Dual Server Public Key Encryption
Dual Server Public Key Encryption
ENGINEERING
Batch-II
18UC1A0549:Zahera Fathima
18UC1A0503:A.Narasimha
17UC1A0528:Amaan
ABSTRACT:
INTRODUCTION:
Cloud computing is the use of computing resources (hardware and software) that
are delivered as a service over a network (typically the Internet). The name comes
from the common use of a cloud-shaped symbol as an abstraction for the complex
infrastructure it contains in system diagrams. Cloud computing entrusts remote
services with a user's data, software and computation. Cloud computing consists of
hardware and software resources made available on the Internet as managed third-
party services. These services typically provide access to advanced software
applications and high-end networks of server computers. Cloud Computing
comprises three different service models, namely Infrastructure-as-a-Service
(IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). The three
service models or layer are completed by an end user layer that encapsulates the
end user perspective on cloud services. The model is shown in figure below. If a
cloud user accesses services on the infrastructure layer, for instance, she can run
her own applications on the resources of a cloud infrastructure and remain
responsible for the support, maintenance, and security of these applications herself.
If she accesses a service on the application layer, these tasks are normally taken
care of by the cloud service provider.
EXISTING SYSTEM
This usually makes the data utilization more difficult than the traditional storage
where data is kept in the absence of encryption. One of the typical solutions is the
searchable encryption which allows the user to retrieve the encrypted documents
that contain the user-specified keywords, where given the keyword trapdoor, the
server can find the data required by the user without decryption. Searchable
encryption can be realized in either symmetric or asymmetric encryption setting. In
proposed keyword search on cipher text, known as Searchable Symmetric
Encryption (SSE) and afterwards several SSE schemes were designed for
improvements. Although SSE schemes enjoy high efficiency, they suffer from
complicated secret key distribution. Precisely, users have to securely share secret
keys which are used for data encryption. Otherwise they are not able to share the
encrypted data outsourced to the cloud.
Disadvantages:
1. SSE schemes enjoy high efficiency; they suffer from complicated secret key
distribution.
2. Users have to securely share secret keys which are used for data encryption.
Otherwise they are not able to share the encrypted data outsourced to the
cloud.
PROPOSED SYSTEM:
Public Key Encryption with Keyword Search (PEKS) that enables a user to search
encrypted data in the asymmetric encryption setting. In a PEKS system, using the
receiver’s public key,the sender attaches some encrypted keywords (referred to as
PEKS cipher texts) with the encrypted data. The receiver then sends the trapdoor
of a to-be-searched keyword to the server for data searching. Given the trapdoor
and the PEKS cipher text, the server can test whether the keyword underlying the
PEKS cipher text is equal to the one selected by the receiver. If so, the server sends
the matching encrypted data to the receiver.
Advantages
Hardware Configuration
Software Configuration
MIDLWARE :JDBC
DATABASE :MYSQL