Академический Документы
Профессиональный Документы
Культура Документы
Available at http://www.ijcsonline.com/
Abstract
The existing public-key encryption schemes which are semantically secure, take linear search time with the total number
of ciphertexts, thus making data retrieval from databases difficult or time consuming. So, in order to rectify the current
problem, the paper proposes SPCHS Methodology for Fast Keyword Search. In Searchable Public Key Ciphertexts with
Hidden Structures (SPCHS), the concept of hidden structures is introduced. Here, the concept of filtering is used
efficiently. This in turn, makes data retrieval from large scale databases far easier by reducing the time complexity as
well as guaranteeing efficient performance. The time complexity of our scheme depends only on the actual number of
generated ciphertexts rather than all the number of ciphertexts. Given a keyword for a file search, based on the filtering
mechanism we specify the file extension or type which has to be returned thus ruling out all the other possibilities which
not only makes searching easier but also saves time complexity. This article gives an overview about SPCHS Mechanism
and the various methods adopted.
Keywords: Public-Key searchable encryption, semantic security, Hidden Structures, similarity search.
I.
INTRODUCTION
149 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
S Balasubramanian et al
SPCHS METHODOLGY
D. Our Work
150 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
S Balasubramanian et al
B. Different Steps
The different steps involved in SPCHS Methodology
are as follows:
The user first runs The Fast Keyword Search process by
giving a request and the corresponding response is
generated to the screen.
Once the process is executed, a screen is generated
where the admin simply logs on to by inputting the
username and the one time password generated onto his
specified email correctly. New users can register onto the
system as and when they need to. Once this is successful,
the admin performs the file management process where a
new connection is established between the client and the
server and he initiates the process by approving or blocking
the users. The feature of random password generation is
done at the server side.
Once login is successful, the owner uploads the data
preferably a text to the server. Then the user logs on to the
system and generates all the keywords which occur
frequently in out text file based on similarity search. The
uploaded files are then given statuses by the trapdoor
whether to allow or deny the request. If the request is
accepted, then the file can be downloaded using the private
key of the receiver and the downloaded content will be in
the encrypted form. The document can be decrypted
properly by the proper private key which is known only to
the receiver. The change password process helps the
currently logged user to change the password as and when
required. File access log makes sure that they can also view
files for which they have access to.
C. Comparison Table
151 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016
S Balasubramanian et al
III.
[2]
[3]
[4]
[5]
[6]
[7]
[8]
152 | International Journal of Computer Systems, ISSN-(2394-1065), Vol. 03, Issue 02, February, 2016