An Authorized and Efficient Searching Mechanism based on Keywords in Cloud Computing

Main Article Content

Dr. U. Mohan Srinivas, Dr. D. Bujji Babu, L. Sravani, Ch. Amrutha, K.V. Sudish Kumar, K. Sri Hari


Cloud hosting becomes the main way to store and share information for corporate customers. The ideal method to safeguard trade secrets is to encrypt information before it is downloaded into the cloud, but regular operations such as cloud searching are not feasible. Moreover, since workers have various architectural layers, a high-level employee should be able to see lower-level employee data to see whether such users are violating the law without alerting the employees. The PEKS is a well-known cryptography basis which enables keywords in cryptosystem configurations to be searched without decryption, making it appropriate for safe cloud storage. Unfortunately, no known PEKS scheme allows the monitoring feature without sender permission. We are proposing a hierarchy cryptographically search encoding (HPEKS), as well as PEKS variants, as well as a semi-generic architecture based on PKTree and PEKS plans to solve this problem. We have developed an excellent HPEKS technique called DHPEKS, which combines public and symmetrical key encryption with safe keyword search, to better fit business private data exchange. We show that our DHPEKS technology is safe using the random oracle safety criteria. It guarantees the security of external offline keywords and the transparency property, in order to transmission encrypted data to the organisation, the sender does not need to know the internal hierarchical structure of a company. Theoretical evaluations and detailed testing show that with existing PEKS systems, our DHPEKS system has comparable efficiency.

Article Details