Integration of searching and AES encryption in cloud computing

ISSN: 22498958
2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

Abstract

To execute distributed storage and ensure the security of distributed storage, we utilize different encryption strategies. Besides, in the wake of encoding the information, the capacity to look through the information utilizing helpful search tokens is essential. The encryption ought to be sufficiently vigorous to oppose different savage power assaults like keyword guessing attacks (KGA). Moreover, the looking calculation which is executed ought to enable the keywords to scan for the information effectively and successfully. Since information being put away on the cloud has turned out to be ordinary, searchable encryption innovation is a developing area in cloud computing. The information is secured utilizing a solid, asymmetric encryption standard which will naturally encode the information which is gone into forms. The plaintext is covered up and only an approved client can see its genuine substance. Secure encryption innovation guarantees that information protection is undertaken and disposes of the likelihood of any plaintext being perused by undesirable clients. Ventures containing a lot of delicate information will locate that accessible encryption and will limit the opportunity for breaches. The utilization of searches on encoded information will proceed advance as more frameworks are built up that offer this innovation in a faster and increasingly lucid way. Using PHP and Ajax queries, we are able to create a cloud application which takes the data input in forms such as name, phone number, email, etc. The data in the forms is collected and encrypted using AES encryption algorithm and stored in a mySQL database. Moreover, the data is searched and decrypted results are retrieved using an AES token of arbitrary size.

Cite

CITATION STYLE

APA

Prasad, G. S., Yashvin, J., Kumar, S. S., & Keerthi, A. (2019). Integration of searching and AES encryption in cloud computing. International Journal of Engineering and Advanced Technology, 8(4), 228–233.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free