Fine-grained access control and data confidentiality in public cloud

Ssurya Kiran D, Radhika Krupalini P

Abstract


We initially propose an adaptable structure where user can utilize his property estimations and a hunt search to locally determine pursuit ability, and a record can be recovered just when its keywords coordinate the query and the user's trait esteems can pass the approach check. Utilizing this structure, we propose a novel plan called Keyword Search with Access Control (KSAC), which empowers keyword seek with access power over encoded information.

Keyword Search with Access Control (KSAC) uses ongoing cryptographic crude called various leveled predicate encryption to implement fine-grained access control and perform multi-field query search. In the interim, it likewise bolsters the hunt capacity deviation, and accomplishes productive access arrangement update just as catchphrase update without bargaining information security. To improve the protection, Keyword Search With Access Control (KSAC) likewise plants commotions in the search to conceal users' entrance benefits. Serious assessments on genuine world dataset are directed to approve the appropriateness of the proposed plan and exhibit its insurance for user's entrance benefit.


References


ZhirongShen, JiwuShu, and Wei Xue. Keyword search with access control over encrypted data in cloud computing. In Proc. of IEEE/ACM IWQoS, 2014.

JiwuShu, ZhirongShen, and Wei Xue. Shield: A stackable secure storage system for file sharing in public storage. Journal of Parallel and Cloud Computing, 74(9):2872–2883, 2014.

MA Tinghuai, ZHOU Jinjuan, TANG Meili, TIAN Yuan, ALDHELAAN Abdullah, AL-RODHAAN Mznah, and LEE Sungyoung. Social network and tag sources based augmenting collaborative recommender system. IEICE transactions on Information and Systems, 98(4):902–910, 2015.

YongjunRen, JianShen, Jin Wang, Jin Han, and Sungyoung Lee.Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology, 16(2):318, 2015.

JiwuShu, ZhirongShen, Wei Xue, and Yingxun Fu. Secure storage system and key technologies. In Design Automation Conference (ASPDAC), 2013 18th Asia and South Pacific, pages 376–383, 2013.

Philippe Golle, Jessica Staddon, and Brent Waters. Secure conjunctive keyword search over encrypted data. In Proc. of ACNS.Springer, 2004.

Yan-Cheng Chang and Michael Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In Applied Cryptography and Network Security, 2005.

Dan Boneh, Giovanni Di Crescenzo, RafailOstrovsky, and Giuseppe Persiano.Public key encryption with keyword search.In Proc. Of Eurocrypt, pages 506–522, 2004.

Elaine Shi, John Bethencourt, T-HH Chan, Dawn Song, and Adrian Perrig. Multi-dimensional range query over encrypted data. In Proc. Of IEEE Symposium on Security and Privacy., 2007.

Dawn Xiaoding Song, David Wagner, and Adrian Perrig.Practical techniques for searches on encrypted data. In Proc. of IEEE Symposium on Security and Privacy., 2000.

Cong Wang, Ning Cao, Jin Li, KuiRen, and Wenjing Lou. Secure ranked keyword search over encrypted cloud data. In Proc. of IEEE ICDCS, 2010.

Brent R Waters, Dirk Balfanz, Glenn Durfee, and Diana K Smetters. Building an encrypted and searchable audit log.In Proc. of NDSS, 2004.

Eu-Jin Goh et al. Secure indexes. IACR Cryptology ePrint Archive, 2003:216, 2003.

Dan Boneh and Brent Waters.Conjunctive, subset, and range queries on encrypted data.In In Proc. of TCC.Springer, 2007.

Changyu Dong, Giovanni Russello, and NarankerDulay.Shared and searchable encrypted data for untrusted servers. Journal of Computer Security, 19(3):367–397, 2011.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.