Maintaining Confidentiality with Searchable Encryption Process Using Metadata Keys

Authors

  • Anusha B.  Department of CSE , Global Institute of Engineering and Technology, Melvisharam, Tamil Nadu, India
  • Daphney Joann J.  Assistant Professor, Department of CSE , Global Institute of Engineering and Technology, Melvisharam, Tamil Nadu, India

Keywords:

Searchable Encryption, Cloud Security, Privacy Preserving Scheme, Secure Hash Algorithm, Attribute Based Encryption; Anonymity.

Abstract

Searchable Encryption process encourages the server present in the cloud to search encoded information without decoding it. Cloud computing encourages the process of storing, accessing and retrieving the data’s and programs over the internet without any computer hardware. In this paper, we discussed about how to maintain confidentiality of the data’s and information which are present in the cloud. Cloud encourages encryption process in a unique manner in which the exchanges of data’s are done using a single encryption key. We use an algorithm called PSE algorithm (Privacy Preserving Scheme with SHA-12) which is a symmetric block cipher algorithm that takes plain text in 128 bits and converts them to cipher text using keys 128,192 and 256 bits respectively. PSE uses a technique called SHA-12 which are being designed to keep data in a secured format and it does its function in bitwise operation. Here it is mainly used to generate Meta data keys for the files and documents which contain sensitive information’s. Simulation Results Shows the Search Operation of Keywords and Trapdoor performance.

References

  1. V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attributebased encryption for fine-grained access control of encrypted data. In Proceedings of the ACM Conference on Computer and Communications Security, pp. 89–98, 2006.
  2. T. Nishide, K. Yoneyama, and K. Ohta. Attribute-based encryption with partially hidden encryptor-specified access structures. In Proceedings of Applied Cryptography and Network Security, LNCS 5037, Springer, pp. 111–129,2008.
  3. J. Li, K. Ren, B. Zhu, and Z. Wan. Privacy-aware attributebased encryption with user accountability. In Proceedings of Information Security, LNCS 5735, Springer, pp. 347–362, 2009.
  4. Y. Zhang, X. Chen, J. Li, D. S. Wong, and H. Li.Anonymous attribute-based encryption supporting efficient decryption test. In Proceedings of the ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 511–516, 2013.
  5. P. Chaudhari, M. L. Das, and A. Mathuria. On Anonymous Attribute Based Encryption. In Proceedings of the International Conference on Information Systems Security,LNCS 9478, Springer, pp. 378–392, 2015.
  6. R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security. 19(5), pp. 895–934, 2011.
  7. D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. C. Rou, M. Steiner, Highly-scalable searchable symmetric encryption with support for boolean queries. In Advances in Cryptology-CRYPTO, Springer, pp. 353-373, 2013
  8. S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, M. Steiner. Outsourced symmetric private information retrieval. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, ACM pp. 875-888, 2013.
  9. C. Wang, W. Li, Y. Li, and X. Xu. A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In Proceedings of Cyberspace Safety and Security, LNCS 8300, Springer, pp. 377–386, 2013.
  10. Q. Zheng, X. Shouhuai, and G. Ateniese. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In Proceedings of IEEE Conference on Computer Communications (INFOCOM), pp. 522–530, 2014.
  11. P. Liu, W. Jianfneg, M. Hua, and N. Haixin. Efficient verifiable public key encryption with keyword search based on KP-ABE. In Proceedings of International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 584–589, 2014.
  12. K. Liang andW. Susilo. Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. In IEEE Transactions on Information Forensics and Security 10(9):1981–1992,2015.
  13. J. Li and L. Zhang. Attribute-based keyword search and data access control in cloud. In Proceedings of International Conference on Computational Intelligence and Security, pp. 382–386, 2014.
  14. Q. Dong, Z. Guan, and Z. Chen. Attribute-based keyword search efficiency enhancement via an online/offline approach. In Proceedings of IEEE International Conference on Parallel and Distributed Systems, pp. 298–305, 2015.
  15. B. Hu, Q. Liu, X. Liu, T. Peng, G. Wang, and J. Wu. DABKS: Dynamic attribute-based keyword search in cloud computing. In Proceedings of IEEE International Conference on Communications, pp. 1–6, 2017.
  16. D. Koo, J. Hur, and H. Yoon. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. In Computers & Electrical Engineering, Elsevier, pp.34–46, 2013.
  17. P. Chaudhari and M. L. Das. On the Security of a Searchable Anonymous Attribute Based Encryption. In International Conference on Mathematics and Computing, Communications in Computer and Information Sciencebook series (CCIS), vol. 655, Springer, pp. 16-25,2017
  18. J. Shi, J. Lai, Y. Li, R. H. Deng, and J. Weng. Authorized keyword search on encrypted data. In Proceedings of Computer Security, LNCS 8712, Springer, pp. 419-435, 2014.
  19. H. Wang, X. Dong, and Z. Cao. Multi-value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search. In IEEE Transactions on Services Computing,99, 2017.
  20. P. Chaudhari and M. L. Das. A2BSE: Anonymous Attribute Based Searchable Encryption. In Proceedings of ISEA Asia Security and Privacy Conference, IEEE, 2017.
  21. D. Cash, P. Grubbs, J. Perry, T. Ristenpart. Leakageabuse attacks against searchable encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, ACM, pp. 668–679, 2015.
  22. Y. Zhang, J. Katz, and C. Papamanthou. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. In Proceedings of USENIX Security Symposium, pp. 707–720, 2016.
  23. M. Lichman. UCI Machine Learning Repository. http://archive.ics.uci.edu/ml [Last Accessed 23 January 2017]
  24. The Pairing-Based Cryptography Library.https://crypto.stanford.edu/pbc/ [Last Accessed 20 February 2017]

Downloads

Published

2021-04-10

Issue

Section

Research Articles

How to Cite

[1]
Anusha B., Daphney Joann J., " Maintaining Confidentiality with Searchable Encryption Process Using Metadata Keys, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 9, Issue 1, pp.229-239, March-April-2021.