Secure Searchable Based Asymmetric Encryption in Cloud Computing

نویسندگان

  • Majid Nateghizad
  • Majid Bakhtiari
  • Mohd Aizaini Maarof
چکیده

Cloud computing offers a wide range of services such as user demand network, operating systems, hardware, software and resources. These encouraging facilities and hassle free management of computing resources have attracted many users to outsource their data to untrusted servers. Cloud server may leak documents to unauthorized parties. Therefore, all documents need to be transmitted in ciphertext mode to keep user data confidential against an untrusted Cloud Service Provider (CSP). However, encrypting documents prevents user to search the outsourced documents directly. Regular encryption algorithms such as AES, RC4 and DES mechanisms have searching limitation; in which the whole ciphertext needs to be retrieved and then decrypt before search procedure can be performed. Recently, many advanced encryption techniques have been proposed to enable search capabilities for users. Generally, the keyword based search approach is used. This approach allows users to retrieve only those documents contain special keywords. However, searchable encryption algorithms suffer from security problems. This paper first explains Public key Encryption with Keyword Search (PEKS) algorithm and then proposes an improved secure searchable encryption algorithm based on Indistinguishability under Adaptive Chosen Ciphertext Attack (IND-CCA2). The proposed searchable encryption is mathematically proven secure and it has the ability to perform a search within encrypted data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage

Mobile cloud computing is referred as the combination of cloud computing and mobile networks to bring benefits for both mobile users and cloud computing providers. While once the data of mobile users is outsourced to the cloud, it is a formidable and challenging task for the data owners to realize both the data confidentiality and the utilization because it seems unachievable to search and retr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014