Abstract: The Cloud computing system has a wide range of because of its flexibility and scalability method authentication mechanism and TKSE algorithm. The system also allows the owner of the data to set predefined keywords for their files that are uploaded into the cloud. However, data breaches and unauthorized access to cloud data are major concerns. Our system enables clients to access their data using a two method authentication and the user can find this data using a keyword search algorithm.

Keywords: Client side cryptography, Trustworthy keyword search encryption (TKSE), Cloud computing, secret key, Decryption key, Searchable symmetric encryption scheme (SSE), Two method authentication mechanism.

PDF | DOI: 10.17148/IJARCCE.2023.124154

Open chat
Chat with IJARCCE