Secure File Storage in Cloud Computing Using Dual Server Encryption and Decryption Techniques
K. Siri Chandana1, B. Nirmala2, G. Sai Neelima3

1K. Siri Chandana, UG Scholar, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai (Tamil Nadu), India.
2B. Nirmala, Assistant Professor, Faculty of Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai (Tamil Nadu), India.
3G. Sai Neelima, UG Scholar, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam, Chennai (Tamil Nadu), India.
Manuscript received on 26 April 2019 | Revised Manuscript received on 08 May 2019 | Manuscript Published on 17 May 2019 | PP: 481-485 | Volume-7 Issue-6S4 April 2019 | Retrieval Number: F10990476S419/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Searchable encryption is of increasing enthusiasm for guaranteeing the advantage safeguard in comfortable available distributed storage. In the course of this work, we are likely to compare the safeguard of an outstanding cryptologic crude, to be unique Public Key Encryption with Keyword Search (PEKS) that’s terribly useful in more than a few makes use of-of allotted storage. Sadly, it’s been incontestable that the normal PEKS structure experiences a characteristic uncertainty referred to as inside keyword Guessing attack (KGA) propelled through the malignant server. To control this security weak spot, we are likely to suggest one more PEKS constitution named twin-Server Public Key Encryption with key phrase Search (DS-PEKS). As yet another long-established obligation, To delineate the likelihood of our new process, we are likely to supplies an informed intellectual illustration of the total structure from a DDH-founded LH-SPHF and show that it’s going to accomplish the stable protection towards inside KGA.
Keywords: Key Phrase Search, Relaxed Cloud Storage, Encryption, Inside of Keyword Guessing Assault, Gentle Projective Hash Perform, Diffie-Hellman Language.
Scope of the Article: Cloud Computing