A study on keyword searchable frameworks for efficient data utilization in cloud storage



Similar documents
An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

Secure semantic based search over cloud

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY

How To Create A Multi-Keyword Ranked Search Over Encrypted Cloud Data (Mrse)

Ranked Search over Encrypted Cloud Data using Multiple Keywords

Ranked Keyword Search Using RSE over Outsourced Cloud Data

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

CLOUD COMPUTING SECURITY IN UNRELIABLE CLOUDS USING RELIABLE RE-ENCRYPTION

Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve

Development of Secure Multikeyword Retrieval Methodology for Encrypted Cloud Data

Data management using Virtualization in Cloud Computing

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD

Loss Less and Privacy Preserved Data Retrieval in Cloud Environment using TRSE

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud

Data Security Using Reliable Re-Encryption in Unreliable Cloud

Facilitating Efficient Encrypted Document Storage and Retrieval in a Cloud Framework

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Security over Cloud Data through Encryption Standards

A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications

SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK

Privacy Preserving Public Auditing for Data in Cloud Storage

Secure Keyword Based Search in Cloud Computing: A Review

Role Based Encryption with Efficient Access Control in Cloud Storage

Scalable and secure sharing of data in cloud computing using attribute based encryption

Assuring Integrity in Privacy Preserving Multikeyword Ranked Search over Encrypted Cloud Data

Cryptographic Data Security over Cloud

PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

Secure Data Sharing in Cloud Computing using Hybrid cloud

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Enabling Protection and Well-Organized MRSE over Encrypted Cloud Data Using CP-ABE

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

SECURITY FOR ENCRYPTED CLOUD DATA BY USING TOP-KEY TREE TECHNOLOGIES

Multi Layered Securing of Health Records using Public and Private Model in Cloud

ADVANCE SECURITY TO CLOUD DATA STORAGE

KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE

Isolated Distribution of Health Records in Cloud Computing using Attribute-Based Encryption

Privacy Preservation and Secure Data Sharing in Cloud Storage

Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

Keywords: cloud computing, multiple keywords, service provider, search request, ranked search

AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA

Decentralized Access Control Schemes for Data Storage on Cloud

ASSURANCE OF PATIENT CONTROL TOWARDS PERSONAL HEALTH DATA

Outstanding Cloud Security Service For Modify Data Distribute In Cloud Method

Near Sheltered and Loyal storage Space Navigating in Cloud

Data defense in unpredictable Cloud Using Access Control and Access Time

A Security Integrated Data Storage Model for Cloud Environment

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud

Fuzzy Keyword Search over Encrypted Data using Symbol-Based Trie-traverse Search Scheme in Cloud Computing

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Survey on Securing Data using Homomorphic Encryption in Cloud Computing

Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.

A Secure Decentralized Access Control Scheme for Data stored in Clouds

DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS

Secure Privacy Preserving Public Auditing for Cloud storage

SECURE VARIOUS-KEYWORD STRATIFIED SEARCH THROUGH ENCRYPTED DATA IN CLOUD

G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

Seclusion Search over Encrypted Data in Cloud Storage Services

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Cloud Data Storage Security and Public Auditing

Enhance data security of private cloud using encryption scheme with RBAC

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

How To Make A Secure Storage On A Mobile Device Secure

Data Security in Cloud Using Elliptic Curve Crytography

COMPUSOFT, An international journal of advanced computer technology, 4 (4), April-2015 (Volume-IV, Issue-IV)

ISSN: (Online) Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

Semi-Trusted Authentication for Health Data in Cloud

A Road Map on Security Deliverables for Mobile Cloud Application

EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2

CLOUD BASED STORAGE SERVICES FOR SECURITY FOLLOWED BY THE DATA AUTHENTICATION

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Categorical Heuristic for Attribute Based Encryption in the Cloud Server

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keyword Search over Shared Cloud Data without Secure Channel or Authority

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Transcription:

A study on able frameworks for efficient data utilization in cloud storage Bhagyashree M V 1, Pushpalatha M N 2 1 Student, Dept. of ISE, M S Ramaiah institute of technology, Karnataka, India 2Asst. professor, Dept. of ISE, M S Ramaiah institute of technology, Karnataka, India ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract: Yester year advances in computer technology has resulted in huge success of cloud computing by gaining the software, platform and infrastructure from the vendor or third party. When it comes to data storage, cloud storage becomes the first choice. Public data centres stores user data and the hopeful benefit of cloud computing is outsourcing of data. Cloud computing paradigm facilitates data management for users by economically saving their percapita investment. However there is a substantial problem of outsourcing the data for accessing unauthorized data and hence there is no sense it is not effectively utilized. The biggest obstacle is how to attain efficient data utilization from public cloud storage focusing at various searchable techniques for improved data utilization. An effort is made in this paper to study different searching techniques for efficient data utilization from public cloud storage and further discussed in detail. Keywords: cloud server(cs), efficient data utilization,, data outsourcing, security 1. INTRODUCTION As a simple and straight forward definition for cloud computing an alternative of using local servers or personal computers to store, process or manage data is using a collection of remote servers hosted on internet [1,2]. Outside cloud customers are provided with on demand, dynamically scalable computing power, services, storage and platforms through the internet. Third party service providers or vendors run the public cloud. Applications from number of users are combined together on servers, storages and networks. Cloud storage benefits users with on demand storage space and make user convenient, fool-proof and timely data acquisition. The structuring of the rest of the paper is as follows. In sector 2, the existing searchable techniques are discussed. Sector 3, consists of the constraints and drawbacks. The performance analysis of all searching strategies is discussed in Sector 4. And finally, the conclusion is followed in sector 5. 2. KEYWORD SEARCHING TECHNIQUES 2.1 Authorized Private keyword (APKS) Ming Li [4,5] proposed APKS and APKS+. APKS method upgrades the search efficiency using attribute hierarchy, and APKS+ magnifies the query privacy with the aid of proxy servers that swamp the dictionary storm (attacks). To the best of the knowledge APKS+ is the first most to achieve multi-dim range query and capacity delegation. The three important highlights of APKS is that provides keyword, Index and Query Privacy, Fine-grained Authorization, Multi-dimensional Keyword, Scalability and Efficiency. 2.2 Secured and privacy preserved The cloud service providers usually allowed to participate in partial decipherment in order to reduce overhead caused due to computations. This framework was proposed by Qin Liu[3]. It provides both keyword and data privacy by public key encryption. The encrypted keyword trapdoor is submitted by the data user by using user private key to CS securely and receives the documents in encrypted form. And then decrypts it. This framework enables cloud provider to compute whether an electronic mail incorporated with the keywords as per the user. 1.1 Secured fuzzy keyword This framework returns the matching files when data user search inputs accurately matches the already defined keywords based on the semantics, when there is a fail in exact match. Kui Ren[6] proposed this approach with symmetric searchable encryption (SSE). For keyword w e, it builds the fuzzy keyword set Tw with the parameter called edit distance d without affecting search correctness. 2015, IRJET.NET- All Rights Reserved Page 1307

When user searches for a w e with cloud server, it searches Tw and replies back with encrypted docs identical to Tw. They build the storage capable fuzzy keyword set by using wild card and fuzzy searchable index. 1.2 Secure and Efficient Ranked Keyword Proposed by Cong Wang[7]. This framework improves the efficiency of searching. It retrieves the documents based on conceptual entities. It also uses a mechanism called topic detection and tracking. This technique solves the problem caused due to processing overhead, data and keyword privacy. The data owner constructs index along with the keyword s frequency-based relevance scores for documents. User request w e to CS with optional k as Tw using the private key. The CS searches the document index with scores and replies with the encrypted documents depending upon the ranked order. Here order preserving symmetric encryption is made use of in order to safeguard cloud data. It efficiently uses outsourced files by providing inter cloud communication between data users and owners. 1.3 K-gram based fuzzy keyword Ranked Previous cloud computing searchable encryption techniques allows users to search encrypted data by keywords securely, but these methods only support exact and will fail to perform if there are any spelling mistakes/morphological variants of words. Wei Zhou[8] proposed this method. A concept of k-grams index is used. K-grams is a sequence of k characters. For example, dia, ram, agr and iag are all the 3-grams of the word diagram. Here owner creates k-gram fuzzy keyword index I n for D number of documents and tuple as <I n,d> and is uploaded to CS. The encrypted doc D is uploaded to storage server. When keyword K is submitted by the data user, the k-gram fuzzy keyword set and computes weight of each word in the set and are searched with index I n by CS. Then the CS displays all documents in sorted sequence identical to the index based on rank. Finally performance complexity is O(N) Where, N is total number of keywords. 1.4 Privacy-preserving Multi-keyword Text Wen hai[9] Sun suggested this method which implements similarity based search resulting ranking, keyword privacy, Index and Query confidentiality and Query Unlinkability. Vector space model concept is employed here in order to build the index for encrypted files. It supports both conjunctive and disjunctive file search. The searchable index is created using Multidimensional search tree. Data owner creates encrypted query vector Ǭ for file s keyword set. Finally CS searches index by MD algorithm and compares cosine measure of document and query vector and consequently returns top k encrypted files to user. 1.5 VFKS-Verifiable fuzzy It maintains verifiability of search results in addition with fuzzy. Jianfeng Wang proposed this search strategy. He made use of symbol-tree and index Ḡw which is having the unique value proof and the path for each node without key k. When CS gets the keyword as the query, it searches Ḡw and returns already stored encrypted documents. Finally the confirmation is done by users by cross-verifying the proofset and IDset generated from index. For each of the user query, the verifying cost (computation cost )is only a constant complexity. 2.8 Public-Key Encryption with Keyword (PEKS ) PEKS is semantically secure. This strategy was suggested by D. Boneh[10], which incorporates that CS contains encrypted files and keyword. User creates keyword trapdoor Tw using its private key to search W. The CS examines Tw with current existing encrypted keyword and sends encrypted file that is identical to it. There exists a secured channel between the data owner, cloud server and data user because owner does file encryption and server does the user authentication. 2.9 Secured multikeyword (ranked)top-k Retrieval Jiadi[11] suggests this search technique using Two-round searchable encryption (TRSE). Basically in first round, users submits multiple keyword requests REQ W as encrypted query for acquiring data, keyword privacy and builds trapdoor(req, PK) as Tw and gives to CS. Then CS computes the scores from encrypted index for docs and gives the encrypted search result vector to the data user. And in the second round, user carries out decryption of N with secret key and calculates the doc ranking and then requests files with top-k(relavant) scores. The scoring and ranking of files is done on server side and user side respectively. 2.10 Attribute-based Keyword It is a novel cryptographic solution. It enforces access control policies via means of cryptography. It decrypts cipher text that was encrypted according to access control policy by entities with proper credentials. There are two variants: key-policy ABE (KPABE) where the decryption key is associated to the access control policy, and 2015, IRJET.NET- All Rights Reserved Page 1308

ciphertext-policy ABE (C-ABE ) where the ciphertext is associated to the access control policy. And important feature is a cheating cloud can be held accountable. According to this method a data owner can control the search of his/her outsourced encrypted data through an access control policy and the authorized data users can outsource the search operations to the cloud server and force the cloud to trustfully execute the search operations. 3. CONSTRAINTS AND DRAWBACKS OF THE ABOVE DISCUSSED KEYWORD SEARCHING FRAMEWORKS. 3.1 APKS-Authorized Private keyword : In tradition, not all the attributes are hierarchical. 3.2 Secured and privacy preserved keyword search: The communication and computational cost for both decryption and encryption is heavier and amassed. 3.3 Secured fuzzy keyword : Doesn t support fuzzy search with public key-based searchable encryption, does not perform multiple keywords and semantic search, the updates for fuzzy searchable index are inefficiently. 3.4 Secure and Efficient Ranked Keyword : multiple es not performed, little amount of overhead in index creation. 3.5 Verifiable fuzzy : this method, Verifiable fuzzy requires extra storage for storing the symbol tree fuzzy searchable index Ḡw, The updates for fuzzy searchable index is not so efficient. 3.6 Privacy assured searchable cloud Storage: This scheme exposes the approach pattern to the cloud server, It does not shields the sum of multiple keywords scores from the cloud server, which results in accessing the statistical data for re-identifying the search keywords, public key based searchable encryption is not supported. 3.7 K-gram based fuzzy keyword Ranked : The length of the k-gram based fuzzy keyword set purely depends on the jaccard coefficient value. 3.8 Privacy-preserving Multi-keyword Text : The similarity rank score of the document vector purely confide on the category of the document 3.9 Secure Multi-keyword Top-k Retrieval : Though the reduction and compression is utilized to decrease cipher text size, the key length is still too huge, The communication overhead will be too high if the encrypted trapdoor size is too large, It does not make effective searchable index update. 3.10 Public-Key Encryption with Keyword : building a secure channel is more expensive and inefficient, the trapdoor must be built for each keyword by the data user, it does not support multiple, Keywords may be hacked by KGA-Keyword Guessing Attack. 4. APPENDIX A PERFORMANCE ANALYSIS OF SEARCHING METHODS Sl.no. Table 1: performance analysis ing methods 1 Secure and privacy Preserving 2 Authorized Private Keyword (APKS) 3 Secure and Efficient Ranked Keyword 4 Secured fuzzy Performance complexity Computation cost of O(Time(A)) While, N is total number of keywords and M is maximum size of the keyword set Setup= O(N2) Encryption=O(N) =O(M log N) O(log M) Where, M is domain score of keyword W While W is keyword, N the total number of keywords and M the maximum size of the fuzzy keyword Fuzzy set cost - Storage cost - O(MN) cost O(1) 2015, IRJET.NET- All Rights Reserved Page 1309

5. CONCLUSION 5 Privacy assured searchable cloud Storage 6 K-gram based fuzzy keyword Ranked 7 Verifiable fuzzy (VFKS) 8 Privacy preserving Multikeyword Text 9 Public-Key Encryption with Keyword Where W is the keyword O(N) Where, N is total number of keywords. Storage cost - O(MN) cost O(1) Verify cost - O(1) Where, N is the total number of keywords M is the maximum size of the fuzzy Keyword Where W is the number of keyword Time cost of proxy =O(N) Communication cost = O(2T) Where, T is the average number of keywords cipher text searchable This paper epitomizes distinct searching frameworks in the encrypted cloud data. We have pin-pointed and diagnosed the main issues that are to be satisfied for secured data utilization are keyword privacy, Data privacy, Index privacy, Query Privacy, Fine-grained, Scalability, Efficiency, Result ranking, Index confidentiality, Query confidentiality, Query unlinkability, semantic security and Trapdoor unlinkability. We have done a precise study on the security and data utilization issues in the cloud storage for some of the available searching strategies some of the searching techniques mainly targets on security and some on data utilization. The constraints of all the searching techniques are reviewed as well. Finally, by the atop survey, security can be provided by Public-Key Encryption and effective data utilization by fuzzy keyword search. We believe that this paper will help the researchers to shape their issues in the field of data utilization in cloud storage. ACKNOWLEDGMENT I would like to thank Dr. Vijaya Kumar B P, Head of Department of Information Science Engineering, MSRIT his valuable guidance. REFERENCES [1] J. Geelan. Twenty one experts define cloud computing, Virtualization,August 2008. [2] Foster et al., Cloud computing and grid computing 360- degree compared, Grid Computing Environments Workshop, 2008.GCE 08, 2009 [3] Qin Liuy, Guojun Wangyz, and Jie Wuz, Secure and privacy preserving ing for cloud storage services,elsevier Journal of Network and computer Applications, March 2011 [4] Ming Li et al., Toward Privacy-Assured and able Cloud Data Storage Services, IEEE Transactions on Network, volume 27, Issue 4, July/August 2013 10 Secure Multi keyword Top-k Retrieval matching the query Setup= O(λ) Trapdoor=O(l) Score= O(Nl) Decryption =O(N) [5] Ming Li et al., Authorized Private Keyword over Encrypted Data in Cloud Computing, IEEE proc. International conference on distributed computing systems,june 2011,pages 383-392 [6] Kui Ren et al.,, Towards Secure And Effective Data utilization in Public Cloud, IEEE Transactions on Network, volume 26, Issue 6, November / December 2012 [7] Cong Wang et al., Enabling Secure and Efficient Ranked Keyword over Outsourced Cloud Data, IEEE Transactions on parallel and distributed systems, vol. 23, no.8, August 2012 2015, IRJET.NET- All Rights Reserved Page 1310

[8] Wei Zhou et al., K-Gram Based Fuzzy Keyword over Encrypted Cloud Computing Journal of Software Engineering and Applications, Scientific Research, Issue 6, Volume 29 32,January2013 [9] Wenhai Sun et al.,"verifiable Privacy- Preserving Multikeyword Text in the Cloud Supporting Similaritybased Ranking'', Accepted for IEEE Transactions on Parallel and Distributed Systems (TPDS) [10] D. Boneh et al.,, Public key encryption with keyword search," in Advances in Cryptology EUROCRYPT 2004, Lecture Notes in Computer Science, vol. 3027, pp. 506-522, Interlaken, Switzerland, 2004. Springer [11] Jiadi Yu, Peng Lu, Yanmin Zhu, Guangtao Xue, Member, IEEE Computer Society, and Minglu Li, Toward Secure Multikeyword Topk Retrieval over Encrypted Cloud Data, IEEE Transactions on dependable and secure computing, vol. 10, no. 4, July/August 2013 BIOGRAPHIES Bhagyashree M V received B.E (ISEI) in 2007 from Vidyavardhaka college of engg, mysore affiliated to VTU Belgaum. She is currently pursuing M.Tech in MSRIT affiliated to Vishveshwariah technological university, Belgaum. Her research interests include cloud computing, data mining and big data. Mrs. Pushpalatha M N, born on 21 st Jan 1983 is an assistant professor in Department of Information Science and Engineering at M S Ramaiah Institute of Technology, Bangalore- 54. Her areas of interest is Software Engineering and data mining. She completed M.Tech in Computer Science and Engineering from M S Ramaiah Institute of Technology, Visvesvaraya Technological University. 2015, IRJET.NET- All Rights Reserved Page 1311