0% found this document useful (0 votes)
100 views5 pages

Dual Server Public Key Encryption

The document describes a major project presentation on dual server public key encryption with keyword search. It summarizes the existing public key encryption with keyword search (PEKS) system and its disadvantages related to key distribution. The proposed system introduces a new dual-server PEKS framework and a variant of smooth projective hash functions to address security vulnerabilities in the traditional PEKS framework. The system configuration specifies the hardware and software requirements including processors, RAM, hard disk, operating system, programming language, and database.

Uploaded by

Vinni Sketcher
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views5 pages

Dual Server Public Key Encryption

The document describes a major project presentation on dual server public key encryption with keyword search. It summarizes the existing public key encryption with keyword search (PEKS) system and its disadvantages related to key distribution. The proposed system introduces a new dual-server PEKS framework and a variant of smooth projective hash functions to address security vulnerabilities in the traditional PEKS framework. The system configuration specifies the hardware and software requirements including processors, RAM, hard disk, operating system, programming language, and database.

Uploaded by

Vinni Sketcher
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

TALLA PADMAVATI COLLEGE OF

ENGINEERING

A major project presentation on:

DUAL SERVER PUBLIC KEY ENCRYPTION


WITH KEYWORD SEARCH

Batch-II

Under the guidance of: Team members:

G. Revathi (HOD) 18UC1A0504:B.Sowmya

18UC1A0549:Zahera Fathima

18UC1A0503:A.Narasimha

17UC1A0528:Amaan
ABSTRACT:

Searchable encryption is of increasing interest for protecting the data privacy in


secure searchable cloud storage. In this paper, we investigate the security of a well-
known cryptographic primitive, namely, public key encryption with
keywordsearch (PEKS) which is very useful in many applications of cloud storage.
Unfortunately, it has been shown that the traditional PEKS framework suffers from
an inherent insecurity called inside keyword guessing attack (KGA) launched by
the malicious server. To address this security vulnerability, we propose a new
PEKS framework named dual-server PEKS (DS-PEKS). As another main
contribution, we define a new variant of the smooth projective hash functions
(SPHFs) referred to as linear and homomorphic SPHF (LH-SPHF). We then show
a generic construction of secure DS-PEKS from LH-SPHF. To illustrate the
feasibility of our new framework, we provide an
efficient instantiation of the general framework from a Decision Diffie–Hellman-
based LH-SPHF and show that it can achieve the strong security against inside the
KGA.

INTRODUCTION:

Cloud computing is the use of computing resources (hardware and software) that
are delivered as a service over a network (typically the Internet). The name comes
from the common use of a cloud-shaped symbol as an abstraction for the complex
infrastructure it contains in system diagrams. Cloud computing entrusts remote
services with a user's data, software and computation. Cloud computing consists of
hardware and software resources made available on the Internet as managed third-
party services. These services typically provide access to advanced software
applications and high-end networks of server computers. Cloud Computing
comprises three different service models, namely Infrastructure-as-a-Service
(IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). The three
service models or layer are completed by an end user layer that encapsulates the
end user perspective on cloud services. The model is shown in figure below. If a
cloud user accesses services on the infrastructure layer, for instance, she can run
her own applications on the resources of a cloud infrastructure and remain
responsible for the support, maintenance, and security of these applications herself.
If she accesses a service on the application layer, these tasks are normally taken
care of by the cloud service provider.

EXISTING SYSTEM

This usually makes the data utilization more difficult than the traditional storage
where data is kept in the absence of encryption. One of the typical solutions is the
searchable encryption which allows the user to retrieve the encrypted documents
that contain the user-specified keywords, where given the keyword trapdoor, the
server can find the data required by the user without decryption. Searchable
encryption can be realized in either symmetric or asymmetric encryption setting. In
proposed keyword search on cipher text, known as Searchable Symmetric
Encryption (SSE) and afterwards several SSE schemes were designed for
improvements. Although SSE schemes enjoy high efficiency, they suffer from
complicated secret key distribution. Precisely, users have to securely share secret
keys which are used for data encryption. Otherwise they are not able to share the
encrypted data outsourced to the cloud.
Disadvantages:

1. SSE schemes enjoy high efficiency; they suffer from complicated secret key
distribution.
2. Users have to securely share secret keys which are used for data encryption.
Otherwise they are not able to share the encrypted data outsourced to the
cloud.

PROPOSED SYSTEM:

Public Key Encryption with Keyword Search (PEKS) that enables a user to search
encrypted data in the asymmetric encryption setting. In a PEKS system, using the
receiver’s public key,the sender attaches some encrypted keywords (referred to as
PEKS cipher texts) with the encrypted data. The receiver then sends the trapdoor
of a to-be-searched keyword to the server for data searching. Given the trapdoor
and the PEKS cipher text, the server can test whether the keyword underlying the
PEKS cipher text is equal to the one selected by the receiver. If so, the server sends
the matching encrypted data to the receiver.

Advantages

1. We formalize a new PEKS framework named Dual-Server Public Key


Encryption with Keyword Search (DS-PEKS) to address the security
vulnerability of PEKS.
2. A new variant of Smooth Projective Hash Function (SPHF), referred to as
linear and homomorphic SPHF, is introduced for a generic construction of
DS-PEKS.
SYSTEM CONFIGURATION

Hardware Configuration

 Processor - Pentium –IV

 Speed - 1.1 GHz


 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA

Software Configuration

 Operating System : Windows XP

 Programming Language : JAVA

 Front End :JSP

 MIDLWARE :JDBC

 DATABASE :MYSQL

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy