Skip to main content

2020 | OriginalPaper | Buchkapitel

Efficient and Secure Data Storage CP-ABE Analysis Algorithm

verfasst von : V. SenthurSelvi, S. Gomathi, V. Perathu Selvi, M. Sharon Nisha

Erschienen in: Intelligent Communication Technologies and Virtual Mobile Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the contemporary digital environment, secure search over encrypted data is necessary to prevent the unauthorized data usage practices. To provide data privacy and security fine grained access control is important. For having data privacy data have to be stored onto the cloud in an encrypted form and have to be decrypted before retrieving the message. Encrypting the information is a tedious process for mobiles and also its recovery is a significantly challenging task since the mobile devices have limited bandwidth and battery life. Searching the encrypted data over mobile cloud is a tedious process. To tackle this issue, Cipher text Policy Attribute Based Encryption (CP-ABE) mechanism is proposed. The proposed system will perform computation in cloud rather than the mobile device. This mechanism could effectively prevent malicious searching and decrypting of files. Also, the proposed system support many number of attributes and flexible multiple keyword search patterns in which query file order will not affect the search result. This indicates CP-ABE scheme to improve the efficiency and security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Vaquero, L., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39(1), 50–55 (2008)CrossRef Vaquero, L., Rodero-Merino, L., Caceres, J., Lindner, M.: A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput. Commun. Rev. 39(1), 50–55 (2008)CrossRef
2.
Zurück zum Zitat Yu, X., Wen, Q.: Design of security solution to mobile cloud storage. In: Knowledge Discovery and Data Mining, pp. 255–263. Springer, Heidelberg (2012) Yu, X., Wen, Q.: Design of security solution to mobile cloud storage. In: Knowledge Discovery and Data Mining, pp. 255–263. Springer, Heidelberg (2012)
3.
Zurück zum Zitat Huang, D.: Mobile cloud computing. In: IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter (2011) Huang, D.: Mobile cloud computing. In: IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter (2011)
4.
Zurück zum Zitat Mazhelis, O., Fazekas, G., Tyrvainen, P.: Impact of storage acquisition intervals on the cost-efficiency of the private vs. public storage. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 646–653. IEEE (2012) Mazhelis, O., Fazekas, G., Tyrvainen, P.: Impact of storage acquisition intervals on the cost-efficiency of the private vs. public storage. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 646–653. IEEE (2012)
5.
Zurück zum Zitat Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized in-cloud security services for mobile devices. In: Proceedings of the First Workshop on Virtualization in Mobile Computing, pp. 31–35. ACM (2008) Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized in-cloud security services for mobile devices. In: Proceedings of the First Workshop on Virtualization in Mobile Computing, pp. 31–35. ACM (2008)
6.
Zurück zum Zitat Oberheide, J., Jahanian, F.: When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 43–48. ACM (2010) Oberheide, J., Jahanian, F.: When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 43–48. ACM (2010)
7.
Zurück zum Zitat Moffat, A., Bell, T.: Managing Gigabytes: Compressing and Indexing Documents and Images. Morgan Kaufmann Publishers, San Francisco (1999)MATH Moffat, A., Bell, T.: Managing Gigabytes: Compressing and Indexing Documents and Images. Morgan Kaufmann Publishers, San Francisco (1999)MATH
8.
Zurück zum Zitat Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE Symposium on Security and Privacy, 2000. S&P 2000, pp. 44–55. IEEE (2000) Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE Symposium on Security and Privacy, 2000. S&P 2000, pp. 44–55. IEEE (2000)
9.
Zurück zum Zitat Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology Eurocrypt 2004, pp. 506–522. Springer, Heidelberg (2004)CrossRef Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology Eurocrypt 2004, pp. 506–522. Springer, Heidelberg (2004)CrossRef
10.
Zurück zum Zitat Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.,: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM (2006) Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.,: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM (2006)
11.
Zurück zum Zitat Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, pp. 391–421. Springer, Heidelberg (2005)CrossRef Chang, Y., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, pp. 391–421. Springer, Heidelberg (2005)CrossRef
12.
Zurück zum Zitat Zerr, S., Olmedilla, D., Nejdl, W., Siberski, W.: Zerber +r: top k retrieval from a confidential index. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, pp. 439–449. ACM (2009) Zerr, S., Olmedilla, D., Nejdl, W., Siberski, W.: Zerber +r: top k retrieval from a confidential index. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, pp. 439–449. ACM (2009)
13.
Zurück zum Zitat Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)CrossRef Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467–1479 (2012)CrossRef
14.
Zurück zum Zitat Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 253–262. IEEE (2010) Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: 2010 IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 253–262. IEEE (2010)
15.
Zurück zum Zitat Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)CrossRef Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2014)CrossRef
16.
Zurück zum Zitat Wang, B., Yu, S., Lou, W., Hou, Y.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: INFOCOM, 2014 Proceedings IEEE (2014) Wang, B., Yu, S., Lou, W., Hou, Y.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: INFOCOM, 2014 Proceedings IEEE (2014)
Metadaten
Titel
Efficient and Secure Data Storage CP-ABE Analysis Algorithm
verfasst von
V. SenthurSelvi
S. Gomathi
V. Perathu Selvi
M. Sharon Nisha
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-28364-3_47