Searchable Encryption based on Key Aggregation

Year : 2024 | Volume :02 | Issue : 01 | Page : 21-25
By

    Lekha Achuth

  1. Nesha Kavya Urs

  1. Associate Professor, PES University, Department of Computer Applications, Bengaluru, India
  2. Student, PES University, Department of Computer Applications, Bengaluru, India

Abstract

The ability to selectively distribute data with individuals in public cloud services may alleviate safety concerns about inadvertent privacy violations in cloud storage. The need for flexibility in sharing specific sets of documents with various user groups requires the use of distinct encryption keys for each document. This project addresses the practical challenges by introducing the concept of Key-Aggregate Searchable Encryption (KASE).Natural language processing was used to extract essential phrases from a file that would be uploaded by the data owner. It removes the punctuation, special character, and numeric values from the file and finds the term frequency of there maining keywords. With help of the term frequency, the keyword rank of all the words is derived. This helps in retrieving the file at a faster rate. Hash codeis also derived from all these keywords obtained to maintain the security of the file.

Keywords: Key searchable encryption, data sharing, cloud computing, data privacy

[This article belongs to International Journal of Data Structure Studies(ijdss)]

How to cite this article: Lekha Achuth, Nesha Kavya Urs , Searchable Encryption based on Key Aggregation ijdss 2024; 02:21-25
How to cite this URL: Lekha Achuth, Nesha Kavya Urs , Searchable Encryption based on Key Aggregation ijdss 2024 {cited 2024 Mar 11};02:21-25. Available from: https://journals.stmjournals.com/ijdss/article=2024/view=133443


Browse Figures

References

[1]S.yu,C.Wang,K.ren,andW.lou “AchievingSecureScalable,andFine-GrainedDataAccessControl in Cloud Computing, vol. 44, no. 5, pp.643-666,2010.

[2]R.lu,X.Lin,X.Liang,andX.Shen,”SecureProvenance: The Essential of Bread and Butter ofData Forensics in Cloud Coputing”., vol. 10, no. 1,pp. 282-       292,Jan. 2010.

[3]C.Chu,S.Chow,W.Tzeng,etal.,“Key-Aggregate Cryptosystem for Scalable Data Sharingin Cloud Storage”, IEEE Transactions on ParallelandDistributedSystems,vol.7,no.4,pp.346-358,2014.

[4] Li,X.F.Chen,M.Q.Li,J.W.Li,P.Lee,Wenjing Lou. “Secure Deduplication with Efficientand Reliable Convergent Key Management”, IEEETransactions on Parallel and Distributed Systems,vol.64, no. 9, pp. 2519-2533, Sep. 2015.

[5] B.Oliveira,D.F.Aranha,E.Morais,etal.“Tinytate:Computingthetatepairinginresource-constrained sensor      nodes”,  IEEE        Sixth     IEEEInternationalSymposiumonNetworkComputingandApplications, pp. 318-323, 2007.

[6] H.Phan,D.Pointcheval,S.F.Shahandashti,etal.“AdaptiveCCAbroadcastencryptionwithconstant-sizesecretkeysandciphertexts”,inProc. DSN,2015, pp.379–390

[7] Song,D.Wagner,A.Perrig.“Practicaltechniquesforsearchesonencrypteddata”,IEEESymposium on Security and Privacy, IEEE Press, pp.44C55, 2000

[8] J. Li, and K and . Kim, “Hidden attribute-based signatures without anonymity revocation”, Inf. Sci., vol. 180, no. 9, pp. 1681-1689, 2010.

[9] J. Li, X. F. Chen, M. Q. Li, J. W. Li, P. Lee, and W. Lou, “Secure deduplication with efficient and reliable convergent key management”, IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 6, pp. 1615-1625, Jun. 2014.

[10] M. Li, W. Lou, and K. Ren, “Data security and privacy in wireless body area networks”, IEEE Wireless Commun., vol. 17, no. 1, pp. 51-58, Feb. 2010.

[11] D. Boneh, C. Gentry and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys”, Proc. 25th Annu. Int. Conf. Adv. Cryptol., pp. 258-275, 2005.


Regular Issue Subscription Review Article
Volume 02
Issue 01
Received February 2, 2024
Accepted February 29, 2024
Published March 11, 2024