SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY
ENCRYPTION FOR CLOUD BASED DATA SHARING
KUNTAPALLI JAYACHANDRAREDDY1, S.V.S. GANGA DEVI2
PG Research Scholar, Dept. of Computer Applications, Madanapalle Institute of Technology and Science
Professor, Dept. of Computer Applications, Madanapalle Institute of Technology and Science, Andhra Pradesh,
India
-------------------------------------------------------------------***--------------------------------------------------------------------
ABSTRACT
With the advancement of cloud computing technologies,
data exchange over the cloud is becoming more common.
New technology bring new security concerns, particularly
when it comes to data privacy in cloud-based sharing
services. One of the finest way for balancing data privacy
and usability is searchable encryption. Due to the lack of
some essential features such as parallel search and
forward security, most existing searchable encryption
systems do not match the requirements for both high
search capacity and robust security at the same time. To
address this issue, we propose parallel and forward
private searchable public-key encryption as a variation
searchable encryption with parallel and forward privacy
(PFP-SPE). At the tradeoff of slightly increased storage
costs, the PFP-SPE system accomplishes both parallelism
and forward privacy. PFP-SPE provides a similar search
functionality to various other programmes.
Keywords: Security ,Encryption ,Decryption ,Data
sharing.
1. INTRODUCTION
Cloud-based data sharing has emerged as a viable
alternative for easy access to massive amounts of data on
demand. Its multiple advantages, such as cheaper costs,
better resource utilisation, and higher agility, have
industrial and academic interest. Cloud-based data
sharing solutions are already in use across a wide range
of industries, including education, logistics, healthcare,
and finance. Diagram 1 depicts the traditional cloud-
based data sharing application scenarios. However, as
security issues (such as celebrity images being leaked in
Cloud) continue to arise, people are becoming
increasingly concerned about privacy protection while
appreciating the convenience of cloud storage. To
promote the widespread use of cloud-based data
sharing, secure procedures balancing privacy and data
consumption are urgently needed.
To promote the widespread use of cloud-based data
sharing, secure procedures balancing privacy and data
consumption are urgently needed.
2. LITERATURE SURVEY
The concept of Public-key Authenticated Encryption with
Keyword Search (PAEKS) to address the problem of a
data sender who not only encrypts but also
authenticates a keyword so that a verifier is convinced
that the encrypted keyword can only be generated by the
sender. The authors present a concrete and efficient
architecture of PAEKS and show its security under the
stated security models using simple and static
assumptions in the random oracle model [1]
The purpose of searchable encryption (SE) is to allow a
client to search encrypted data on an untrusted server
while maintaining some level of privacy for both the
encrypted contents and the search queries. Recent
research has concentrated on establishing effective SE
techniques at the risk of allowing some minor, well-
defined "(information) leakage" about files and/or
queries to the server. However, the practical significance
of this leakage is unknown. On the query privacy of
single keyword and conjunctive SE schemes, the authors
investigate file-injection attacks in which the server
transmits files to the client, which the client
subsequently encrypts and saves. they show that even
with only a few injected files, such attacks can leak the
client's requests [2].
The industrial Internet of Things is thriving, thanks to
the extraordinary rapid growth of wireless sensor
networks (WSNs) with cloud computing aid. New cyber
security threats will emerge as a result of the new
generation of technology, including data confidentiality
in cloud-assisted WSNs (CWSNs). SPE (searchable
public-key encryption) is a promising solution to this
issue. In theory, sensors can post public-key cipher texts
to the cloud, and its owners can safely delegate a
keyword search to the cloud and obtain the desired data
while retaining data secrecy. However, in terms of
creating cipher texts and searching keywords, all
existing and semantically safe SPE techniques have high
costs. As a result, this research presents an LSPE
(lightweight SPE) scheme[3].
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1097
3. PROPOSED METHOD
We present a version searchable encryption with parallel
and forward privacy in the suggested system, namely
parallel and forward private searchable public-key
encryption with parallel and forward privacy (PFP-SPE).
At the slightly increased storage costs, the PFP-SPE
system accomplishes both parallelism and forward
privacy.
4. System Architecture
Fig 1 shows the Architecture diagram. Admin login with
the valid username and Password. After that he can add
and view Categories, Products, Service Providers. While
adding Service Providers the admin must give the
location of the Service Providers. Admin can also have
the access to view the feedback from the user about
service provider and he can also block him. The user
must be registered and login with their Email and
Password. After logging, the user will select the Category
and Service and send a query to the Service Provider.
After the query is sent, the user will wait for the service
provider solution and if he satisfies that is okay if not he
can give feedback to admin. Service Provider login with
their Email and Password. After logging, Servicer view
the User queries or requests based on that he responds
and provides a Solution to the User.
Fig 1. Architecture diagram
5. Result
During the research, the respondents were first
presented with phrases regarding the perception of trust
which allowed them to present their opinions on the
meaning of this concept .The main aim of the this paper
is the data owner send the data by using the cloud
sharing. In this he will encrypt the data and the key code
is given to the data receiver. The data receiver will
decrypt the code and he/she will access the data.
6. CONCLUSION
We study a new architecture for a practical dynamic
searchable encryption system that is both efficient and
secure in this work. Fortunately, we also provide a
realistic construction for a new cryptographic primitive,
parallel and forward private searchable public-key
encryption. The star-chain data structure in our scheme
improves search efficiency and provides forward
privacy. Our system is more suitable for practical
application.
REFERENCES
[1] Q. Huang and H. Li, ‘‘An efficient public-key
searchable encryption scheme secure against inside
keyword guessing attacks,’’ Inf. Sci., vols. 403–404, pp. 1–
14, Sep. 2017.
[2] Y. Zhang, J. Katz, and C. Papamanthou, ‘‘All your
queries are belong to us: The power of file-injection
attacks on searchable encryption,’’ in Proc.USENIX Secur.
Symp., 2016, pp. 707–720.
[3] P. Xu, S. He, W. Wang, W. Susilo, and H. Jin,
‘‘Lightweight search- able public-key encryption for
cloud-assisted wireless sensor net- works,’’ IEEE Trans.
Ind. Informat., vol. 14, no. 8, pp. 3712–3723, Aug. 2018.
[4] H. Li, Q. Huang, J. Shen, G. Yang, and W. Susilo,
‘‘Designated-server identity-based authenticated
encryption with keyword search for encrypted emails,’’
Inf. Sci., vol. 481, pp. 330–343, May 2019.
[5] R. Bost, ‘‘Σoøoς forward secure searchable
encryption,’’ in Proc. ACM SIGSAC Conf. Comput. Commun.
Secur., 2016, pp. 1143–1154.
[6] K. S. Kim, M. Kim, D. Lee, J. H. Park, and W.-H.
Kim, ‘‘Forward secure dynamic searchable symmetric
encryption with efficient updates,’’ in Proc. ACM SIGSAC
Conf. Comput. Commun. Secur. (CCS), 2017, pp. 1449–
1463.
[7] X. Song, C. Dong, D. Yuan, Q. Xu, and M. Zhao,
‘‘Forward private searchable symmetric encryption with
optimized i/o efficiency,’’ IEEE Trans. Dependable Secure
Comput., to be published.
[8] M. Ma, D. He, N. Kumar, K.-K.-R. Choo, and J. Chen,
‘‘Certifi- cateless searchable public key encryption
scheme for industrial Inter-net of Things,’’ IEEE Trans.
Ind. Inf., vol. 14, no. 2, pp. 759–767, Feb. 2018.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1098
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
[9] L. Wu, B. Chen, K.-K.-R. Choo, and D. He, ‘‘Efficient and
secure search- able encryption protocol for cloud-based
Internet of Things,’’ J. Parallel Distrib. Comput., vol. 111,
pp. 152–161, Jan. 2018.
[10] M. Ma, D. He, H. Wang, N. Kumar, and K.-K.-R. Choo,
‘‘An effi- cient and provably secure authenticated key
agreement protocol for fog- based vehicular ad-hoc
networks,’’ IEEE Internet Things J., vol. 6, no. 5, pp. 8065–
8075, Oct. 2019.
[11] R. Bost and P.-A. Fouque, ‘‘Security-efficiency
tradeoffs in searchable encryption,’’ on Privacy
Enhancing technol., vol. 2019, no. 4, pp. 132–151, Oct.
2019.
[12] L. Liu, J. Su, X. Liu, R. Chen, K. Huang, R. H. Deng, and
X. Wang, ‘‘Toward highly secure yet efficient KNN
classification scheme on out- sourced cloud data,’’ IEEE
Internet Things J., vol. 6, no. 6, pp. 9841–9852,Dec. 2019.
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1099

More Related Content

Similar to A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BASED DATA SHARING

Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudIRJET Journal
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...ijtsrd
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storageijtsrd
 
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET Journal
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeIRJET Journal
 
An interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through BlockchainAn interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through BlockchainIRJET Journal
 
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
A New Approach for Securely Sharing Data between Cloud Users with Dual KeysA New Approach for Securely Sharing Data between Cloud Users with Dual Keys
A New Approach for Securely Sharing Data between Cloud Users with Dual Keysijtsrd
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET Journal
 
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET Journal
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingeSAT Journals
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...1crore projects
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...1crore projects
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloudeSAT Publishing House
 

Similar to A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BASED DATA SHARING (20)

Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on CloudReview on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
 
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...IRJET -  	  K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
IRJET - K-Gram based Composite Secret Sign Search Over Encrypted Cloud In...
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
Data Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted KeywordsData Search in Cloud using the Encrypted Keywords
Data Search in Cloud using the Encrypted Keywords
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with CryptographyIRJET- Multi-Owner Keyword Search over Cloud with Cryptography
IRJET- Multi-Owner Keyword Search over Cloud with Cryptography
 
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search SchemeEnabling Secure and Efficient Multi-Keyword Ranked Search Scheme
Enabling Secure and Efficient Multi-Keyword Ranked Search Scheme
 
An interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through BlockchainAn interactive Study on secure data sharing in the IOT through Blockchain
An interactive Study on secure data sharing in the IOT through Blockchain
 
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
A New Approach for Securely Sharing Data between Cloud Users with Dual KeysA New Approach for Securely Sharing Data between Cloud Users with Dual Keys
A New Approach for Securely Sharing Data between Cloud Users with Dual Keys
 
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
IRJET- An Efficient Solitude Securing Ranked Keyword Search Technique
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
IRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCSIRJET- ESBA based Privacy Protection in OSCS
IRJET- ESBA based Privacy Protection in OSCS
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BASED DATA SHARING

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BASED DATA SHARING KUNTAPALLI JAYACHANDRAREDDY1, S.V.S. GANGA DEVI2 PG Research Scholar, Dept. of Computer Applications, Madanapalle Institute of Technology and Science Professor, Dept. of Computer Applications, Madanapalle Institute of Technology and Science, Andhra Pradesh, India -------------------------------------------------------------------***-------------------------------------------------------------------- ABSTRACT With the advancement of cloud computing technologies, data exchange over the cloud is becoming more common. New technology bring new security concerns, particularly when it comes to data privacy in cloud-based sharing services. One of the finest way for balancing data privacy and usability is searchable encryption. Due to the lack of some essential features such as parallel search and forward security, most existing searchable encryption systems do not match the requirements for both high search capacity and robust security at the same time. To address this issue, we propose parallel and forward private searchable public-key encryption as a variation searchable encryption with parallel and forward privacy (PFP-SPE). At the tradeoff of slightly increased storage costs, the PFP-SPE system accomplishes both parallelism and forward privacy. PFP-SPE provides a similar search functionality to various other programmes. Keywords: Security ,Encryption ,Decryption ,Data sharing. 1. INTRODUCTION Cloud-based data sharing has emerged as a viable alternative for easy access to massive amounts of data on demand. Its multiple advantages, such as cheaper costs, better resource utilisation, and higher agility, have industrial and academic interest. Cloud-based data sharing solutions are already in use across a wide range of industries, including education, logistics, healthcare, and finance. Diagram 1 depicts the traditional cloud- based data sharing application scenarios. However, as security issues (such as celebrity images being leaked in Cloud) continue to arise, people are becoming increasingly concerned about privacy protection while appreciating the convenience of cloud storage. To promote the widespread use of cloud-based data sharing, secure procedures balancing privacy and data consumption are urgently needed. To promote the widespread use of cloud-based data sharing, secure procedures balancing privacy and data consumption are urgently needed. 2. LITERATURE SURVEY The concept of Public-key Authenticated Encryption with Keyword Search (PAEKS) to address the problem of a data sender who not only encrypts but also authenticates a keyword so that a verifier is convinced that the encrypted keyword can only be generated by the sender. The authors present a concrete and efficient architecture of PAEKS and show its security under the stated security models using simple and static assumptions in the random oracle model [1] The purpose of searchable encryption (SE) is to allow a client to search encrypted data on an untrusted server while maintaining some level of privacy for both the encrypted contents and the search queries. Recent research has concentrated on establishing effective SE techniques at the risk of allowing some minor, well- defined "(information) leakage" about files and/or queries to the server. However, the practical significance of this leakage is unknown. On the query privacy of single keyword and conjunctive SE schemes, the authors investigate file-injection attacks in which the server transmits files to the client, which the client subsequently encrypts and saves. they show that even with only a few injected files, such attacks can leak the client's requests [2]. The industrial Internet of Things is thriving, thanks to the extraordinary rapid growth of wireless sensor networks (WSNs) with cloud computing aid. New cyber security threats will emerge as a result of the new generation of technology, including data confidentiality in cloud-assisted WSNs (CWSNs). SPE (searchable public-key encryption) is a promising solution to this issue. In theory, sensors can post public-key cipher texts to the cloud, and its owners can safely delegate a keyword search to the cloud and obtain the desired data while retaining data secrecy. However, in terms of creating cipher texts and searching keywords, all existing and semantically safe SPE techniques have high costs. As a result, this research presents an LSPE (lightweight SPE) scheme[3]. © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1097
  • 2. 3. PROPOSED METHOD We present a version searchable encryption with parallel and forward privacy in the suggested system, namely parallel and forward private searchable public-key encryption with parallel and forward privacy (PFP-SPE). At the slightly increased storage costs, the PFP-SPE system accomplishes both parallelism and forward privacy. 4. System Architecture Fig 1 shows the Architecture diagram. Admin login with the valid username and Password. After that he can add and view Categories, Products, Service Providers. While adding Service Providers the admin must give the location of the Service Providers. Admin can also have the access to view the feedback from the user about service provider and he can also block him. The user must be registered and login with their Email and Password. After logging, the user will select the Category and Service and send a query to the Service Provider. After the query is sent, the user will wait for the service provider solution and if he satisfies that is okay if not he can give feedback to admin. Service Provider login with their Email and Password. After logging, Servicer view the User queries or requests based on that he responds and provides a Solution to the User. Fig 1. Architecture diagram 5. Result During the research, the respondents were first presented with phrases regarding the perception of trust which allowed them to present their opinions on the meaning of this concept .The main aim of the this paper is the data owner send the data by using the cloud sharing. In this he will encrypt the data and the key code is given to the data receiver. The data receiver will decrypt the code and he/she will access the data. 6. CONCLUSION We study a new architecture for a practical dynamic searchable encryption system that is both efficient and secure in this work. Fortunately, we also provide a realistic construction for a new cryptographic primitive, parallel and forward private searchable public-key encryption. The star-chain data structure in our scheme improves search efficiency and provides forward privacy. Our system is more suitable for practical application. REFERENCES [1] Q. Huang and H. Li, ‘‘An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks,’’ Inf. Sci., vols. 403–404, pp. 1– 14, Sep. 2017. [2] Y. Zhang, J. Katz, and C. Papamanthou, ‘‘All your queries are belong to us: The power of file-injection attacks on searchable encryption,’’ in Proc.USENIX Secur. Symp., 2016, pp. 707–720. [3] P. Xu, S. He, W. Wang, W. Susilo, and H. Jin, ‘‘Lightweight search- able public-key encryption for cloud-assisted wireless sensor net- works,’’ IEEE Trans. Ind. Informat., vol. 14, no. 8, pp. 3712–3723, Aug. 2018. [4] H. Li, Q. Huang, J. Shen, G. Yang, and W. Susilo, ‘‘Designated-server identity-based authenticated encryption with keyword search for encrypted emails,’’ Inf. Sci., vol. 481, pp. 330–343, May 2019. [5] R. Bost, ‘‘Σoøoς forward secure searchable encryption,’’ in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2016, pp. 1143–1154. [6] K. S. Kim, M. Kim, D. Lee, J. H. Park, and W.-H. Kim, ‘‘Forward secure dynamic searchable symmetric encryption with efficient updates,’’ in Proc. ACM SIGSAC Conf. Comput. Commun. Secur. (CCS), 2017, pp. 1449– 1463. [7] X. Song, C. Dong, D. Yuan, Q. Xu, and M. Zhao, ‘‘Forward private searchable symmetric encryption with optimized i/o efficiency,’’ IEEE Trans. Dependable Secure Comput., to be published. [8] M. Ma, D. He, N. Kumar, K.-K.-R. Choo, and J. Chen, ‘‘Certifi- cateless searchable public key encryption scheme for industrial Inter-net of Things,’’ IEEE Trans. Ind. Inf., vol. 14, no. 2, pp. 759–767, Feb. 2018. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1098
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 [9] L. Wu, B. Chen, K.-K.-R. Choo, and D. He, ‘‘Efficient and secure search- able encryption protocol for cloud-based Internet of Things,’’ J. Parallel Distrib. Comput., vol. 111, pp. 152–161, Jan. 2018. [10] M. Ma, D. He, H. Wang, N. Kumar, and K.-K.-R. Choo, ‘‘An effi- cient and provably secure authenticated key agreement protocol for fog- based vehicular ad-hoc networks,’’ IEEE Internet Things J., vol. 6, no. 5, pp. 8065– 8075, Oct. 2019. [11] R. Bost and P.-A. Fouque, ‘‘Security-efficiency tradeoffs in searchable encryption,’’ on Privacy Enhancing technol., vol. 2019, no. 4, pp. 132–151, Oct. 2019. [12] L. Liu, J. Su, X. Liu, R. Chen, K. Huang, R. H. Deng, and X. Wang, ‘‘Toward highly secure yet efficient KNN classification scheme on out- sourced cloud data,’’ IEEE Internet Things J., vol. 6, no. 6, pp. 9841–9852,Dec. 2019. © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1099