Data Identification And Control Mechanism Using Distinguishing, Attacks In Cloud

Authors

  • S. Meena  M.Phil Full time Research Scholar, PG& Research Department of Computer Science
  • Dr. N. Kowsalya  Assistant Professor, Department of Computer Applications,Vivekananda College of Arts & Sciences for Women (Autonomous), Namakkal, Tamil Nadu, India

Keywords:

Outsourced Data Search, Data Centers, Order Preserving Encryption and Differential Attacks

Abstract

Cloud environment provides encrypted data management facility to the shared data. Security and privacy are guaranteed with encrypted storage support model. The data management and security requirements are handled by the cloud server only. Encrypted cloud storage methods are adapted to secure the data shared under the clouds. All the outsourced operations are carried out on the encrypted data only. The data and query comparison operations are performed using the encrypted data search mechanism. The Order Preserving Encryption (OPE) technique is adapted to support search process ranked manner. The relevance score and inverted index are protected with the Order Preserving Encryption (OPE). Security and privacy are guaranteed with encrypted storage support model. The Order Preserving Encryption (OPE) technique is adapted to support search process ranked manner. The relevance score and inverted index are protected with the Order Preserving Encryption (OPE). The distribution of encrypted data values are unchanged in the deterministic OPE mechanism. The index distribution is managed to support search operation in One-to-many OPE. One to many OPE is also denoted as probabilistic OPE Scheme. The outsourced data search on encrypted data model is carried out with the binary search algorithm. The distribution and index differences are utilized to estimate the search keyword in differential attacks.

References

  1. Q. Liu, C. C. Tan, J. Wu and G. Wang, "Efficient information retrieval for ranked queries in cost-effective cloud environments," in Proc. IEEE INFOCOM, Mar. 2012, pp. 2581-2585.
  2. W. Sun, S. Yu, W. Lou, Y. T. Hou and H. Li, "Protecting your right: Attribute-based keyword search with Fine-grained owner-enforced search authorization in the cloud," in Proc. IEEE INFOCOM, Apr./May 2014,pp. 226-234.
  3. Q. Zheng, S. Xu and G. Ateniese, "VABKS: Verifiable attribute based keyword search over outsourced encrypted data," in Proc. IEEE INFOCOM, Apr. 2014, pp. 522-530.
  4. Hongwei Li, Dongxiao Liu, Tom H. Luan and Xuemin (Sherman) Shen, "Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage”, IEEE Transactions On Emerging Topics In Computing,? 6 March, 2015.
  5. J. Yu, P. Lu, Y. Zhu, G. Xue and M. Li, "Toward secure multikeyword top-k retrieval over encrypted cloud data," IEEE Trans. Dependable Secure Comput., vol. 10, no. 4, pp. 239-250, Jul./Aug. 2013.
  6. D. Cash et al., "Dynamic searchable encryption in very-large databases: Data structures and implementation," in Proc. NDSS, Feb. 2014.
  7. B.Wang, S.Yu,W. Lou and Y. T. Hou, "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud," in Proc. IEEE INFOCOM, Apr./May 2014, pp. 2112-2120.
  8. C. Wang, N. Cao, J. Li, K. Ren and W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst. (ICDCS), Jun. 2010, pp. 253-262.
  9. Amelie Chi Zhou, Bingsheng He and Cheng Liu, "Monetary Cost Optimizations for Hosting Workflow-as-a-Service in IaaS Clouds”, IEEE Transactions on Cloud Computing, Jan-Mar 2016.
  10. D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rou and M. Steiner, "Highly-scalable searchable symmetric encryption with support for Boolean queries," in Proc. CRYPTO, 2013, pp. 353-373.
  11. B. Zhang and F. Zhang, "An efficient public key encryption with conjunctive subset keywords search," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 262-267, Jan. 2011.
  12. C. Wang, N. Cao, K. Ren and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
  13. M. Naveed, M. Prabhakaran and C. A. Gunter, "Dynamic searchable encryption via blind storage," in Proc. IEEE Symp. Secur. Privacy, May 2014, pp. 639-654.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
S. Meena, Dr. N. Kowsalya, " Data Identification And Control Mechanism Using Distinguishing, Attacks In Cloud, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 6, pp.368-372, July-August-2017.