SYMMETRIC-KEY BASED VERIFICATION OF KEYWORD SEARCH OVER DYNAMIC ENCRYPTED CLOUD DATA
Main Article Content
Abstract
Searchable and Verifiable As a crucial method of cloud security, symmetric encryption enables users to search for encrypted data in the cloud using keywords and validate the accuracy of the results. One of the most prevalent and important requirements for data owners in such schemes is dynamic update for cloud data. To our knowledge, all of the verifiable SSE systems that permit data dynamic update currently in use are based on asymmetric-key cryptography verification, which necessitates time-consuming processes. The sheer volume of cloud data could make the overhead of verification a major burden. Consequently, a crucial unsolved topic is how to implement keyword search over dynamic encrypted cloud data with effective verification. In this research, we investigate how to accomplish keyword search over dynamically encrypted cloud data with symmetric-key based verification and suggest a workable technique. In order to support the efficient verification of dynamic data, we design a novel Accumulative Authentication Tag (AAT) based on the symmetric-key cryptography to generate an authentication tag for each keyword. Benefiting from the accumulation property of our designed AAT, the authentication tag can be conveniently updated when dynamic operations on cloud data occur. In order to achieve efficient data update, we design a new secure index composed by a search table ST based on the orthogonal list and a verification list VL containing AATs. Owing to the connectivity and the flexibility of ST, the update efficiency can be significantly improved. The security analysis and the performance evaluation results show that the proposed scheme is secure and efficient.
Downloads
Metrics
Article Details
![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
S. Kamara, C. Papamanthou and T. Roeder, “Dynamic searchable symmetric encryption,” presented at ACM
Conference on Computer and Communications Security, pp. 965-976, 2012.
C. Guo, X. Chen, Y. M. Jie, Z. J. Fu, M. C. Li and B. Feng, “Dynamic Multi-phrase Ranked Search over Encrypted
Data with Symmetric Searchable Encryption,” in IEEE Transations on Services Computing, vol. 99, No. 1939, pp. 1-1,
Z. H. Xia, X. H.Wang, X. M. Sun and Q.Wang, “A Secure and Dynamic Multi-Keyword Ranked Search Scheme
over Encrypted Cloud Data,” in IEEE Transactions on Parallel and Distributed Systems, vol. 27, No. 2, pp. 340-352.
S. Kamara and C. Papamanthou, “Parallel and Dynamic Searchable Symmetric Encryption,” presented at the
International Conference on Financial Cryptography and Data Security, pp. 258-274, 2013.
J. B. Yan, Y. Q. Zhang and X. F. Liu, “Secure multikeyword search supporting dynamic update and ranked
retrieval,” in China Communication, vol. 13, No. 10, pp.
-221, 2016.
K. Kurosawa and Y. Ohtaki, “How to Update Documents Verifiably in Searchable Symmetric Encryption,”
presented at International Conference on Cryptology and Network Security, pp. 309-328, 2013.
Q. Liu, X. H. Nie, X. H. Liu, T. Peng and J. Wu, “Verifiable Ranked Search over dynamic encrypted data in cloud
computing,” presented at the IEEE/ACM International Symposium on Quality of Service, pp. 1-6, 2017.
X. H. Nie, Q. Liu, X. H. Liu, T. Peng and Y. P. Lin, “Dynamic Verifiable Search Over Encrypted Data in Untrusted
Clouds,” presented at the International Conference Algorithm and Architectures for Parallel Processing, pp. 557-571,
X. Y. Zhu, Q. Liu and G. J. Wang, “A Novel Verifiable and Dynamic Keyword Search Scheme over Encrypted Data
in Cloud Computing,” presented at the IEEE
Trustcom/BigDataSE/ISPA, pp. 845-851, 2017.
W. H. Sun, X. F. Liu, W. J. Lou. Y. T. Hou and H. Li, “Catch you if you lie to me: Efficient verifiable conjunctive
keyword search over large dynamic encrypted cloud Communications(INFOCOM), pp. 2110-2118, 2015.
. C. Wang, B. S. Zhang, K. Ren, J. M. Roveda, C. W. Chen and Z. Xu, “A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing,” presented at INFOCOM, 2014 Proceedings IEEE, pp. 2130-2138, 2014.
. X. L. Yuan, X. Y. Wang, J. Lin and C. Wang, “Privacypreserving deep inspection in outsourced middleboxes,”
presented at The 35th Annual IEEE International conference on computer communications, pp. 1-9, 2016.
. J. Yu, K. Ren and C. Wang, “Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates,” in
IEEE Transactions on Information Forensics and Security, vol. 11, No. 6, pp. 1362-1375, 2016.
. J. Yu, K. Ren and C. Wang, “Enabling Cloud Storage Auditing With Key-Exposure Resistance,” in IEEE
Transactions on Information Forensics and Security, vol. 10,
No. 6, pp. 1167-1179, 2015.
. Y. Zhang, J. Yu, R. Hao, C. Wang and K. Ren, “Enabling Efficient User Revocation in Identity-based Cloud
Storage Auditing for Shared Big Data,” in IEEE Transaction on Dependable and Secure Computing, DOI Bookmark:
1109/TDSC.2018.2829880, 2018.
. H. Shacham and B. Waters, “Compact Proofs of Retrievability,” presented at ASIACRYPT 2008: Advances in
Cryptology, pp. 90-107, 2008.
. Y. B. Miao, J. F. Ma, X. M. Liu, X. H. Li, Q. Jiang and J. W. Zhang, “Attribute-based keyword search over
hierarchical data in cloud computing,” in IEEE Transactions on Services Computing, doi:10.1109/TSC.2017.2757467,
. Y. B. Miao, J. F. Ma, X. M. Liu, J. Weng, H. W. Li andH. Li, “Lightweight fine-grained search over encrypted data
in fog computing,” in IEEE Transactions on Services Computing, DOI: 10.1109/TSC.2018.2823309, 2018.
. D. X. Song, D. Wagner and A. Perrig, “Practical Techniques for Searches on Encrypted Data,” presented at IEEE
Symposium on Security and Privacy, pp. 44-55, 2000.
. E. J. Goh, “Secure Indexes,” presented at Technical Report 2003/216, IACR ePrint Cryptography Archive, ppt.
P. Nagaraj, Dr A. V. Krishna Prasad, Dr. M. Venkat Dass, Kallepalli Rohit Kumar, “Swine Flu Hotspot Prediction
In Regions Based on Dynamic Hotspot Detection Algorithm” Journal of Theoretical and Applied Information
Technology(JATIT), 30th Nov-2022, ISSN:1992-8645, Vol-100, N0.22, Pages- 6535 to 6544.
P.Nagaraj, Dr.A.V. Krishna Prasad, Dr.V.B.Narsimha, Dr.B.Sujatha “ A swine flu Detection and Location using
Machine Learning Techniques and GIS”, International Journal of Advanced Computer Science and
Application(IJACSA), Vol-13, No.9, 2022.Pages 1001 to 1009.
P.Nagaraj , Rajesh Banala and A.V.Krishna Prasad, “Real Time Face Recognition using Effective Supervised
Machine Learning Algorithms”, Journal of Physics: Conference Series 1998 (2021) 012007 IOP Publishing
doi:10.1088/1742-6596/1998/1/012007
P.Nagaraj,Dr.M.Venkat Dass, E.Mahender “Breast Cancer Risk Detection Using XGB Classification Machine
Learning Technique “,IEEE International Conference on Current Development in Engineering and Technology
(CCET)-2022,Sage university, Bhopal, India, 23-24,Dec 2022.
P. Nagaraj, Gunta Sherly Phebe, Anupam Singh, “A Novel Technique to Classify Face Mask for Human Safety”,
Sixth ICIIP Published in: 2021 Sixth International Conference on Image Information Processing (ICIIP),26-28
Nov. 2021, 10 February 2022 DOI: 10.1109/ICIIP53038.2021.9702607 Publisher: IEEE Conference Location: Shimla,
India
P. Nagaraj and Dr A. V. Krishna Prasad, “A Novel Technique to Detect the Hotspots Swine Flu Effected Regions”,
Published in: 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and
Future Directions)(ICRITO),15 November 2021 DOI:10.1109/ICRITO51393.20 21.9596422, Electronic ISBN:978-1-
-1703-7 CD:978-1-6654-1702-0.