Novel approach for Secure Cloud Storage with Similar word Search

Authors

  • O. Naga Kumari  Assistant Professor in Department of Information Technology .in Teegala Krisha Reddy Engineering college, Telangana, India
  • Samidi Sindhuja  UG Scholar in Department of Information Technology .in Teegala Krisha Reddy Engineering college, Telangana, India
  • S. Haripriya  UG Scholar in Department of Information Technology .in Teegala Krisha Reddy Engineering college, Telangana, India
  • G. Shireesh Goud  UG Scholar in Department of Information Technology .in Teegala Krisha Reddy Engineering college, Telangana, India

Keywords:

Similarword search, secure cloud storage, encryption, inside similarword guessing attack, smooth projective hash function, Diffie-Hellman language

Abstract

Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public ,encryption with similar word search ,which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional ,framework suffers from an inherent insecurity called inside similarword guessing attack ,launched by the malicious server. To address this security vulnerability, we propose a new ,framework named dual-server similar. As another main contribution, we define a new variant of the smooth projective hash functions ,referred to as linear and homomorphic We then show a generic construction of secure DS-,from LH-SPHF. To illustrate the feasibility of our new framework, we provide an efficient instantiation of the general framework from a Decision Diffie–Hellman-based LH-SPHF and show that it can achieve the strong security against inside the KGA.

References

  1. R. Chen, Y. Mu, G. Yang, F. Guo, and X. Wang,"A new generalframework for secure public ,encryption with similarword search,"in Proc. 20th Australasian Conf. Inf. Secur. Privacy (ACISP), 2015,pp. 59–76.
  2. D. X. Song, D. Wagner, and A. Perrig,"Practical techniques for searcheson encrypted data," in Proc. IEEE Symp. Secur. Privacy, May 2000,pp. 44–55. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu,"Order preservingencryption for numeric data," in Proc. ACM SIGMOD Int. Conf. Manage.Data, 2004, pp. 563–574.
  3. R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky,"Searchable symmetric encryption: Improved definitions and efficient constructions," a. in Proc. 13th ACM Conf. Comput. Commun. Secur. (CCS), 2006
  4. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano,"Public,encryption with similarword search," in Proc. Int. Conf. EUROCRYPT,2004, pp. 506–522.
  5. R. Gennaro and Y. Lindell,"A framework for password-based authenticated ,exchange," in Proc. Int. Conf. EUROCRYPT, 2003,pp. 524–543.
  6. B. R. Waters, D. Balfanz, G. Durfee, and D. K. Smetters,"Building an encrypted and searchable audit log," in Proc. NDSS, 2004, pp. 1–11.
  7. M. Abdalla et al.,"Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions," in Proc. 25th Annu. Int. Conf. CRYPTO, 2005, pp. 205–222.
  8. D. Khader,"Public ,encryption with similarword search based on K-resilient IBE," in Proc. Int. Conf. Comput. Sci. Appl. (ICCSA), 2006, pp. 298–308.
  9. P. Xu, H. Jin, Q. Wu, and W. Wang,"Public-,encryption with fuzzy similarword search: A provably secure scheme under similarword guessing attack," IEEE Trans. Comput., vol. 62, no. 11, pp. 2266–2277, Nov. 2013.
  10. G. Di Crescenzo and V. Saraswat,"Public ,encryption with searchable similarwords based on Jacobi symbols," in Proc. 8th Int. Conf.INDOCRYPT, 2007, pp. 282–296.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
O. Naga Kumari, Samidi Sindhuja, S. Haripriya, G. Shireesh Goud, " Novel approach for Secure Cloud Storage with Similar word Search, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 7, pp.311-315, March-April-2018.