{"title":"Dual Server Construction using Double Encryption","authors":"Swapna Yenugula, Hussain Shaik, Karthik Chithapuram, Shyam Gajam","doi":"10.1109/ICCMC53470.2022.9753771","DOIUrl":null,"url":null,"abstract":"The inner keyword attack happens when keywords are not entered with high entropy and meaningfulness, which leads to easy guessing and eradication of the semantic security of most keyword searching schemes. To avoid these attacks, the keyword search security mechanism known as public-key encryption and the security models are proposed. A single server does not has the competence of finding out the similarities between keywords. Henceforth, this research study analyzes how far the security models are efficiently used for searching attacks, and proposed novel security mechanisms to define all the aspects of security models and develop novel methods to avoid keyword guessing attacks.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC53470.2022.9753771","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The inner keyword attack happens when keywords are not entered with high entropy and meaningfulness, which leads to easy guessing and eradication of the semantic security of most keyword searching schemes. To avoid these attacks, the keyword search security mechanism known as public-key encryption and the security models are proposed. A single server does not has the competence of finding out the similarities between keywords. Henceforth, this research study analyzes how far the security models are efficiently used for searching attacks, and proposed novel security mechanisms to define all the aspects of security models and develop novel methods to avoid keyword guessing attacks.