Advertisement

Efficient and Secure Data Storage CP-ABE Analysis Algorithm

  • V. SenthurSelviEmail author
  • S. Gomathi
  • V. Perathu Selvi
  • M. Sharon Nisha
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 33)

Abstract

In the contemporary digital environment, secure search over encrypted data is necessary to prevent the unauthorized data usage practices. To provide data privacy and security fine grained access control is important. For having data privacy data have to be stored onto the cloud in an encrypted form and have to be decrypted before retrieving the message. Encrypting the information is a tedious process for mobiles and also its recovery is a significantly challenging task since the mobile devices have limited bandwidth and battery life. Searching the encrypted data over mobile cloud is a tedious process. To tackle this issue, Cipher text Policy Attribute Based Encryption (CP-ABE) mechanism is proposed. The proposed system will perform computation in cloud rather than the mobile device. This mechanism could effectively prevent malicious searching and decrypting of files. Also, the proposed system support many number of attributes and flexible multiple keyword search patterns in which query file order will not affect the search result. This indicates CP-ABE scheme to improve the efficiency and security.

Keywords

Multiple keywords search Attribute based encryption Mobile cloud 

References

  1. 1.
    Vaquero, L., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39(1), 50–55 (2008)CrossRefGoogle Scholar
  2. 2.
    Yu, X., Wen, Q.: Design of security solution to mobile cloud storage. In: Knowledge Discovery and Data Mining, pp. 255–263. Springer, Heidelberg (2012)Google Scholar
  3. 3.
    Huang, D.: Mobile cloud computing. In: IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter (2011)Google Scholar
  4. 4.
    Mazhelis, O., Fazekas, G., Tyrvainen, P.: Impact of storage acquisition intervals on the cost-efficiency of the private vs. public storage. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 646–653. IEEE (2012)Google Scholar
  5. 5.
    Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized in-cloud security services for mobile devices. In: Proceedings of the First Workshop on Virtualization in Mobile Computing, pp. 31–35. ACM (2008)Google Scholar
  6. 6.
    Oberheide, J., Jahanian, F.: When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 43–48. ACM (2010)Google Scholar
  7. 7.
    Moffat, A., Bell, T.: Managing Gigabytes: Compressing and Indexing Documents and Images. Morgan Kaufmann Publishers, San Francisco (1999)zbMATHGoogle Scholar
  8. 8.
    Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE Symposium on Security and Privacy, 2000. S&P 2000, pp. 44–55. IEEE (2000)Google Scholar
  9. 9.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology Eurocrypt 2004, pp. 506–522. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.,: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM (2006)Google Scholar
  11. 11.
    Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, pp. 391–421. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  12. 12.
    Zerr, S., Olmedilla, D., Nejdl, W., Siberski, W.: Zerber +r: top k retrieval from a confidential index. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, pp. 439–449. ACM (2009)Google Scholar
  13. 13.
    Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)CrossRefGoogle Scholar
  14. 14.
    Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 253–262. IEEE (2010)Google Scholar
  15. 15.
    Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)CrossRefGoogle Scholar
  16. 16.
    Wang, B., Yu, S., Lou, W., Hou, Y.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: INFOCOM, 2014 Proceedings IEEE (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • V. SenthurSelvi
    • 1
    Email author
  • S. Gomathi
    • 1
  • V. Perathu Selvi
    • 1
  • M. Sharon Nisha
    • 1
  1. 1.Department of Computer Science and EngineeringFrancis Xavier Engineering College, Anna UniversityTirunelveliIndia

Personalised recommendations