Data Storage in Cloud Using Key-Policy Attribute-Based Temporary Keyword Search Scheme (KP-ABTKS)

  • Nallella ThirupathiEmail author
  • K. Madhavi
  • G. Ramesh
  • K. Sowmya Priya
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 98)


Now a days, it is open for information holder to re-appropriate their information to the cloud. Brief catchphrase seek on secret data in an exceedingly cloud setting is the principle focal point of this investigation. Here, the data in cloud storage isn`t trustworthy. So, it is compulsory to source information with encryption and used quality-based keyword search plans.In ABKS, The inquiry tokens might be utilized to extricate the ciphertexts that are created whenever and include the comparing catchphrase. The catchphrase mystery property and is secure against specifically picked keyword assault (SPKA) below the balance of Decisional Bilinear Diffie-Hellman (DBDH) presumption. This may lead information leakage and complexity, so we have to give more preservation. In this paper, we propose the KP-ABKTS plans, where the information proprietor creates an accessible cipher text identified with a catchphrase and the season of encoding as indicated by an expected access control strategy, and re-appropriates it to the cloud. This schemes enables in multiusers scenario for avoiding complexity when compared with PEKS.


  1. 1.
    Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 522–530. IEEE (2014)Google Scholar
  2. 2.
    Lewko, A., Waters, B.: New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Advances in Cryptology–CRYPTO (2012)Google Scholar
  3. 3.
    Tseng, Y.M., et al.: Identity-based encryption with cloud revocation authority and its applications. IEEE Trans. Cloud Comput. 6(4), 1041–1053 (2016)CrossRefGoogle Scholar
  4. 4.
    Sowmya, B., Madhavi, K.: Secured cloud storage via attiribute-based encryption. IJCSE Int. J. Comput. Sci. Eng. 5(7), 96–100 (2017)Google Scholar
  5. 5.
    Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)CrossRefGoogle Scholar
  6. 6.
    Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457–473. Springer, Heidelberg (2005)Google Scholar
  7. 7.
    Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: Annual International Cryptology Conference, pp. 205–222. Springer, Heidelberg (2005)Google Scholar
  8. 8.
    Qiu, S., Liu, J., Shi, Y., Li, M., Wang, W.: Identity-based private matching over outsourced encrypted datasets. IEEE Trans. Cloud Comput. 6(3), 747–759 (2017)CrossRefGoogle Scholar
  9. 9.
    Yin, H.., Qin, Z., Zhang, J., Ou, L., Li, K.: Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data (2017)Google Scholar
  10. 10.
    Karthiban, K., Smys, S.: Privacy preserving approaches in cloud computing. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC) 19 January 2018, pp. 462–467.IEEE (2018)Google Scholar
  11. 11.
    Sridhar, S., Smys, S.: A survey on cloud security issues and challenges with possible measures. In: International Conference on Inventive Research in Engineering and Technology, vol. 4 (2016)Google Scholar
  12. 12.
    Chase, M., Chow, S.S.: Improving privacy and security in multiauthority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM (2009)Google Scholar
  13. 13.
    Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques, pp. 506–522. Springer, Heidelberg (2004)Google Scholar
  14. 14.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE S&P 2007, pp. 321–334 (2007)Google Scholar
  15. 15.
    Tseng, Y.M., et al.: Identity-based encryption with cloud revocation authority and its applications. IEEE Trans. Cloud Comput. 6(4), 1041–1053 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Nallella Thirupathi
    • 1
    Email author
  • K. Madhavi
    • 1
  • G. Ramesh
    • 1
  • K. Sowmya Priya
    • 1
  1. 1.GRIETHyderabadIndia

Personalised recommendations