Professional Documents
Culture Documents
ABSTRACTS
ABSTRACTS
2. CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients
Read/Write Ciphertexts
3. Secure data storage and intrusion detection in the cloud using MANN and dual encryption
through various attacks
Nowadays, it is very important to maintain a high level security to ensure safe and trusted
communication of information between various organisations. But secured data communication over
the Internet and any other network is always under threat of intrusions and misuses. So intrusion
detection system (IDS) has become a needful component in terms of computer and network
security. In this research, the authors have intended to propose an effective method for text data
based IDS and secure data storage. In the proposed preprocessing steps, the input text document is
preprocessed and then change to the desired format. Next the resultant output is fed to the IDS.
Here user text data is checked; whether the given data is normal or intrusive based on a modified
artificial neural network (MANN). Here traditional neural network is modified by means of modified
particle swarm optimisation. The final process of the authors' proposed method is to encrypt the file
using dual encryption algorithms (RSA and AES). To improve the storage security of the proposed
method, steganography techniques are utilised after the dual encryption. Their proposed system is
implemented with the help of Cloud simulator in the working platform Java.
4. Constructing certificateless encryption with keyword search against outside and inside
keyword guessing attacks
Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy
server to retrieve the encrypted data without revealing the contents of the data. It offers a promising
solution to encrypted data retrieval in cryptographic cloud storage. Certificateless public key
cryptography (CLPKC) is a novel cryptographic primitive that has many merits. It overcomes the key
escrow problem in identity-based cryptography (IBC) and the cumbersome certificate problem in
conventional public key cryptography (PKC). Motivated by the appealing features of CLPKC, several
certificateless encryption with keyword search (CLEKS) schemes have been presented in the
literature. But, our cryptanalysis demonstrates that the previously proposed CLEKS frameworks
suffer from the security vulnerability caused by the keyword guessing attack. To remedy the security
weakness in the previous frameworks and provide resistance against both inside and outside
keyword guessing attacks, we propose a new CLEKS framework. Under the new framework, we
design a concrete CLEKS scheme and formally prove its security in the random oracle model.
Compared with previous two CLEKS schemes, the proposed scheme has better overall performance
while offering stronger security guarantee as it withstands the existing known types of keyword
guessing attacks.
5. Secure and efficient online data storage and sharing over cloud environment using probabilistic
with homomorphic encryption
Cloud computing is one of the great tasks in the business world nowadays, which provides
shared processing resources. In cloud area network, security is the main challenge faced by
cloud providers and their customers. The advantage of cloud computing includes reduced cost,
re-provisioning of resources etc. The cloud network makes use of standard encryption method
to secure documents while storing in online. In this paper, we have depicted two efficient
encryption algorithms that meet security demand in cloud. Probabilistic encryption, one of
these algorithms may be used to produce randomness of text encryption. With this algorithm, if
the same message is encrypted twice it should yield different secret coded texts on both
calculations. Another crucial algorithm is homomorphic encryption, is a cryptographic method
to define the sample system and to provide a software implementation. In order to maintain
quality of service (QoS) and improve customer satisfaction, we are going to propose an efficient
algorithm which combines the characteristics of both probabilistic and homomorphic
encryption techniques, to provide high level of security. Our proposed scheme will yield better
encryption techniques reduce security attacks, increased throughput and improve the QoS.
Enabling a security and privacy preservation for the cloud data is one of the demanding and
crucial tasks in recent days. Because, the privacy of the sensitive data should be safeguard from
the unauthorized access for improving its security. So, various key generation, encryption and
decryption mechanisms are developed in the traditional works for privacy preservation in
cloud. Still, it remains with the issues such as increased computational complexity, time
consumption, and reduced security. Also, the traditional works use the symmetric key
cryptography based. Thus, this paper aims to develop a new privacy preservation mechanism
by implementing a fully homomorphic–elliptic curve cryptography (FH-ECC) algorithm. The
data owner encrypts the original data by converting it into the cipher format with the use of
ECC algorithm, and applies the FH operations on the encrypted data before storing it on the
cloud. When the user gives the data request to the cloud, the Cloud Service Provider verifies the
access control policy of the user for enabling the restricted access on the data. If the access
policy is verified, the encrypted data is provided to the user, from that the cipher text is
extracted. Then, the ECC decryption and FH operations are applied to generate the original
text. Based on the several analysis, the research work is evaluated with the help of different
performance measures such as execution time, encryption time, and decryption time. In
addition the effectiveness of the novel FHE technique is justified by the comparative analysis
made with the traditional techniques.
8.
14. An enhancing reversible data hiding for secured data using shuffle
block key encryption and histogram bit shifting in cloud environment
Nowadays there are numerous intruders trying to get the privacy information from cloud
resources and consequently need a high security to secure our data. Moreover, research
concerns have various security standards to secure the data using data hiding. In order to
maintain the privacy and security in the cloud and big data processing, the recent crypto policy
domain combines key policy encryption with reversible data hiding (RDH) techniques.
However in this approach, the data is directly embedded resulting in errors during data
extraction and image recovery due to reserve leakage of data. Hence, a novel shuffle block key
encryption with RDH technique is proposed to hide the data competently. RDH is applied to
encrypted images by which the data and the protection image can be appropriately recovered
with histogram bit shifting algorithm. The hidden data can be embedded with shuffle key in the
form of text with the image. The proposed method generates the room space to hide data with
random shuffle after encrypting image using the definite encryption key. The data hider
reversibly hides the data, whether text or image using data hiding key with histogram shifted
values. If the requestor has both the embedding and encryption keys, can excerpt the secret
data and effortlessly extract the original image using the spread source decoding. The proposed
technique overcomes the data loss errors competently with two seed keys and also the
projected shuffle state RDH procedure used in histogram shifting enhances security hidden
policy. The results show that the proposed method outperforms the existing approaches by
effectively recovering the hidden data and cover image without any errors, also scales well for
large amount of data.
16. Secure Inverted Index Based Search over Encrypted Cloud Data with
User Access Rights Management
Cloud computing is a technology that provides users with a large storage space and an
enormous computing power. However, the outsourced data are often sensitive and confidential,
and hence must be encrypted before being outsourced. Consequently, classical search
approaches have become obsolete and new approaches that are compatible with encrypted data
have become a necessity. For privacy reasons, most of these approaches are based on the vector
model which is a time consuming process since the entire index must be loaded and exploited
during the search process given that the query vector must be compared with each document
vector. To solve this problem, we propose a new method for constructing a secure inverted
index using two key techniques, homomorphic encryption and the dummy documents
technique. However, 1) homomorphic encryption generates very large ciphertexts which are
thousands of times larger than their corresponding plaintexts, and 2) the dummy documents
technique that enhances the index security produces lots of false positives in the search results.
The proposed approach exploits the advantages of these two techniques by proposing two
methods called the compressed table of encrypted scores and the double score formula.
Moreover, we exploit a second secure inverted index in order to manage the users’ access rights
to the data. Finally, in order to validate our approach, we performed an experimental study
using a data collection of one million documents. The experiments show that our approach is
many times faster than any other approach based on the vector model.
18.Towards secure and flexible EHR sharing in mobile health cloud under static
assumptions
Electronic health record (EHR) systems are promising in the management of individual’s
health. However, before widely deployed in practical applications, EHR systems have to tackle
the privacy and efficiency challenges. Most of existing EHR sharing schemes suffer from severe
efficiency drawbacks, resulting in inapplicability in mobile EHR system. Furthermore, the
security assumptions in the previous schemes are usually based on non-static assumptions. In
this paper, we propose a flexible EHR sharing scheme supporting offline encryption of EHR
and outsourced decryption of EHR ciphertexts in mobile cloud computing. The proposed
scheme is proven secure in the random oracle model under the static decisional bilinear Diffie–
Hellman assumption. In our EHR sharing system, an EHR owner only need one multiplication
in bilinear groups to generate the final EHR ciphertexts based on the offline ciphertexts
computation, and an EHR user can easily decrypt the EHR cipheretext without requiring
bilinear pairing operations based on the transformed ciphertexts from the EHR cloud. Our
EHR sharing scheme allows access structures encoded in linear secret sharing schemes.
Performance comparisons indicate that our scheme is very suitable for mobile health clouds.