Open Access   Article Go Back

Secured Group Data Bestow with Key-Agglomerative Searchable Encryption via Cloud Storage

Santhiya.C 1 , Vanishree K.A.2 , M.K. Chandrasekaran Ph.D.3

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 242-247, Sep-2015

Online published on Oct 01, 2015

Copyright © Santhiya.C, Vanishree K.A. , M.K. Chandrasekaran Ph.D. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Santhiya.C, Vanishree K.A. , M.K. Chandrasekaran Ph.D., “Secured Group Data Bestow with Key-Agglomerative Searchable Encryption via Cloud Storage,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.242-247, 2015.

MLA Style Citation: Santhiya.C, Vanishree K.A. , M.K. Chandrasekaran Ph.D. "Secured Group Data Bestow with Key-Agglomerative Searchable Encryption via Cloud Storage." International Journal of Computer Sciences and Engineering 3.9 (2015): 242-247.

APA Style Citation: Santhiya.C, Vanishree K.A. , M.K. Chandrasekaran Ph.D., (2015). Secured Group Data Bestow with Key-Agglomerative Searchable Encryption via Cloud Storage. International Journal of Computer Sciences and Engineering, 3(9), 242-247.

BibTex Style Citation:
@article{K.A._2015,
author = {Santhiya.C, Vanishree K.A. , M.K. Chandrasekaran Ph.D.},
title = {Secured Group Data Bestow with Key-Agglomerative Searchable Encryption via Cloud Storage},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {242-247},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=679},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=679
TI - Secured Group Data Bestow with Key-Agglomerative Searchable Encryption via Cloud Storage
T2 - International Journal of Computer Sciences and Engineering
AU - Santhiya.C, Vanishree K.A. , M.K. Chandrasekaran Ph.D.
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 242-247
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2294 2283 downloads 2353 downloads
  
  
           

Abstract

The capability of distributing selected encrypted data with different users by means of public cloud storage may greatly alleviate the protection concerns over inadvertent data leaks in the cloud. Efficient management of encryption keys solves this difficulty. The preferred flexibility of distributing any group of selected documents with any group of users hassle different encryption keys to be used for different credentials. However, this also implies the requirement of securely sharing to users a large amount of keys for both encryption and search, and those users will have to securely stock up the received encrypted keys, and submit an equally large amount of keyword trapdoors to the cloud in order to carry out the exploration over the shared data. The obscure need for secure communication, storage, and complexity noticeably explains that the approach is not appliable. In this paper, a novel concept called, key aggregate Searchable encryption (KASE) is estimated to resolve this matter-of-fact problem and instantiating the notion through a concrete KASE scheme, in which a data holder only needs to share a single key to a user for distributing a large amount of documents, and the user only needs to tender a single trapdoor to the cloud for querying the user shared documents. But by using single key for a group, it is easily misused by the group members. If moved to multiple-keys, information is accesses by Brute-force attack. Hence it should be enhanced in a way that reduced number of keys should be used. The security analysis and concert evaluation both confirm that our projected schemes are provably secure and practically efficient.

Key-Words / Index Term

Searchable Group Data Sharing, Public Key Encryption, Trapdoor, Cryptographic Cloud System

References

[1] S Yu, C Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Com-puting”, Proc. IEEE INFOCOM, pp. 534-542, 2010.
[2] R Lu, X Lin, X Liang, and X Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing”, Proc. ACM Symp. Information, Computer and Comm. Security, pp. 282-292, 2010.
[3] Z Liu, Z Wang, X Cheng, et al. “Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud”, Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), IEEE, pp. 249-255, 2013.
[4] L B Oliveira, D F Aranha, E Morais, et al. “Tinytate: Computing the tate pairing in resource-constrained sensor nodes”, IEEE Sixth IEEE International Symposium on Network Computing and Applications, pp. 318-323, 2007.
[5] M. Li, W. Lou, K. Ren. “Data security and privacy in wireless body area networks”, Wireless Communications, IEEE, 17(1): 51- 58, 2010.
[6] B Wang, B Li, and H Li, “Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud”, Proc. 10th Int’l Conf. Applied Cryptography and Network Security, pp. 507-525, 2012
[7] R A Popa ,N Zeldovich. “Multi-key searchable encryption”. Cryptology ePrint Archive, Report 2013/508, 2013.
[8] J Li, X F Chen, M Q Li, J W Li, P Lee, Wenjing Lou. “Secure Deduplication with Efficient and Reliable Convergent Key Management”, IEEE Transactions on Parallel and Distributed Systems, 25(6): 1615-1625, 2014.

[9] D H Phan, D Pointcheval, S F Shahandashti, et al. “Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts”, International journal of information security, 12(4): 251-265, 2013.
[10] J Li, K Kim. “Hidden attribute-based signatures without anonymity revocation”, Information Sciences, 180(9): 1681-1689, Elsevier, 2010.
[11] J W Li, J Li, X F Chen, et al. “Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud”, In: Network and System Security 2012, LNCS, pp. 490- 502, 2012.
[12] X Liu, Y Zhang, B Wang, and J Yan. “Mona: secure multiowner data sharing for dynamic groups in the cloud”, IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6): 1182-1191.