Efficient and Searchable ABE Scheme in Cloud Computing

Authors

  • Navin Sethiya  UG Scholar, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India
  • Hrishikesh Patel  UG Scholar, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India
  • Akshay Harshe  UG Scholar, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India
  • Alekh Gaigole  UG Scholar, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India
  • Harshvardhan Donadkar  UG Scholar, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India
  • Prof. Priya Karemore  Assistant Professor, Department of Computer Technology, Priyadarshini College of Engineering, Nagpur, Maharashtra, India

Keywords:

Attribute-Based Encryption, Cloud Computing, Searchable Encryption, Attribute Revocation.

Abstract

Searchable Attribute based encryption is a promising technique that achieves flexible and fine-grained data access control over encrypted data, which is very suitable for a secure data sharing environment such as the currently popular cloud computing. However, traditional attribute-based encryption fails to provide an efficient keyword based search on encrypted data, which somewhat weakens the power of this encryption technique, as search is usually the most important approach to quickly obtain data of interest from large-scale dataset. To overcome this issue, the fundamental way is to do encryption of data. So, a secure user can have imposed with data access control system must be given before the users store any data to the cloud for storage. Attribute Based Encryption (ABE) system is one of the asymmetric key based cryptosystems that has received much focus that provides fine-grained access control to data outsourced on the cloud. In this paper, we propose a more proficient and most important type of Attribute Based Encryption technique that not only considers the Outsourced ABE construction but also address the issue of revocation in case of user leaving the group or organization; once a user is removed from the group, the keys are updated and these updated new keys are shared between the existing users also our system supports the keyword search over encrypted data in the mobile cloud storage. In multi keyword search; users and data owners can establish the keywords index and search trapdoor, respectively, without relying on the online trusted authority. Experimental results show that the performance of the proposed system is better than existing system in terms of security, data availability, time consumption and memory utilization.

References

  1. Y. Li, F. Zhou, Y. Qin, M. Lin, and Z. Xu, \Integrity veriable conjunctive keyword searchable encryption in cloud storage," Int. J. Inf. Secur., vol. 17, pp. 1 20, Nov. 2017, doi: 10.1007/s10207-017-0394-9.
  2.  D. Cash, J. Jaeger, S. Jarecki, C. Jutla, H. Krawczyk, M.- C. Rosu, and M. Steiner, "Dynamic searchable encryption in very large databases: Data structures and implementation", in Proc. of NDSS, vol. 14, 2014.
  3. J. Lai, R. Deng, C. Guan, and J. Weng, Attribute-based Encryption with Verifiable Outsourced Decryption Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343-1354, Aug. 2013.
  4.  M. Green, S. Hohenberger, and B.Waters, \ Outsourcing the decryption of ABE ciphertexts," in Proc. 20th USENIX Conf. Secur. (SEC). Berkeley, CA, USA: USENIX Association,2011, p. 34.
  5. S. Yu, C.Wang, K. Ren, and W.Lou, Achieving Secure, Scalable, Fine-Grained Data Access Control in Cloud Computing, in Proc. IEEE 29th INFOCOM, 2010, pp.534-542.
  6.  L. Cheung and C. Newport, Provably Secure Ciphertext Policy ABE, in Proc. 14th ACM Conf. CCS, 2007, pp. 456- 465.
  7. V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute- Based Encryption for Fine-Grained Access Control of Encrypted Data, in 2006, Proc. 13th ACM Conf. Comput. Commun. Security, pp. 89-98.
  8.  R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption: improved definitions and efficient constructions, in Proceedings of the 13th ACM conference on Computer and communications security. ACM, 2006, pp. 79-88.
  9. A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, in Proc. Adv. Cryptol.- EUROCRYPT, LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005, pp. 457-473, Springer- Verlag.

Downloads

Published

2019-02-28

Issue

Section

Research Articles

How to Cite

[1]
Navin Sethiya, Hrishikesh Patel, Akshay Harshe, Alekh Gaigole, Harshvardhan Donadkar, Prof. Priya Karemore, " Efficient and Searchable ABE Scheme in Cloud Computing , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 5, Issue 5, pp.112-118, February-2019.