Ensuring Data Storage Security and Fuzzy Keyword Searching over an Encrypted Data

Neha Rale

Abstract


Cloud Computing technology is blooming the IT industry. Ensuring security in it becomes a challenging task. Cloud environments face many of the same threats as traditional corporate networks, but due to the vast amount of data stored on cloud servers, providers become an attractive target. Multifactor authentication systems such as one-time passwords, phone-based authentication, the smartcards protect cloud services because they make it harder for attackers to log into the systems. This paper will help those companies to share their data as well as their resources keeping in mind the security issues for data and resources. It implements an idea about proposing a new paradigm Data protection as a service. In this paper, we study the problem of data storage security in cloud computing. A novel encryption and decryption scheme using secret key is proposed. The obvious advantage of our scheme is the cloud service provider can offer the functions which were provided by the traditional data owners and make it trustful. So it indeed reduces the constitution's complexity in Cloud Computing. Also provides alerts if anything appears to be unauthentic.Although traditional searchable encryption schemes allow a user to securely search over encrypted data through keywords and selectively retrieve files of interest, these techniques support only exact keyword search. In this paper, it formalizes and solve the problem of effective fuzzy keyword search over encrypted cloud data while maintaining keyword privacy. In this solution, it exploits edit distance to quantify keywords similarity and develop an advanced technique on constructing fuzzy keyword sets, which greatly reduces the storage and representation overheads. Through rigorous security analysis, it shows that proposed solution is secure and privacy-preserving, while correctly realizing the goal of fuzzy keyword search.

Keywords


Cloud Computing, Decryption, Data Protection, Encryption, Fuzzylogic, Security

References


Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing”, IEEE INFOCOM 2010 Proceeding.

M. R. Tribhuwan, V. A. Bhuyar, Shabana Pirzade, “Ensuring Data Storage Security in Cloud Computing through Two-way Handshake based on Token Management”, IEEE ARTCom 2010.

Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou, “Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing”, ESORICS 2009.

M. Bellare, A. Boldyreva, and A. O’Neill, “Deterministic and Efficiently Searchable Encryption,” in Proc. of Crypto 2007, Volume 4622 of LNCS. Springer-Verlag, 2007.

J. W. Byun, D. H. Lee, and J. Lim, “Efficient Conjunctive Keyword Search on Encrypted Data Storage System,” Lecture Notes in Computer Science, Volume 4043, Public Key Infrastructure, Pages 184-196, 2006.

D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public Key Encryption With Keyword Search,” in Proc. of EUROCRYP’04, 2004.

R. Zhang, and H. Imai, “Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption,” Lecture Notes in Computer Science, Volume 4856, Cryptology and Network Security, Pages 159-174, 2007.

S. Han and J. Xing, "Ensuring data storage security through a novel third party auditor scheme in cloud computing," 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, Beijing, 2011

M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A.Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A Berkeley view of cloud computing”, University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009.

Amazon Web Services, Online at http://aws.amason.com.

Google App Engine, Online at http://code.google.com/appengine/.

Microsoft Azure, Online at http://www.microsoft.com/azure/

Tutorials Point, Online at https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm

J. Li, Q. Wang, C. Wang, N. Cao, K. Ren and W. Lou, "Fuzzy Keyword Search over Encrypted Data in Cloud Computing," 2010 Proceedings IEEE INFOCOM, San Diego, CA, 2010


Full Text: PDF

Refbacks

  • There are currently no refbacks.




 


All Rights Reserved © 2012 IJARCSEE


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.