Professional Documents
Culture Documents
• The storage of private keys and encrypted data by the cloud provider is
also problematic in case of data breach. Hence, researchers have actively
been exploring solutions for secure storage on private and public clouds
where private keys remain in the hands of data owners.
DISADVANTAGES OF EXISTING SYSTEM
• The ranking of search results and searching with keywords that might
contain errors
• Potential statistical attacks on the indexes are indentified.
PROPOSED SYSTEM
• In this paper, we present a phrase search scheme and it is scalable, where
documents can easily be removed and added to the corpus. We also
describe modifications to the scheme to lower storage cost at a small cost
in response time and to defend against cloud providers with statistical
knowledge on stored data.
• Our framework differs from some of the earlier works, where keywords
generally consist of meta-data rather than content of the files and where a
trusted key escrow authority is used due to the use of Identity based
encryption.
ADVANTAGES OF PROPOSED SYSTEM
• The proposed system achieves a much faster response time than existing
solutions.
The data owner generates the required encryption keys for hashing and
encryption operations. Then, all documents in the database are parsed for
keywords. Bloom filters tied to hashed keywords and n-grams are attached.
The documents are then symmetrically encrypted and uploaded to the cloud
server. To add files to the database, the data owner parses the files as in setup
and uploads them with Bloom filters attached to the cloud server. To remove a
file from the data, the data owner simply sends the request to the cloud server,
who removes the file along with the attached Bloom filters. To perform a
search, the data owner computes and sends a trapdoor encryption of the
queried keywords to the cloud to initiate a protocol to search for the requested
keywords in the corpus.
MODULES DESCRIPTION
• CLOUD SERVER MODULE
The cloud server can receive the uploaded and encrypted files from the
data owner and also it receives the file trapdoors. Finally, the cloud responds
to the data owner with the identifiers to the requested documents.
CONCLUSION
• We proposed a strategy to safely store and transmission of the PHRs to the
approved substances in the cloud. The philosophy saves the privacy of the PHRs
and upholds a patient-driven access control to various bits of the PHRs dependent
on the entrance gave by the patients. We executed a fine-grained get to control
technique so that even the legitimate framework clients can't get to those
segments of the PHR for which they are not approved. The PHR proprietors store
the encoded information on the cloud and just the approved clients having
legitimate re-encryption keys gave by a semi-trusted intermediary can decode the
PHRs.
• The job of the semi-believed intermediary is to create and store the general
population/private key sets for the clients in the framework. Notwithstanding
safeguarding the classification and guaranteeing persistent driven access
command over the PHRs, the system additionally regulates the advance and in
reverse access control for withdrawing and the recently joining clients, separately.
Also, we officially investigated and confirmed the working of SeSPHR procedure
through the HLPN, SMT-Lib, and the Z3 solver. The exhibition assessment was
done on the based on time expended to produce keys, encryption and decoding
activities, and turnaround time. The exploratory outcomes display the
reasonability of the SeSPHR philosophy to safely share the PHRs in the cloud
REFERENCE
• K. Gai, M. Qiu, Z. Xiong, and M. Liu, “Privacy-preserving multi-channel
communication in Edge-of-Things,” Future Generation Computer Systems,
85, 2018, pp. 190-200.