Exploring Security Features of Attribute-Based Multi-Keyword Search Schemes for Encrypted Data

Authors

  • Archana Ibitdar  Department of CSE-IT, JD College of Engineering and Management, Nagpur, Maharashtra, India
  • Ashwini Kale  Department of CSE-IT, JD College of Engineering and Management, Nagpur, Maharashtra, India
  • Prajakta Bagade  Department of CSE-IT, JD College of Engineering and Management, Nagpur, Maharashtra, India
  • Priya Kale  Department of CSE-IT, JD College of Engineering and Management, Nagpur, Maharashtra, India
  • Supriya Sawwashere  Department of CSE-IT, JD College of Engineering and Management, Nagpur, Maharashtra, India

Keywords:

Keyword Search, Encrypted Data, Cloud Computing, Data Privacy, Security.

Abstract

In the ever-expanding digital landscape, preserving the confidentiality of sensitive data is of paramount importance. One prominent approach is Attribute-Based Multi Keyword Search (ABKS), which allows users to search encrypted data efficiently while maintaining privacy. This paper presents a comprehensive comparative analysis of three standard methods in the realm of ABKS: Ciphertext-policy attribute-based encryption (CP-ABE), Homomorphic encryption (HE), and Fuzzy keyword search. We evaluate these methods across multiple performance metrics, including accuracy, precision, recall, execution time, storage overhead, security level, scalability, and usability. Our results demonstrate that CP-ABE emerges as the best performer, excelling in terms of accuracy, precision, recall, and storage efficiency. This method ensures a high level of security, making it suitable for applications requiring robust data protection. While Homomorphic encryption also provides commendable security, it lags in terms of execution time and storage overhead. Fuzzy keyword search, on the other hand, exhibits moderate performance with a balance between security and usability. This research sheds light on the strengths and weaknesses of these ABKS methods, enabling stakeholders to make informed decisions when selecting an encryption scheme tailored to their specific requirements. Furthermore, our findings highlight the ever-increasing significance of CP-ABE in the domain of encrypted keyword search, promising enhanced data privacy and efficient information retrieval in modern data-driven environments.

References

  1. S. Lv, H. Tan, W. Zheng, T. Zhang, and M. Wang, “A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing,” Comput. Commun., vol. 209, no. March, pp. 239–248, 2023, doi: 10.1016/j.comcom.2023.07.008.
  2. U. S. Varri, S. K. Pasupuleti, and K. V. Kadambari, “Traceable and revocable multi-authority attribute-based keyword search for cloud storage,” J. Syst. Archit., vol. 132, no. September, p. 102745, 2022, doi: 10.1016/j.sysarc.2022.102745.
  3. C. Y. Lee, Z. Y. Liu, R. Tso, and Y. F. Tseng, “Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT,” J. Syst. Archit., vol. 130, no. July, p. 102642, 2022, doi: 10.1016/j.sysarc.2022.102642.
  4. S. Niu, M. Song, L. Fang, F. Yu, S. Han, and C. Wang, “Keyword search over encrypted cloud data based on blockchain in smart medical applications,” Comput. Commun., vol. 192, no. May, pp. 33–47, 2022, doi: 10.1016/j.comcom.2022.05.018.
  5. X. Xiang and X. Zhao, “Blockchain-assisted searchable attribute-based encryption for e-health systems,” J. Syst. Archit., vol. 124, no. January, p. 102417, 2022, doi: 10.1016/j.sysarc.2022.102417.
  6. Y. Liang, Y. Li, K. Zhang, and L. Ma, “DMSE: Dynamic Multi-keyword Search Encryption based on inverted index,” J. Syst. Archit., vol. 119, no. July, 2021, doi: 10.1016/j.sysarc.2021.102255.
  7. Y. Liang, Y. Li, Q. Cao, and F. Ren, “VPAMS: Verifiable and practical attribute-based multi-keyword search over encrypted cloud data,” J. Syst. Archit., vol. 108, no. November 2019, 2020, doi: 10.1016/j.sysarc.2020.101741.
  8. J. Cui, H. Zhou, H. Zhong, and Y. Xu, “AKSER: Attribute-based keyword search with efficient revocation in cloud computing,” Inf. Sci. (Ny)., vol. 423, pp. 343–352, 2018, doi: 10.1016/j.ins.2017.09.029.
  9. Y. Miao, J. Weng, X. Liu, K. K. Raymond Choo, Z. Liu, and H. Li, “Enabling verifiable multiple keywords search over encrypted cloud data,” Inf. Sci. (Ny)., vol. 465, pp. 21–37, 2018, doi: 10.1016/j.ins.2018.06.066.
  10. H. Yin, Z. Qin, J. Zhang, H. Deng, F. Li, and K. Li, “A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing,” J. Parallel Distrib. Comput., vol. 135, pp. 56–69, 2020, doi: 10.1016/j.jpdc.2019.09.011.
  11. B. A. Al-Maytami, P. Fan, A. J. Hussain, T. Baker, and P. Liatsis, “An efficient queries processing model based on Multi Broadcast Searchable Keywords Encryption (MBSKE),” Ad Hoc Networks, vol. 98, p. 102028, 2020, doi: 10.1016/j.adhoc.2019.102028.
  12. M. R. Senouci, I. Benkhaddra, A. Senouci, and F. Li, “An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks,” J. Syst. Archit., vol. 119, no. July, p. 102271, 2021, doi: 10.1016/j.sysarc.2021.102271.
  13. Z. Li, J. Ma, Y. Miao, X. Liu, and K. K. R. Choo, “Forward and backward secure keyword search with flexible keyword shielding,” Inf. Sci. (Ny)., vol. 576, pp. 507–521, 2021, doi: 10.1016/j.ins.2021.06.048.
  14. B. D. Deebak, F. H. Memon, K. Dev, S. A. Khowaja, and N. M. F. Qureshi, “AI-enabled privacy-preservation phrase with multi-keyword ranked searching for sustainable edge-cloud networks in the era of industrial IoT,” Ad Hoc Networks, vol. 125, no. June 2021, p. 102740, 2022, doi: 10.1016/j.adhoc.2021.102740.
  15. Q. Wu, T. Lai, L. Zhang, Y. Mu, and F. Rezaeibagha, “Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud,” J. Syst. Archit., vol. 129, no. May, 2022, doi: 10.1016/j.sysarc.2022.102569.
  16. D. Wang, P. Wu, B. Li, H. Du, and M. Luo, “Multi-keyword searchable encryption for smart grid edge computing,” Electr. Power Syst. Res., vol. 212, no. July, 2022, doi: 10.1016/j.epsr.2022.108223.
  17. S. Niu, Y. Hu, Y. Su, S. Yan, and S. Zhou, “Attribute-based searchable encrypted scheme with edge computing for Industrial Internet of Things,” J. Syst. Archit., vol. 139, no. April, p. 102889, 2023, doi: 10.1016/j.sysarc.2023.102889.
  18. S. Ghosh, S. H. Islam, A. Bisht, and A. K. Das, “Provably secure public key encryption with keyword search for data outsourcing in cloud environments,” J. Syst. Archit., vol. 139, no. March, p. 102876, 2023, doi: 10.1016/j.sysarc.2023.102876.
  19. Y. Zhang, R. Hao, X. Ge, and J. Yu, “Verifiable fuzzy keyword search supporting sensitive information hiding for data sharing in cloud-assisted e-healthcare systems,” J. Syst. Archit., vol. 142, no. July, p. 102940, 2023, doi: 10.1016/j.sysarc.2023.102940.
  20. Shivadekar, S., Kataria, B., Limkar, S. et al. Design of an efficient multimodal engine for preemption and post-treatment recommendations for skin diseases via a deep learning-based hybrid bioinspired process. Soft Comput (2023).
  21. Shivadekar, Samit, et al. "Deep Learning Based Image Classification of Lungs Radiography for Detecting COVID-19 using a Deep CNN and ResNet 50." International Journal of Intelligent Systems and Applications in Engineering 11.1s (2023): 241-250.
  22. P. Nguyen, S. Shivadekar, S. S. Laya Chukkapalli and M. Halem, "Satellite Data Fusion of Multiple Observed XCO2 using Compressive Sensing and Deep Learning," IGARSS 2020 - 2020 IEEE International Geoscience and Remote Sensing Symposium, Waikoloa, HI, USA, 2020, pp. 2073-2076, doi: 10.1109/IGARSS39084.2020.9323861.
  23. Banait, Satish S., et al. "Reinforcement mSVM: An Efficient Clustering and Classification Approach using reinforcement and supervised Techniques." International Journal of Intelligent Systems and Applications in Engineering 10.1s (2022): 78-89.
  24. Shewale, Yogita, Shailesh Kumar, and Satish Banait. "Machine Learning Based Intrusion Detection in IoT Network Using MLP and LSTM." International Journal of Intelligent Systems and Applications in Engineering 11.7s (2023): 210-223.
  25. Vanjari, Hrishikesh B., Sheetal U. Bhandari, and Mahesh T. Kolte. "Enhancement of Speech for Hearing Aid Applications Integrating Adaptive Compressive Sensing with Noise Estimation Based Adaptive Gain." International Journal of Intelligent Systems and Applications in Engineering 11.7s (2023): 138-157.
  26. Vanjari, Hrishikesh B., and Mahesh T. Kolte. "Comparative Analysis of Speech Enhancement Techniques in Perceptive of Hearing Aid Design." Proceedings of the Third International Conference on Information Management and Machine Intelligence: ICIMMI 2021. Singapore: Springer Nature Singapore, 2022.

Downloads

Published

2023-10-30

Issue

Section

Research Articles

How to Cite

[1]
Archana Ibitdar, Ashwini Kale, Prajakta Bagade, Priya Kale, Supriya Sawwashere "Exploring Security Features of Attribute-Based Multi-Keyword Search Schemes for Encrypted Data" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 10, Issue 5, pp.47-57, September-October-2023.