SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA

Main Article Content

Mugireddy Satya Narayanareddy
Lekireddy Rajasekharreddy
Isani Swetha
P V Jagadeeswara Prasad

Abstract

Searchable and Verifiable As a crucial method of cloud security, symmetric encryption enables users to search for encrypted data in the cloud using keywords and validate the accuracy of the results. One of the most prevalent and important requirements for data owners in such schemes is dynamic update for cloud data. To our knowledge, all of the verifiable SSE systems that permit data dynamic update currently in use are based on asymmetric-key cryptography verification, which necessitates time-consuming processes. The sheer volume of cloud data could make the overhead of verification a major burden. Consequently, a crucial unsolved topic is how to implement keyword search over dynamic encrypted cloud data with effective verification. In this research, we investigate how to accomplish keyword search over dynamically encrypted cloud data with symmetric-key based verification and suggest a workable technique. In order to support the efficient verification of dynamic data, we design a novel Accumulative Authentication Tag (AAT) based on the symmetric-key cryptography to generate an authentication tag for each keyword. Benefiting from the accumulation property of our designed AAT, the authentication tag can be conveniently updated when dynamic operations on cloud data occur. In order to achieve efficient data update, we design a new secure index composed by a search table ST based on the orthogonal list and a verification list VL containing AATs. Owing to the connectivity and the flexibility of ST, the update efficiency can be significantly improved. The security analysis and the performance evaluation results show that the proposed scheme is secure and efficient.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Narayanareddy, M. S., Rajasekharreddy, L. ., Swetha, I. ., & Prasad, P. V. J. . (2020). SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 11(3), 2736–2741. https://doi.org/10.61841/turcomat.v11i3.14517
Section
Research Articles

References

S. Kamara, C. Papamanthou and T. Roeder, “Dynamic searchable symmetric encryption,” presented at ACM

Conference on Computer and Communications Security, pp. 965-976, 2012.

C. Guo, X. Chen, Y. M. Jie, Z. J. Fu, M. C. Li and B. Feng, “Dynamic Multi-phrase Ranked Search over Encrypted

Data with Symmetric Searchable Encryption,” in IEEE Transations on Services Computing, vol. 99, No. 1939, pp. 1-1,

Z. H. Xia, X. H.Wang, X. M. Sun and Q.Wang, “A Secure and Dynamic Multi-Keyword Ranked Search Scheme

over Encrypted Cloud Data,” in IEEE Transactions on Parallel and Distributed Systems, vol. 27, No. 2, pp. 340-352.

S. Kamara and C. Papamanthou, “Parallel and Dynamic Searchable Symmetric Encryption,” presented at the

International Conference on Financial Cryptography and Data Security, pp. 258-274, 2013.

J. B. Yan, Y. Q. Zhang and X. F. Liu, “Secure multikeyword search supporting dynamic update and ranked

retrieval,” in China Communication, vol. 13, No. 10, pp.

-221, 2016.

K. Kurosawa and Y. Ohtaki, “How to Update Documents Verifiably in Searchable Symmetric Encryption,”

presented at International Conference on Cryptology and Network Security, pp. 309-328, 2013.

Q. Liu, X. H. Nie, X. H. Liu, T. Peng and J. Wu, “Verifiable Ranked Search over dynamic encrypted data in cloud

computing,” presented at the IEEE/ACM International Symposium on Quality of Service, pp. 1-6, 2017.

X. H. Nie, Q. Liu, X. H. Liu, T. Peng and Y. P. Lin, “Dynamic Verifiable Search Over Encrypted Data in Untrusted

Clouds,” presented at the International Conference Algorithm and Architectures for Parallel Processing, pp. 557-571,

X. Y. Zhu, Q. Liu and G. J. Wang, “A Novel Verifiable and Dynamic Keyword Search Scheme over Encrypted Data

in Cloud Computing,” presented at the IEEE

Trustcom/BigDataSE/ISPA, pp. 845-851, 2017.

W. H. Sun, X. F. Liu, W. J. Lou. Y. T. Hou and H. Li, “Catch you if you lie to me: Efficient verifiable conjunctive

keyword search over large dynamic encrypted cloud Communications(INFOCOM), pp. 2110-2118, 2015.

. C. Wang, B. S. Zhang, K. Ren, J. M. Roveda, C. W. Chen and Z. Xu, “A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing,” presented at INFOCOM, 2014 Proceedings IEEE, pp. 2130-2138, 2014.

. X. L. Yuan, X. Y. Wang, J. Lin and C. Wang, “Privacypreserving deep inspection in outsourced middleboxes,”

presented at The 35th Annual IEEE International conference on computer communications, pp. 1-9, 2016.

. J. Yu, K. Ren and C. Wang, “Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates,” in

IEEE Transactions on Information Forensics and Security, vol. 11, No. 6, pp. 1362-1375, 2016.

. J. Yu, K. Ren and C. Wang, “Enabling Cloud Storage Auditing With Key-Exposure Resistance,” in IEEE

Transactions on Information Forensics and Security, vol. 10,

No. 6, pp. 1167-1179, 2015.

. Y. Zhang, J. Yu, R. Hao, C. Wang and K. Ren, “Enabling Efficient User Revocation in Identity-based Cloud

Storage Auditing for Shared Big Data,” in IEEE Transaction on Dependable and Secure Computing, DOI Bookmark:

1109/TDSC.2018.2829880, 2018.

. H. Shacham and B. Waters, “Compact Proofs of Retrievability,” presented at ASIACRYPT 2008: Advances in

Cryptology, pp. 90-107, 2008.

. Y. B. Miao, J. F. Ma, X. M. Liu, X. H. Li, Q. Jiang and J. W. Zhang, “Attribute-based keyword search over

hierarchical data in cloud computing,” in IEEE Transactions on Services Computing, doi:10.1109/TSC.2017.2757467,

. Y. B. Miao, J. F. Ma, X. M. Liu, J. Weng, H. W. Li andH. Li, “Lightweight fine-grained search over encrypted data

in fog computing,” in IEEE Transactions on Services Computing, DOI: 10.1109/TSC.2018.2823309, 2018.

. D. X. Song, D. Wagner and A. Perrig, “Practical Techniques for Searches on Encrypted Data,” presented at IEEE

Symposium on Security and Privacy, pp. 44-55, 2000.

. E. J. Goh, “Secure Indexes,” presented at Technical Report 2003/216, IACR ePrint Cryptography Archive, ppt.

P. Nagaraj, Dr A. V. Krishna Prasad, Dr. M. Venkat Dass, Kallepalli Rohit Kumar, “Swine Flu Hotspot Prediction

In Regions Based on Dynamic Hotspot Detection Algorithm” Journal of Theoretical and Applied Information

Technology(JATIT), 30th Nov-2022, ISSN:1992-8645, Vol-100, N0.22, Pages- 6535 to 6544.

P.Nagaraj, Dr.A.V. Krishna Prasad, Dr.V.B.Narsimha, Dr.B.Sujatha “ A swine flu Detection and Location using

Machine Learning Techniques and GIS”, International Journal of Advanced Computer Science and

Application(IJACSA), Vol-13, No.9, 2022.Pages 1001 to 1009.

P.Nagaraj , Rajesh Banala and A.V.Krishna Prasad, “Real Time Face Recognition using Effective Supervised

Machine Learning Algorithms”, Journal of Physics: Conference Series 1998 (2021) 012007 IOP Publishing

doi:10.1088/1742-6596/1998/1/012007

P.Nagaraj,Dr.M.Venkat Dass, E.Mahender “Breast Cancer Risk Detection Using XGB Classification Machine

Learning Technique “,IEEE International Conference on Current Development in Engineering and Technology

(CCET)-2022,Sage university, Bhopal, India, 23-24,Dec 2022.

P. Nagaraj, Gunta Sherly Phebe, Anupam Singh, “A Novel Technique to Classify Face Mask for Human Safety”,

Sixth ICIIP Published in: 2021 Sixth International Conference on Image Information Processing (ICIIP),26-28

Nov. 2021, 10 February 2022 DOI: 10.1109/ICIIP53038.2021.9702607 Publisher: IEEE Conference Location: Shimla,

India

P. Nagaraj and Dr A. V. Krishna Prasad, “A Novel Technique to Detect the Hotspots Swine Flu Effected Regions”,

Published in: 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and

Future Directions)(ICRITO),15 November 2021 DOI:10.1109/ICRITO51393.20 21.9596422, Electronic ISBN:978-1-

-1703-7 CD:978-1-6654-1702-0.