IUP Publications Online
Home About IUP Magazines Journals Books Archives
     
Recommend    |    Subscriber Services    |    Feedback    |     Subscribe Online
 
The IUP Journal of Information Technology
Public Key Searchable Encryption Using Elliptic Curve Diffie-Hellman Cryptography†
:
:
:
:
:
:
:
:
:
 
 
 
 
 
 
 

The recent emergence of cloud computing has completely altered everyone’s perception of infrastructure architecture. This rapid transition towards cloud has fueled concern on the critical issue of information system’s security. Cloud server’s security cannot be compromised. Hence data is encrypted before outsourcing to the cloud. As search over encrypted data is not possible, searchable encryption techniques are employed. The verifiable public key searchable encryption scheme is one of the techniques which enables one to search for encrypted keywords without compromising the security of the stored information. The paper addresses four important issues of the verifiable public key searchable encryption scheme. This scheme allows any person to generate a trapdoor; cipher text can be easily modified, the key pair is generated by the users themselves, and the identities of the users are encrypted leading to unnecessary inefficiency. So a ‘public key searchable encryption scheme’ is proposed. The proposed version provides the highest level of security and efficiency which makes this system apt for cloud security.

 
 

Today security is the challenging aspect in internet and network applications. Cryptography is used to secure these applications. Cryptography is the transformation of readable and understandable data into a form which cannot be understood in order to secure data. Data stored on cloud is not secure because of malicious servers (Kamara and Lauter, 2010). To secure data on cloud servers or any kind of storage service, cryptographic algorithms are used to encrypt the data before uploading data to the servers. As a result, malicious servers are not able to get the data of user. The problem with this technique is that the user is not able to search data. Every time for the usage of some data, the user had to download whole database and decrypt it.

To solve this problem, searchable encryption algorithms are used. With these algorithms, the users can search the database for a file using keyword and server will send all the files matching that keyword. In this paper, the working of existing system is discussed and vulnerabilities of existing system are pointed out. A new system has been proposed which solves the vulnerabilities of the existing system.

 
 

Information Technology Journal,Asymmetric encryption, Public key encryption, Verifiable keyword search, Elliptic Curve Diffie-Hellman (ECDH), Elliptic Curve Digital Signature Algorithm (ECDSA), Trapdoor generation.