Professional Documents
Culture Documents
Abstract - Cloud computing enables flexible user generates a content token that he wants to
data management and ubiquitous access to data. search with his private key. As cloud computing
Encryption that can be searched could is a difficult competitive sector, it is crucial to
simultaneously provide privacy and privacy- provide a good user experience. There is an
preserving privacy features, which is an urgent need to develop new searchable
important tool for secure storage. In this article, encryption schemes with meaningful search
we provide a cloud-efficient, end-to-end patterns for cloud storage.
encryption system that is secure against the
offline keyword guessing attack (KGA). One of
the strengths of the proposal compared to other 1.1 Related Work
existing systems is that it supports a scheme of
encryption and content , or more formally a 1.1.1 Cloud Security
query based, file searching mechanism for Although cloud computing is seen as a
textual data on a deterministic finite state promising mode of service for the next-
machine. In addition, the concrete scheme is generation network, security and privacy issues
efficient and formally secure in the standard are the biggest obstacle to widespread adoption
model. in the real world. Chang et al [8]. examined the
complex security of cloud computing, including
firewall, access control, identity management,
1. INTRODUCTION intrusion prevention, and converged encryption.
Zheng et al [9]. proposed a mobile architecture
Cloud storage [1] is an emerging storage model to provide secure access from remote
that offers cloud computing users a scalable, multimedia services. The provable data
flexible, and cost-effective service. It also saves possession (PDP) is a probabilistic method of
the user a lot of money on expensive storage verifying cloud computing to prove the integrity
devices [2]. Cloud brings convenience to of the user's data without downloading all the
customers. At the same time, there are many information.
security and privacy issues [3][4] as data is
physically stored on multiple cloud service 1.1.2 DFA
provider servers, so customers can not fully
A multi-state finite state machine and its
manage their data. Customers prefer to use
"control" passes from one state to another in
encryption technology to protect data privacy,
response to external "inputs". The term
which also poses another problem: how to
"deterministic" in "deterministic finite state
recover data on the large volume of encrypted
machines (DFAs)" refers to the fact that at each
text. No customer can tolerate the tremendous
input there is a single state in which the
transmission effort and waiting time for the
automata can pass from their current state [10].
result of data recovery. Searchable encryption
In 2013, Parga et al [11] showed that an
technology [5], [6], [7] not only provides data
automation operation could be implemented on a
encryption protection, but also enables effective
DFA with a polynomial time complexity, which
search without compromising privacy. The data
gave rise to a two-round polynomial
78
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 5 Issue 10, October 2018
ISSN (Online) 2348 – 7968
www.ijiset.com
minimization algorithm. Later, Sarkar et al [12] Vulnerable to KGA: Liang's scheme [7] cannot
applied the EDA to online learning to enable withstand an offline keyword (KGA) guessing
adaptive learning. Different DFAs are designed attack [18], [19]. It should be noted that this is
for different chapters in online courses. an open problem. In KGA, the attacker uses the
low entropy property of the keyword to select
1.1.3 Searchable Encryption the keyword in a much smaller space. Then, the
attacker tests the guessing of the keyword
Searchable encryption is a new technique that guessed offline. Such an attack significantly
can protect privacy and allow search for affects the security of the searchable encryption
keywords via encrypted documents. This is schemes [18], [19].
attracting increasing attention as the concept of 1.2.2 Our Contributions
Song et al [13]. Wang et al [14] used the
statistical measurement approach and the one-to- In this article, we design a secure data storage
many order-preserving mapping technology to system that supports normal voice search. This
create a search-ranking system on encrypted is the protection of privacy in a standard model
based on bilinear hardness Diffie-Hellman. One
files. Liu et al [15] reduces query effort and
of the strengths of this suggestion is the normal
classifies queries into multiple ranks. Xu et al voice search enabled, which offers a much more
[16]. Public key cryptography and fuzzy flexible search pattern compared to other
keyword search combined to design a public key encryption systems available for search. In our
encryption structure with fuzzy keyword search. system, the encryption algorithm uses as input a
However, no concrete scheme is proposed in public key and a standard language describing a
[16] Li et al [17]. Introduce relevance scores and string of arbitrary length. Then, the generated
preference factors to enable accurate keyword ciphertext is sent to the cloud server. In the data
searches and use classified sub-dictionaries to extraction phase, the user defines a deterministic
improve your effectiveness. finite state machine and generates a search token
from the DFA using its secret key. The DFA
1.2 Motivation and Our Contributions defines a series of transitions, an initial state and
a state of acceptance. If and only if the standard
1.2.1 Motivation language embedded in the encrypted text is
The research projects mentioned in section 1.1.3 accepted by the DFA of the search token, the file
are traditional searchable encryption schemes is considered a match file. This test process is
that cannot support normal voice search. To our performed by the cloud server without knowing
knowledge, Liang's schema [7] is the only the plain language of the current language and
DFA. In comparison with the Liang system [7],
search that performs a regular linguistic search
the improvements and contributions of the
in a searchable cryptographic architecture. proposed system are listed below.
However, a careful examination of Liang's
schema [7] shows that there are some limitations Large Universe Construction: The
that will be analyzed below. characteristic of the grand universe makes it
possible to accommodate a flexible number of
Small Universe Construction: It must symbols in the system, which considerably
predefine the size of the symbol set during improves the practicality of the scheme. A
system configuration. The size of the public key notable advantage is that the number of symbols
increases when the icon set occupies a large is not polynomial limited, which cannot be
memory space when the predefined icon set is achieved with [7]. In addition, the storage space
large. To add a new icon to the system, the KGC on the wireless terminal of the user with reduced
needs to rebuild the entire system. storage space is reduced. Third, the system can
be easily expanded if necessary.
Low Efficiency: In ciphering and search token
generation algorithms, the data user must
perform many exponentiation calculations that
consume energy, resulting in a lot of High Efficiency: The proposed regular speech
computational effort. In addition, the cost of the search system is effective. Our scheme is built
transfer is very high. into a coupling group with a symmetrical first
79
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 5 Issue 10, October 2018
ISSN (Online) 2348 – 7968
www.ijiset.com
order more efficient than the groups coupled • KGC is an abbreviation for a key
with an asymmetric first order. In addition, the generation center to which all units of the
encryption and token generation algorithms are system have full confidence. KGC is
effective. Overhead transmission costs in the
responsible for generating public
system are much lower than in [7]. The
effectiveness of this system and other existing parameters for the entire system. In the
systems [5], [6], [7] is completely compared and meantime, KGC will create a public /
evaluated. private key pair for each legal user of the
system. The private key is sent to the user
via a secret channel. User public keys are
2. PRELIMNARIES published and maintained by KGC using a
2.1 Bilinear Group secure management mechanism (such as
Public Key Infrastructure (PKI)).
Consider Gp be an algorithm that on input the
security parameter λ. It outputs the parameters of • The data owner uses the cloud storage
a prime order bilinear map as (p, g, G, GT, e), service to store sensitive personal
where G and GT are multiplicative cyclic groups information. The data owner uses a default
of prime order p and g is a random generator of language to describe the file and encrypts
G. The mapping e: GxG -> GT is a bilinear map. the default language and file, which are
The bilinear map e has three properties: (1) then offloaded to the cloud.
bilinearity (2) non-degeneracy (3) computability.
for the respective processes involved in the 5) Product: After a series of research and
phase of development of this proposed scheme development work, the new product can
are listed here:- be launched on the market.
81
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 5 Issue 10, October 2018
ISSN (Online) 2348 – 7968
www.ijiset.com
encrypted indexes, which is very useful in storage and computational burden of data
different applications. However, the owners and users. Because the cloud server has
scheme [6] only allows searching with a powerful computing resources, it is acceptable to
single keyword. transfer some of the workload of users to the
cloud server. To achieve this principle, we use
• Universe: The universe means that the the construction of a large universe during the
system must predefine characters during system configuration phase so that the public
construction. This is an important factor parameter is short in order to save the user's
that affects the scalability of the system. memory space. In addition, the system is
The "small universe" indicates that all flexibly expandable when new features need to
supported symbols or attributes must be be added to the system. In the encryption
pre-determined. The scheme of the "Great algorithm executed by the data owner, the
Universe" must not predefine these element is constructed.
symbols. It is obvious that the "Great
Universe" function is better suited for a
7. CONCLUSION
large system that can constantly add new
characters. Although [7] regular linguistic In this paper, we introduce a searchable
research can be carried out, it is a small encryption scheme into the large universe to
nonconforming construction. On the protect the security of the cloud storage system,
contrary, our scheme is a great universe which performs normal content oriented regular
design. language encryption and DFA search on the
cloud server. We also present a concrete design
• Standard Model: The security test with algorithms for light encoding and token
security model can be categorized as a generation. The proposed scheme preserves the
default or random Oracle template. The confidentiality and is indistinguishable from
proven schema based on the standard KGA, which is proven in the standard model.
model is more secure than the random
oracle model. Zheng's system [6] is based
REFERENCES
on a random oracle pattern.
1) Erl T, Cope R, Naserpour A. Cloud computing
design patterns[M]. Prentice Hall Press, 2015.
6.2 Simulation
2) Sookhak M, Gani A, Khan M K, et al. Dynamic
The PBC (Pairing Based Cryptography) library remote data auditing for securing big data storage
[20] is used to test the performance of schemas in cloud computing[J]. Information Sciences,
2017, 380: 101-116.
[5], [6], [7] and our schema. The experiments
are performed on a personal laptop with the 3) Zhang Q, Yang L T, Chen Z, Li P. Privacy-
following settings: Intel Core TM i3-2120 preserving double-projection deep computation
model with crowdsourcing on cloud for big data
3.3GHz processor, 4 GB of RAM and Windows feature learning[J]. IEEE Internet of Things
7 64-bit operating system. We choose the elliptic Journal, 2017, DOI: 10.1109/JIOT.2017.2732735.
curve of type A for the evaluation of the power
4) Zhang Q, Yang L T, Chen Z, Li P. PPHOPCM:
whose expression E is: y2 = x3 + x. Privacy-preserving High-order Possibilistic c-
Means Algorithm for Big Data Clustering with
6.3 Analysis Cloud Computing[J]. IEEE Transactions on Big
Data, 2017, DOI:
Comparisons and simulations show that the 10.1109/TBDATA.2017.2701816.
proposed system has a much smaller public 5) Boneh D, Waters B. Conjunctive, subset, and
parameter size, key text size, and token size. In range queries on encrypted data[C]//Theory of
addition, the encryption time and token Cryptography Conference. Springer Berlin
Heidelberg, 2007: 535-554.
generation time are much shorter. The design
principle of this system is to reduce the transfer,
82
IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 5 Issue 10, October 2018
ISSN (Online) 2348 – 7968
www.ijiset.com
6) Q. Zheng, S. Xu, and G. Ateniese. VABKS: (SDM), vol. 4165. Seoul, Korea, Sep. 2006, pp.
verifiable attribute-based keyword search 75C83.
over outsourced encrypted data. In 19) W. C. Yau, R. C. W. Phan, S. H. Heng, and B. M.
INFOCOM, pp. 522C530. IEEE, 2014. Goi, Key-word guessing attacks on secure
7) Liang K, Huang X, Guo F, et al. Privacy- searchable public key encryption schemes with a
Preserving and Regular Language Search Over designated tester, Int. J. Comput. Math., vol. 90,
Encrypted Cloud Data[J]. IEEE Transactions on no. 12, pp. 2581C2587, 2013.
Information Forensics and Security, 2016, 11(10):
2365-2376. 20) B. Lynn. The Stanford Pairing Based Crypto
Library. [Online]. Available:
8) Chang V, Ramachandran M. Towards achieving http://crypto.stanford.edu/pbc, accessed Dec 31,
data security with the cloud computing adoption 2017
framework [J]. IEEE Transactions on Services
Computing, 2016, 9(1): 138-151.
83