A Review on Revocable and Searchable Attribute-Based Encryption Scheme over Cloud Data

Authors

  • Bhagyashri Khade  M. Tech Scholar, Department of Computer Science & Engineering, V. M. Institute of Engineering and Technology, Nagpur, Maharashtra, India
  • Prof. Minakshi Ramteke  Assistant Professor, Department of Computer Science & Engineering, V. M. Institute of Engineering and Technology, Nagpur, Maharashtra, India
  • Prof. Gurudev Sawarkar  

Keywords:

Attribute-Based Encryption, Attributes Revocation, Fine-Grained Access Control, Keywords Search, Mobile Cloud Storage.

Abstract

Mobile cloud processing gives the capacity of sharing of the information that is encoded with the various client through cloud Storage. This raises the purpose of security issues over information classification and confirmation access control. The visually impaired storage permits a customer to store the number of documents on the remote server, where remote server isn't acquainted with the records that are put away in it. In Attribute-based encryption (ABE), the encryption is performed on the attributes and permits just those clients to access the information if the attributes are accessible in their ID. This paper proposes the semantic search for encoded multi-watchword positioned over the cloud information. The multi-keyword positioned plan can search based on the outcomes acquired in positioned search with effective exactness by utilizing the k-nearest Neighbor method. It likewise utilizes ABE innovation with the adjustment that limits the confinement of ABE. To make the search productive visually impaired storage framework is utilized to conceal access control issues in a searchable encryption system. The security examination conspire is utilized to accomplish confirmation and secrecy of the record.

References

  1. SHANGPING WANG, DUO ZHANG, YALING ZHANG, AND LIHUA LIU, "Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage", IEEE Access Volume 6, June 2018.
  2. Y. Li, F. Zhou, Y. Qin, M. Lin, and Z. Xu, ``Integrity-veri_able conjunctive keyword searchable encryption in cloud storage,'' Int. J. Inf. Secur., vol. 17, pp. 1_20, Nov. 2017, doi: 10.1007/s10207-017-0394-9.
  3. D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.-C. Rosu, and M. Steiner, Dynamic searchable encryption in very large databases: Data structures and implementation, in Proc. of NDSS, vol. 14, 2014.
  4. J. Lai, R. Deng, C. Guan, and J. Weng, “Attribute-based Encryption with Verifiable Outsourced Decryption”, IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
  5. M. Green, S. Hohenberger, and B.Waters, ``Outsourcing the decryption of ABE ciphertexts,'' in Proc. 20th USENIX Conf. Secur. (SEC). Berkeley, CA, USA: USENIX Association, 2011, p. 34.
  6. S. Yu, C. Wang, K. Ren, and W.Lou, “Achieving Secure, Scalable, Fine-Grained Data Access Control in Cloud Computing”, in Proc. IEEE 29th INFOCOM, 2010, pp. 534-542.
  7. L. Cheung and C. Newport, “Provably Secure Ciphertext Policy ABE”, in Proc. 14th ACM Conf. CCS, 2007, pp. 456- 465.
  8. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute- Based Encryption for Fine-Grained Access Control of Encrypted Data,” in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98
  9. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79-88.
  10. A. Sahai and B. Waters, “Fuzzy Identity-Based Encryption”, in Proc. Adv. Cryptol.- EUROCRYPT, LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005, pp. 457-473, Springer- Verlag.
  11. Shulan Wang, Kaitai Liang, Joseph K. Liu, JianyongChen, Jianping Yu, WeixinXie ,"Attribute-Based Data Sharing Scheme Revisited in Cloud Computing", IEEE Transactions on Information Forensics and Security, 2016.
  12. Shulan Wang, Junwei Zhou, Joseph K. Liu, JianpingYu,Jianyong Chen, WeixinXie ,"An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing", IEEE Transactions on Information Forensicsand Security, 2016
  13. Kaitai Liang and Willy Susilo, "Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage", IEEE Transactions on InformationForensics and Security, 2015
  14. JieXu, Qiaoyan Wen, Wenmin Li and Zhengping Jin,"Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing", IEEE TRANSACTIONS ON PARALLELAND DISTRIBUTED SYSTEMS ,2015
  15. Danwei Chen, Liangqing Wan, Chen Wang, Su Pan,YutingJi, "A Multi-authority Attribute-based Encryption Scheme with Pre-decryption", 2015 IEEE Seventh International Symposium on Parallel Architectures, Algorithms and Programming

Downloads

Published

2019-12-30

Issue

Section

Research Articles

How to Cite

[1]
Bhagyashri Khade, Prof. Minakshi Ramteke, Prof. Gurudev Sawarkar, " A Review on Revocable and Searchable Attribute-Based Encryption Scheme over Cloud Data, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 6, Issue 6, pp.260-265, November-December-2019.