Data Identification And Control Mechanism Using Distinguishing, Attacks In Cloud
Keywords:
Outsourced Data Search, Data Centers, Order Preserving Encryption and Differential AttacksAbstract
Cloud environment provides encrypted data management facility to the shared data. Security and privacy are guaranteed with encrypted storage support model. The data management and security requirements are handled by the cloud server only. Encrypted cloud storage methods are adapted to secure the data shared under the clouds. All the outsourced operations are carried out on the encrypted data only. The data and query comparison operations are performed using the encrypted data search mechanism. The Order Preserving Encryption (OPE) technique is adapted to support search process ranked manner. The relevance score and inverted index are protected with the Order Preserving Encryption (OPE). Security and privacy are guaranteed with encrypted storage support model. The Order Preserving Encryption (OPE) technique is adapted to support search process ranked manner. The relevance score and inverted index are protected with the Order Preserving Encryption (OPE). The distribution of encrypted data values are unchanged in the deterministic OPE mechanism. The index distribution is managed to support search operation in One-to-many OPE. One to many OPE is also denoted as probabilistic OPE Scheme. The outsourced data search on encrypted data model is carried out with the binary search algorithm. The distribution and index differences are utilized to estimate the search keyword in differential attacks.
References
- Q. Liu, C. C. Tan, J. Wu and G. Wang, "Efficient information retrieval for ranked queries in cost-effective cloud environments," in Proc. IEEE INFOCOM, Mar. 2012, pp. 2581-2585.
- W. Sun, S. Yu, W. Lou, Y. T. Hou and H. Li, "Protecting your right: Attribute-based keyword search with Fine-grained owner-enforced search authorization in the cloud," in Proc. IEEE INFOCOM, Apr./May 2014,pp. 226-234.
- Q. Zheng, S. Xu and G. Ateniese, "VABKS: Verifiable attribute based keyword search over outsourced encrypted data," in Proc. IEEE INFOCOM, Apr. 2014, pp. 522-530.
- Hongwei Li, Dongxiao Liu, Tom H. Luan and Xuemin (Sherman) Shen, "Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage”, IEEE Transactions On Emerging Topics In Computing,? 6 March, 2015.
- J. Yu, P. Lu, Y. Zhu, G. Xue and M. Li, "Toward secure multikeyword top-k retrieval over encrypted cloud data," IEEE Trans. Dependable Secure Comput., vol. 10, no. 4, pp. 239-250, Jul./Aug. 2013.
- D. Cash et al., "Dynamic searchable encryption in very-large databases: Data structures and implementation," in Proc. NDSS, Feb. 2014.
- B.Wang, S.Yu,W. Lou and Y. T. Hou, "Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud," in Proc. IEEE INFOCOM, Apr./May 2014, pp. 2112-2120.
- C. Wang, N. Cao, J. Li, K. Ren and W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst. (ICDCS), Jun. 2010, pp. 253-262.
- Amelie Chi Zhou, Bingsheng He and Cheng Liu, "Monetary Cost Optimizations for Hosting Workflow-as-a-Service in IaaS Clouds”, IEEE Transactions on Cloud Computing, Jan-Mar 2016.
- D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rou and M. Steiner, "Highly-scalable searchable symmetric encryption with support for Boolean queries," in Proc. CRYPTO, 2013, pp. 353-373.
- B. Zhang and F. Zhang, "An efficient public key encryption with conjunctive subset keywords search," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 262-267, Jan. 2011.
- C. Wang, N. Cao, K. Ren and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
- M. Naveed, M. Prabhakaran and C. A. Gunter, "Dynamic searchable encryption via blind storage," in Proc. IEEE Symp. Secur. Privacy, May 2014, pp. 639-654.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.