This paper is published in Volume-7, Issue-2, 2021
Area
Cloud
Author
Lokeswary Sridhar, Shyam Sundar N., Sujith K., Dr. Durga Devi P.
Org/Univ
SRM Institute of Science and Technology, Chennai, Tamil Nadu, India
Pub. Date
24 April, 2021
Paper ID
V7I2-1479
Publisher
Keywords
Hierarchical, Public-Key, Encryption, Keyword-Search, Cloud, Storage, Database, Secured-Data, Insider, Keyword, Guessing-Attack, Admin, User, Owner, Security Purpose

Citationsacebook

IEEE
Lokeswary Sridhar, Shyam Sundar N., Sujith K., Dr. Durga Devi P.. Public key encryption with keyword search, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Lokeswary Sridhar, Shyam Sundar N., Sujith K., Dr. Durga Devi P. (2021). Public key encryption with keyword search. International Journal of Advance Research, Ideas and Innovations in Technology, 7(2) www.IJARIIT.com.

MLA
Lokeswary Sridhar, Shyam Sundar N., Sujith K., Dr. Durga Devi P.. "Public key encryption with keyword search." International Journal of Advance Research, Ideas and Innovations in Technology 7.2 (2021). www.IJARIIT.com.

Abstract

Today's entrepreneur world demands huge storage for the data and elementary sharing of the same. Cloud storage serves the requirement of providing security to the files uploaded by the organizations. Security prior to uploading the data is provided by encrypting the files and creating keywords to shield the organizational secrets from strangers. The other challenge faced by the organizations is the Insider keyword guessing attack, which results in the hackers being the employees themselves. To address this variant of threat, We propose a system that has a hierarchy developed between the employees such that the higher-level employees can monitor the activities of the lower-level workforce by constructing a semi-generic Public Key Tree. The PK-tree is constructed by the support provided by the Hierarchical Public Key Encryption with Keyword search [HPEKS] a variant of the public key encryption with keyword search [PEKS]. It furthermore enjoys transparency to the owner provided the admin-1 verifies the user login and Admin-2 will send the OTP (One time Password) such as the secret key to the user to their Registered mail Id which will be used to secure the data and records the activity. The efficiency of the system is analyzed by eradicating the insider attack threat.