A new mechanism to search ciphertext data in cloud in fog computing

Ramyasri Guntu, Radhika Krupalani

Abstract


We first present a Lightweight Fine-Grained Ciphertext Search (LFGS) system in mist processing by expanding Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and Searchable Encryption (SE) innovations, which can accomplish fine-grained access  control and keyword search all the while. The LFGS can move fractional computational and capacity overhead from end clients to picked mist nodes. Besides, the fundamental LFGS system is improved to help conjunctive keyword search and attribute update to abstain from returning immaterial query items and illicit gets. The formal security examination demonstrates that the LFGS system can oppose Chosen-Keyword Attack (CKA) and Chosen-Plaintext Attack (CPA), and the recreation. Utilizing a genuine world dataset shows that the LFGS system is effective and possible, practically speaking.


References


J. Li, W. Yao, Y. Zhang, H. Qian, and J. Han, “Flexible and fine grained attribute-based data storage in cloud computing,” IEEE Transactions on Services Computing, vol. 10, no. 5, pp. 785–796, 2017.

H. Yan, J. Li, J. Han, and Y. Zhang, “A novel efficient remote data possession checking protocol in cloud storage,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 1, pp. 78–88, 2017.

C. Stergiou, K. E. Psannis, B. G. Kim, and B. Gupta, “Secure integration of iot and cloud computing,” Future Generation Computer Systems, vol. 78, pp. 964–975, 2018.

X. Liu, R. H. Deng, Y. Yang, H. N. Tran, and S. Zhong, “Hybrid privacy-preserving clinical decision support system in fog–cloud computing,” Future Generation Computer Systems, vol. 78, pp. 825–837, 2018.

D. Wu, F. Zhang, H. Wang, and R. Wang, “Security-oriented opportunistic data forwarding in mobile social networks,” Future Generation Computer Systems, 2017.

D. Wu, S. Si, S. Wu, and R. Wang, “Dynamic trust relationships aware data privacy protection in mobile crowd-sensing,” IEEE Internet of Things Journal, 2017.

D. Wu, J. Yan, H. Wang, D. Wu, and R. Wang, “Social attribute aware incentive mechanism for device-to-device video distribution,” IEEE Transactions on Multimedia, vol. 19, no. 8, pp. 1908–1920, 2017.

J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, “Security and privacy for cloud-based iot: challenges,” IEEE Communications Magazine, vol. 55, no. 1, pp. 26–33, 2017.

D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Proc. Annual International Cryptology Conference on Advances in Cryptology (CRYPTO’11). Springer, 2001, pp. 213–229.

F. Guo, Y. Mu, W. Susilo, H. Hsing, D. S. Wong, and V. Varadharajan, “Optimized identity-based encryption from bilinear pairing for lightweight devices,” IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 2, pp. 211–220, 2017.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM conference on Computer and Communications Security (CCS’06). ACM, 2006, pp. 89–98.

J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proc. IEEE Symposium on Security and Privacy (S&P’07). IEEE, 2007, pp. 321–334.

D. X. Song, D. Wagner, and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. IEEE Symposium on Security and Privacy (S&P’00). IEEE, 2000, pp. 44–55.

D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Proc. Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT’04), vol. 3027. Springer, 2004, pp. 506–522.

Q. Zheng, S. Xu, and G. Ateniese, “Vabks: verifiable attribute based keyword search over outsourced encrypted data,” in Proc. IEEE Conference on Computer Communications (INFOCOM’14). IEEE, 2014, pp. 522–530.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.