Novel approach for Secure Cloud Storage with Similar word Search

Authors(4) :-O. Naga Kumari, Samidi Sindhuja, S. Haripriya, G. Shireesh Goud

Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public ,encryption with similar word search ,which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional ,framework suffers from an inherent insecurity called inside similarword guessing attack ,launched by the malicious server. To address this security vulnerability, we propose a new ,framework named dual-server similar. As another main contribution, we define a new variant of the smooth projective hash functions ,referred to as linear and homomorphic We then show a generic construction of secure DS-,from LH-SPHF. To illustrate the feasibility of our new framework, we provide an efficient instantiation of the general framework from a Decision Diffie–Hellman-based LH-SPHF and show that it can achieve the strong security against inside the KGA.

Authors and Affiliations

O. Naga Kumari
Assistant Professor in Department of Information Technology .in Teegala Krisha Reddy Engineering college, Telangana, India
Samidi Sindhuja
UG Scholar in Department of Information Technology .in Teegala Krisha Reddy Engineering college, Telangana, India
S. Haripriya
UG Scholar in Department of Information Technology .in Teegala Krisha Reddy Engineering college, Telangana, India
G. Shireesh Goud
UG Scholar in Department of Information Technology .in Teegala Krisha Reddy Engineering college, Telangana, India

Similarword search, secure cloud storage, encryption, inside similarword guessing attack, smooth projective hash function, Diffie-Hellman language

  1. R. Chen, Y. Mu, G. Yang, F. Guo, and X. Wang,"A new generalframework for secure public ,encryption with similarword search,"in Proc. 20th Australasian Conf. Inf. Secur. Privacy (ACISP), 2015,pp. 59–76.
  2. D. X. Song, D. Wagner, and A. Perrig,"Practical techniques for searcheson encrypted data," in Proc. IEEE Symp. Secur. Privacy, May 2000,pp. 44–55. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu,"Order preservingencryption for numeric data," in Proc. ACM SIGMOD Int. Conf. Manage.Data, 2004, pp. 563–574.
  3. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky,"Searchable symmetric encryption: Improved definitions and efficient constructions," a. in Proc. 13th ACM Conf. Comput. Commun. Secur. (CCS), 2006
  4. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano,"Public,encryption with similarword search," in Proc. Int. Conf. EUROCRYPT,2004, pp. 506–522.
  5. R. Gennaro and Y. Lindell,"A framework for password-based authenticated ,exchange," in Proc. Int. Conf. EUROCRYPT, 2003,pp. 524–543.
  6. B. R. Waters, D. Balfanz, G. Durfee, and D. K. Smetters,"Building an encrypted and searchable audit log," in Proc. NDSS, 2004, pp. 1–11.
  7. M. Abdalla et al.,"Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions," in Proc. 25th Annu. Int. Conf. CRYPTO, 2005, pp. 205–222.
  8. D. Khader,"Public ,encryption with similarword search based on K-resilient IBE," in Proc. Int. Conf. Comput. Sci. Appl. (ICCSA), 2006, pp. 298–308.
  9. P. Xu, H. Jin, Q. Wu, and W. Wang,"Public-,encryption with fuzzy similarword search: A provably secure scheme under similarword guessing attack," IEEE Trans. Comput., vol. 62, no. 11, pp. 2266–2277, Nov. 2013.
  10. G. Di Crescenzo and V. Saraswat,"Public ,encryption with searchable similarwords based on Jacobi symbols," in Proc. 8th Int. Conf.INDOCRYPT, 2007, pp. 282–296.

Publication Details

Published in : Volume 4 | Issue 7 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 311-315
Manuscript Number : IJSRSET1844299
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

O. Naga Kumari, Samidi Sindhuja, S. Haripriya, G. Shireesh Goud, " Novel approach for Secure Cloud Storage with Similar word Search, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 7, pp.311-315, March-April-2018.
Journal URL : http://ijsrset.com/IJSRSET1844299

Follow Us

Contact Us