SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA

Main Article Content

Vidhya Shenigaram
Ladhwe Shri Megha
Rajasekharaiah Matada Kattigehally
Swarnaja Mettu

Abstract

Searchable and Verifiable As a crucial method of cloud security, symmetric encryption enables users to search for encrypted data in the cloud using keywords and validate the accuracy of the results. One of the most prevalent and important requirements for data owners in such schemes is dynamic update for cloud data. To our knowledge, all of the verifiable SSE systems that permit data dynamic update currently in use are based on asymmetric-key cryptography verification, which necessitates time-consuming processes. The sheer volume of cloud data could make the overhead of verification a major burden. Consequently, a crucial unsolved topic is how to implement keyword search over dynamic encrypted cloud data with effective verification. In this research, we
investigate how to accomplish keyword search over dynamically encrypted cloud data with symmetric-key based verification and suggest a workable technique. In order to support the efficient verification of dynamic data, we design a novel Accumulative Authentication Tag (AAT) based on the symmetric-key cryptography to generate an authentication tag for each keyword. Benefiting from the accumulation property of our designed AAT, the authentication tag can be conveniently updated when dynamic operations on cloud data occur. In order to achieve efficient data update, we design a new secure index composed by a search table ST based on the orthogonal list and a verification list VL containing AATs. Owing to the connectivity and the flexibility of ST, the update efficiency can be significantly improved. The security analysis and the performance evaluation results show that the proposed scheme is secure and efficient.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Shenigaram, V. ., Megha, L. S. ., Kattigehally, R. M. ., & Mettu, S. (2020). SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 11(3), 2696–2702. https://doi.org/10.61841/turcomat.v11i3.14483
Section
Articles

References

S. Kamara, C. Papamanthou and T. Roeder,

“Dynamic searchable symmetric encryption,” presented

at ACM Conference on Computer and Communications

Security, pp. 965-976, 2012.

C. Guo, X. Chen, Y. M. Jie, Z. J. Fu, M. C. Li and B.

Feng, “Dynamic Multi-phrase Ranked Search over

Encrypted Data with Symmetric Searchable Encryption,”

in IEEE Transations on Services Computing, vol. 99, No.

, pp. 1-1, 2017.

Z. H. Xia, X. H.Wang, X. M. Sun and Q.Wang, “A

Secure and Dynamic Multi-Keyword Ranked Search

Scheme over Encrypted Cloud Data,” in IEEE

Transactions on Parallel and Distributed Systems, vol. 27,

No. 2, pp. 340-352.

S. Kamara and C. Papamanthou, “Parallel and

Dynamic Searchable Symmetric Encryption,” presented

at the International Conference on Financial

Cryptography and Data Security, pp. 258-274, 2013.

J. B. Yan, Y. Q. Zhang and X. F. Liu, “Secure

multikeyword search supporting dynamic update and

ranked retrieval,” in China Communication, vol. 13, No.

, pp.

-221, 2016.

K. Kurosawa and Y. Ohtaki, “How to Update

Documents Verifiably in Searchable Symmetric

Encryption,” presented at International Conference on

Cryptology and Network Security, pp. 309-328, 2013.

Q. Liu, X. H. Nie, X. H. Liu, T. Peng and J. Wu,

“Verifiable Ranked Search over dynamic encrypted data

in cloud computing,” presented at the IEEE/ACM

International Symposium on Quality of Service, pp. 1-6,

X. H. Nie, Q. Liu, X. H. Liu, T. Peng and Y. P. Lin,

“Dynamic Verifiable Search Over Encrypted Data in

Untrusted Clouds,” presented at the International

Conference Algorithm and Architectures for Parallel

Processing, pp. 557-571, 2016.

X. Y. Zhu, Q. Liu and G. J. Wang, “A Novel

Verifiable and Dynamic Keyword Search Scheme over

Encrypted Data in Cloud Computing,” presented at the

IEEE

Trustcom/BigDataSE/ISPA, pp. 845-851, 2017.

W. H. Sun, X. F. Liu, W. J. Lou. Y. T. Hou and H. Li,

“Catch you if you lie to me: Efficient verifiable

conjunctive keyword search over large dynamic

encrypted cloud Communications(INFOCOM), pp.

-2118, 2015.

. C. Wang, B. S. Zhang, K. Ren, J. M. Roveda, C. W.

Chen and Z. Xu, “A privacy-aware cloud-assisted

healthcare monitoring system via compressive sensing,”

presented at INFOCOM, 2014 Proceedings IEEE, pp.

-2138, 2014.

. X. L. Yuan, X. Y. Wang, J. Lin and C. Wang,

“Privacypreserving deep inspection in outsourced

middleboxes,” presented at The 35th Annual IEEE

International conference on computer communications,

pp. 1-9, 2016.

. J. Yu, K. Ren and C. Wang, “Enabling Cloud

Storage Auditing With Verifiable Outsourcing of Key

Updates,” in IEEE Transactions on Information

Forensics and Security, vol. 11, No. 6, pp. 1362-1375,

. J. Yu, K. Ren and C. Wang, “Enabling Cloud

Storage Auditing With Key-Exposure Resistance,” in

IEEE Transactions on Information Forensics and

Security, vol. 10,

No. 6, pp. 1167-1179, 2015.

. Y. Zhang, J. Yu, R. Hao, C. Wang and K. Ren,

“Enabling Efficient User Revocation in Identity-based

Cloud Storage Auditing for Shared Big Data,” in IEEE

Transaction on Dependable and Secure Computing, DOI

Bookmark:

1109/TDSC.2018.2829880, 2018.

. H. Shacham and B. Waters, “Compact Proofs of

Retrievability,” presented at ASIACRYPT 2008:

Advances in Cryptology, pp. 90-107, 2008.

. Y. B. Miao, J. F. Ma, X. M. Liu, X. H. Li, Q. Jiang

and J. W. Zhang, “Attribute-based keyword search over

hierarchical data in cloud computing,” in IEEE

Transactions on Services Computing,

doi:10.1109/TSC.2017.2757467, 2017.

. Y. B. Miao, J. F. Ma, X. M. Liu, J. Weng, H. W. Li

andH. Li, “Lightweight fine-grained search over

encrypted data in fog computing,” in IEEE Transactions

on Services Computing, DOI:

1109/TSC.2018.2823309, 2018.

. D. X. Song, D. Wagner and A. Perrig, “Practical

Techniques for Searches on Encrypted Data,” presented

at IEEE Symposium on Security and Privacy, pp. 44-55,

. E. J. Goh, “Secure Indexes,” presented at Technical

Report 2003/216, IACR ePrint Cryptography Archive,

ppt.

P. Nagaraj, Dr A. V. Krishna Prasad, Dr. M. Venkat

Dass, Kallepalli Rohit Kumar, “Swine Flu Hotspot

Prediction In Regions Based on Dynamic Hotspot

Detection Algorithm” Journal of Theoretical and Applied

Information Technology(JATIT), 30th Nov-2022,

ISSN:1992-8645, Vol-100, N0.22, Pages- 6535 to 6544.

P.Nagaraj, Dr.A.V. Krishna Prasad, Dr.V.B.Narsimha,

Dr.B.Sujatha “ A swine flu Detection and Location using Machine Learning Techniques and GIS”, International

Journal of Advanced Computer Science and

Application(IJACSA), Vol-13, No.9, 2022.Pages 1001 to

P.Nagaraj , Rajesh Banala and A.V.Krishna Prasad,

“Real Time Face Recognition using Effective Supervised

Machine Learning Algorithms”, Journal of Physics:

Conference Series 1998 (2021) 012007 IOP Publishing

doi:10.1088/1742-6596/1998/1/012007

P.Nagaraj,Dr.M.Venkat Dass, E.Mahender “Breast

Cancer Risk Detection Using XGB Classification

Machine Learning Technique “,IEEE International

Conference on Current Development in Engineering and

Technology (CCET)-2022,Sage university, Bhopal, India,

-24,Dec 2022.

P. Nagaraj, Gunta Sherly Phebe, Anupam Singh, “A

Novel Technique to Classify Face Mask for Human

Safety”, 2021 Sixth ICIIP Published in: 2021 Sixth

International Conference on Image Information

Processing (ICIIP),26-28 Nov. 2021, 10 February 2022

DOI: 10.1109/ICIIP53038.2021.9702607 Publisher:

IEEE Conference Location: Shimla, India

P. Nagaraj and Dr A. V. Krishna Prasad, “A Novel

Technique to Detect the Hotspots Swine Flu Effected

Regions”, Published in: 2021 9th International

Conference on Reliability, Infocom Technologies and

Optimization (Trends and Future

Directions)(ICRITO),15 November 2021

DOI:10.1109/ICRITO51393.20 21.9596422, Electronic

ISBN:978-1-6654-1703-7 CD:978-1-6654-1702-0.