SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA
Main Article Content
Abstract
Searchable and Verifiable As a crucial method of cloud security, symmetric encryption enables users to search for encrypted data in the cloud using keywords and validate the accuracy of the results. One of the most prevalent and important requirements for data owners in such schemes is dynamic update for cloud data. To our knowledge, all of the verifiable SSE systems that permit data dynamic update currently in use are based on asymmetric-key cryptography verification, which necessitates time-consuming processes. The sheer volume of cloud data could make the overhead of verification a major burden. Consequently, a crucial unsolved topic is how to implement keyword search over dynamic encrypted cloud data with effective verification. In this research, we
investigate how to accomplish keyword search over dynamically encrypted cloud data with symmetric-key based verification and suggest a workable technique. In order to support the efficient verification of dynamic data, we design a novel Accumulative Authentication Tag (AAT) based on the symmetric-key cryptography to generate an authentication tag for each keyword. Benefiting from the accumulation property of our designed AAT, the authentication tag can be conveniently updated when dynamic operations on cloud data occur. In order to achieve efficient data update, we design a new secure index composed by a search table ST based on the orthogonal list and a verification list VL containing AATs. Owing to the connectivity and the flexibility of ST, the update efficiency can be significantly improved. The security analysis and the performance evaluation results show that the proposed scheme is secure and efficient.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
S. Kamara, C. Papamanthou and T. Roeder,
“Dynamic searchable symmetric encryption,” presented
at ACM Conference on Computer and Communications
Security, pp. 965-976, 2012.
C. Guo, X. Chen, Y. M. Jie, Z. J. Fu, M. C. Li and B.
Feng, “Dynamic Multi-phrase Ranked Search over
Encrypted Data with Symmetric Searchable Encryption,”
in IEEE Transations on Services Computing, vol. 99, No.
, pp. 1-1, 2017.
Z. H. Xia, X. H.Wang, X. M. Sun and Q.Wang, “A
Secure and Dynamic Multi-Keyword Ranked Search
Scheme over Encrypted Cloud Data,” in IEEE
Transactions on Parallel and Distributed Systems, vol. 27,
No. 2, pp. 340-352.
S. Kamara and C. Papamanthou, “Parallel and
Dynamic Searchable Symmetric Encryption,” presented
at the International Conference on Financial
Cryptography and Data Security, pp. 258-274, 2013.
J. B. Yan, Y. Q. Zhang and X. F. Liu, “Secure
multikeyword search supporting dynamic update and
ranked retrieval,” in China Communication, vol. 13, No.
, pp.
-221, 2016.
K. Kurosawa and Y. Ohtaki, “How to Update
Documents Verifiably in Searchable Symmetric
Encryption,” presented at International Conference on
Cryptology and Network Security, pp. 309-328, 2013.
Q. Liu, X. H. Nie, X. H. Liu, T. Peng and J. Wu,
“Verifiable Ranked Search over dynamic encrypted data
in cloud computing,” presented at the IEEE/ACM
International Symposium on Quality of Service, pp. 1-6,
X. H. Nie, Q. Liu, X. H. Liu, T. Peng and Y. P. Lin,
“Dynamic Verifiable Search Over Encrypted Data in
Untrusted Clouds,” presented at the International
Conference Algorithm and Architectures for Parallel
Processing, pp. 557-571, 2016.
X. Y. Zhu, Q. Liu and G. J. Wang, “A Novel
Verifiable and Dynamic Keyword Search Scheme over
Encrypted Data in Cloud Computing,” presented at the
IEEE
Trustcom/BigDataSE/ISPA, pp. 845-851, 2017.
W. H. Sun, X. F. Liu, W. J. Lou. Y. T. Hou and H. Li,
“Catch you if you lie to me: Efficient verifiable
conjunctive keyword search over large dynamic
encrypted cloud Communications(INFOCOM), pp.
-2118, 2015.
. C. Wang, B. S. Zhang, K. Ren, J. M. Roveda, C. W.
Chen and Z. Xu, “A privacy-aware cloud-assisted
healthcare monitoring system via compressive sensing,”
presented at INFOCOM, 2014 Proceedings IEEE, pp.
-2138, 2014.
. X. L. Yuan, X. Y. Wang, J. Lin and C. Wang,
“Privacypreserving deep inspection in outsourced
middleboxes,” presented at The 35th Annual IEEE
International conference on computer communications,
pp. 1-9, 2016.
. J. Yu, K. Ren and C. Wang, “Enabling Cloud
Storage Auditing With Verifiable Outsourcing of Key
Updates,” in IEEE Transactions on Information
Forensics and Security, vol. 11, No. 6, pp. 1362-1375,
. J. Yu, K. Ren and C. Wang, “Enabling Cloud
Storage Auditing With Key-Exposure Resistance,” in
IEEE Transactions on Information Forensics and
Security, vol. 10,
No. 6, pp. 1167-1179, 2015.
. Y. Zhang, J. Yu, R. Hao, C. Wang and K. Ren,
“Enabling Efficient User Revocation in Identity-based
Cloud Storage Auditing for Shared Big Data,” in IEEE
Transaction on Dependable and Secure Computing, DOI
Bookmark:
1109/TDSC.2018.2829880, 2018.
. H. Shacham and B. Waters, “Compact Proofs of
Retrievability,” presented at ASIACRYPT 2008:
Advances in Cryptology, pp. 90-107, 2008.
. Y. B. Miao, J. F. Ma, X. M. Liu, X. H. Li, Q. Jiang
and J. W. Zhang, “Attribute-based keyword search over
hierarchical data in cloud computing,” in IEEE
Transactions on Services Computing,
doi:10.1109/TSC.2017.2757467, 2017.
. Y. B. Miao, J. F. Ma, X. M. Liu, J. Weng, H. W. Li
andH. Li, “Lightweight fine-grained search over
encrypted data in fog computing,” in IEEE Transactions
on Services Computing, DOI:
1109/TSC.2018.2823309, 2018.
. D. X. Song, D. Wagner and A. Perrig, “Practical
Techniques for Searches on Encrypted Data,” presented
at IEEE Symposium on Security and Privacy, pp. 44-55,
. E. J. Goh, “Secure Indexes,” presented at Technical
Report 2003/216, IACR ePrint Cryptography Archive,
ppt.
P. Nagaraj, Dr A. V. Krishna Prasad, Dr. M. Venkat
Dass, Kallepalli Rohit Kumar, “Swine Flu Hotspot
Prediction In Regions Based on Dynamic Hotspot
Detection Algorithm” Journal of Theoretical and Applied
Information Technology(JATIT), 30th Nov-2022,
ISSN:1992-8645, Vol-100, N0.22, Pages- 6535 to 6544.
P.Nagaraj, Dr.A.V. Krishna Prasad, Dr.V.B.Narsimha,
Dr.B.Sujatha “ A swine flu Detection and Location using Machine Learning Techniques and GIS”, International
Journal of Advanced Computer Science and
Application(IJACSA), Vol-13, No.9, 2022.Pages 1001 to
P.Nagaraj , Rajesh Banala and A.V.Krishna Prasad,
“Real Time Face Recognition using Effective Supervised
Machine Learning Algorithms”, Journal of Physics:
Conference Series 1998 (2021) 012007 IOP Publishing
doi:10.1088/1742-6596/1998/1/012007
P.Nagaraj,Dr.M.Venkat Dass, E.Mahender “Breast
Cancer Risk Detection Using XGB Classification
Machine Learning Technique “,IEEE International
Conference on Current Development in Engineering and
Technology (CCET)-2022,Sage university, Bhopal, India,
-24,Dec 2022.
P. Nagaraj, Gunta Sherly Phebe, Anupam Singh, “A
Novel Technique to Classify Face Mask for Human
Safety”, 2021 Sixth ICIIP Published in: 2021 Sixth
International Conference on Image Information
Processing (ICIIP),26-28 Nov. 2021, 10 February 2022
DOI: 10.1109/ICIIP53038.2021.9702607 Publisher:
IEEE Conference Location: Shimla, India
P. Nagaraj and Dr A. V. Krishna Prasad, “A Novel
Technique to Detect the Hotspots Swine Flu Effected
Regions”, Published in: 2021 9th International
Conference on Reliability, Infocom Technologies and
Optimization (Trends and Future
Directions)(ICRITO),15 November 2021
DOI:10.1109/ICRITO51393.20 21.9596422, Electronic
ISBN:978-1-6654-1703-7 CD:978-1-6654-1702-0.