Novel approach for Secure Cloud Storage with Similar word Search
Keywords:
Similarword search, secure cloud storage, encryption, inside similarword guessing attack, smooth projective hash function, Diffie-Hellman languageAbstract
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public ,encryption with similar word search ,which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional ,framework suffers from an inherent insecurity called inside similarword guessing attack ,launched by the malicious server. To address this security vulnerability, we propose a new ,framework named dual-server similar. As another main contribution, we define a new variant of the smooth projective hash functions ,referred to as linear and homomorphic We then show a generic construction of secure DS-,from LH-SPHF. To illustrate the feasibility of our new framework, we provide an efficient instantiation of the general framework from a Decision Diffie–Hellman-based LH-SPHF and show that it can achieve the strong security against inside the KGA.
References
- R. Chen, Y. Mu, G. Yang, F. Guo, and X. Wang,"A new generalframework for secure public ,encryption with similarword search,"in Proc. 20th Australasian Conf. Inf. Secur. Privacy (ACISP), 2015,pp. 59–76.
- D. X. Song, D. Wagner, and A. Perrig,"Practical techniques for searcheson encrypted data," in Proc. IEEE Symp. Secur. Privacy, May 2000,pp. 44–55. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu,"Order preservingencryption for numeric data," in Proc. ACM SIGMOD Int. Conf. Manage.Data, 2004, pp. 563–574.
- R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky,"Searchable symmetric encryption: Improved definitions and efficient constructions," a. in Proc. 13th ACM Conf. Comput. Commun. Secur. (CCS), 2006
- D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano,"Public,encryption with similarword search," in Proc. Int. Conf. EUROCRYPT,2004, pp. 506–522.
- R. Gennaro and Y. Lindell,"A framework for password-based authenticated ,exchange," in Proc. Int. Conf. EUROCRYPT, 2003,pp. 524–543.
- B. R. Waters, D. Balfanz, G. Durfee, and D. K. Smetters,"Building an encrypted and searchable audit log," in Proc. NDSS, 2004, pp. 1–11.
- M. Abdalla et al.,"Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions," in Proc. 25th Annu. Int. Conf. CRYPTO, 2005, pp. 205–222.
- D. Khader,"Public ,encryption with similarword search based on K-resilient IBE," in Proc. Int. Conf. Comput. Sci. Appl. (ICCSA), 2006, pp. 298–308.
- P. Xu, H. Jin, Q. Wu, and W. Wang,"Public-,encryption with fuzzy similarword search: A provably secure scheme under similarword guessing attack," IEEE Trans. Comput., vol. 62, no. 11, pp. 2266–2277, Nov. 2013.
- G. Di Crescenzo and V. Saraswat,"Public ,encryption with searchable similarwords based on Jacobi symbols," in Proc. 8th Int. Conf.INDOCRYPT, 2007, pp. 282–296.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.