A Secure Keyword Ordered Multiuser Searchable Encryption Framework
Recent trends in information technology have triggered the shift in various sectors from traditional methods of operation and data management to web based solutions. Cloud computing provides the best alternative, providing storage as a service and ensures
- PDF / 273,804 Bytes
- 13 Pages / 439.37 x 666.142 pts Page_size
- 79 Downloads / 217 Views
Abstract. Recent trends in information technology have triggered the shift in various sectors from traditional methods of operation and data management to web based solutions. Cloud computing provides the best alternative, providing storage as a service and ensures efficient data operations. Data outsourcing reduces high cost and increases efficiency but it is vulnerable to leakage and manipulation hence rendering it unusable for most of the practical applications. Data encryption makes it safe but limits the scope for search and multiuser access. The model proposed supports efficient data encryption and search over the encrypted data by legitimate users and facilitates multiuser access to the data. Multiuser searchable encryption allows multiple users to access the data in both read and write mode with their distinct keys and facilitates addition and re-invocation of users with less overhead. The proposed scheme is based on encryption of data, keyword generation and search based on bilinear pairing. The system provides a proxy server which manipulates user queries making the system faster and more secure. The search is performed on keyword ordered list which makes the search faster as compared to the traditional methods of comparing trapdoor with keywords associated with the different files. Keywords: Multiuser searchable encryption Keyword ordering server Bilinear pairing Discrete log problem
Proxy
1 Introduction The advancement in information technology has made data growth inexorable in all the sectors. A large percentage of organizations’ expenditure is incurred on the data storage and maintenance. Infrastructure as a service provided by third party remote servers offer an alternative to the organizations thereby reducing the cost incurred on data storage and maintenance and provide efficient data management. Remote data storage and third party involvement triggers the need for strong data security and integrity mechanisms. There exists a tradeoff between data security and search efficiency of the encrypted data. Leading web service enterprises have come up with cloud computing solutions trying for a balance between the two. The quality of cloud provider is judged on the following parameters. (1) Data Security: It is the most determining requirement. Data security involves an efficient data encryption, use of secure channels for data transmission and storage security. Even if compromised, the ciphertext should not leak any information. © Springer Nature Singapore Pte Ltd. 2016 P. Mueller et al. (Eds.): SSCC 2016, CCIS 625, pp. 99–111, 2016. DOI: 10.1007/978-981-10-2738-3_9
100
K. Kaushik and V. Varadharajan
The encryption method should be secure enough to prevent any learning on data pattern and queries by a curious server. (2) Efficient search: The search must provide all valid results in minimum time. Searching over plaintext is easy and fast but provides the cloud with the access to the data. Data encryption highly limits the search capability over the data. In real life applications multiple users a
Data Loading...