannot be used to decrypt any cipher text. This can be achieved through the cloud server with the intention to right now execute some algorithms to exchange the existing cipher text to be un-decrypt able via this device. This process is absolutely transparent to the sender. Furthermore, the cloud server cannot decrypt any cipher text at any time. The security and performance evaluation display that our gadget is not best steady but also realistic.
Downloads
References
T. Mather, S. Kumaraswamy, and S. Latif, Cloud security and privacy: an enterprise perspective on risks and compliance: O'Reilly, 2009.
S. Pearson and A. Benameur, "Privacy, security and trust issues arising from cloud computing," in Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, 2010, pp. 693-702.
S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, pp. 1-11, 2011.
H. Takabi, J. B. Joshi, and G.-J. Ahn, "Security and privacy challenges in cloud computing environments," Security & Privacy, IEEE, vol. 8, pp. 24-31, 2010.
M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, "Security and privacy in cloud computing: A survey," in Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference on, 2010, pp. 105-112. [6] D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Generation Computer Systems, vol. 28, pp. 583-592, 2012.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.








