Integration of Searching and AES Encryption in Cloud Computing
Gudapati Syam Prasad1, J Yashvin, S Sunil Kumar2, A Keerthi3
1Dr. Gudapati Syam Prasad, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (A.P), India.
2J Yashvin, Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (A.P), India.
3S Sunil Kumar, Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (A.P), India.
4A Keerthi, Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur (A.P), India.
Manuscript received on 18 April 2019 | Revised Manuscript received on 25 April 2019 | Manuscript published on 30 April 2019 | PP: 228-233 | Volume-8 Issue-4, April 2019 | Retrieval Number: D5993048419/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: To execute distributed storage and ensure the security of distributed storage, we utilize different encryption strategies. Besides, in the wake of encoding the information, the capacity to look through the information utilizing helpful search tokens is essential. The encryption ought to be sufficiently vigorous to oppose different savage power assaults like keyword guessing attacks (KGA). Moreover, the looking calculation which is executed ought to enable the keywords to scan for the information effectively and successfully. Since information being put away on the cloud has turned out to be ordinary, searchable encryption innovation is a developing area in cloud computing. The information is secured utilizing a solid, asymmetric encryption standard which will naturally encode the information which is gone into forms. The plaintext is covered up and only an approved client can see its genuine substance. Secure encryption innovation guarantees that information protection is undertaken and disposes of the likelihood of any plaintext being perused by undesirable clients. Ventures containing a lot of delicate information will locate that accessible encryption and will limit the opportunity for breaches. The utilization of searches on encoded information will proceed advance as more frameworks are built up that offer this innovation in a faster and increasingly lucid way. Using PHP and Ajax queries, we are able to create a cloud application which takes the data input in forms such as name, phone number, email, etc. The data in the forms is collected and encrypted using AES encryption algorithm and stored in a mySQL database. Moreover, the data is searched and decrypted results are retrieved using an AES token of arbitrary size.
Keywords: Secure Cloud Storage, Encryption, Keyword Guessing Attack, Searching Algorithm, Data Privacy
Scope of the Article: Cloud Computing