Providing a Secure Cloud Storage by Using Attribute Based Temporary Key Word Search SchemeAuthor : Likhita Meka and Srivyshnavi Pagadala
Volume 8 No.3 Special Issue:June 2019 pp 117-121
The cloud providers are not fully trusted in the accept of temporary keyword search on confidential data. Hence this is the main focus of this research, it is necessary to outsource data in the encrypted format. In the attribute-based keyword search scheme the authorized users generate some tokens which were in encrypted format and send them to cloud for the search operation. These tokens can be used to extract all the cipher texts which are generated at any time and contain the search token which were generated by authorized users. Since this may lead to some information leakage, a new cryptographic primitive is introduced which is more secure to propose a scheme in which the search tokens can only extract the cipher texts generated in a specified time interval and that cryptographic primitive is called key-policy attribute-based temporary keyword search (KPABTKS) which provide this property. To evaluate the security, we have to prove that the proposed scheme achieves the keyword secrecy property and is secure against selectively chosen keyword attack (SCKA) both in the random oracle model and Decisional Bilinear Diffie-Hellman (DBDH) assumption.And at last the research will show the complexity of the encryption algorithm is linear with respect to the number of the involved attributes.
Secure Cloud Storage, Key Policy, Security Analysis, Token Gen
 Yong Yu, Jianbing Ni, Haomiao Yang, Yi Mu, and Willy Susilo, “Security and Communication Networks”, Security Comm. Networks, No.7, pp. 466–472, DOI: 10.1002/sec.790, 2014.
 Mohammad Hassan Ameri, MahshidDelavar, JavadMohajeri, and Mahmoud Salmasizadeh, “A Key-Policy Attribute-Based Temporary Keyword Search Scheme for Secure Cloud Storage”, DOI: 10.1109/TCC.2018.2825983, IEEE, 12 April 2018.
 K. Liang and W. Susilo, “Searchable attribute-based mechanism with efficient data sharing for secure cloud storage,”IEEE Transactions on Information Forensics and Security, No. 9, pp. 1981–1992, 2015.
 J. Han, W. Susilo, Y. Mu, and J. Yan, “Attribute-based data transfer with filtering scheme in cloud computing,” The Computer Journal, Vol. 57, No. 4, pp. 579–591, 2014.
 V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM conference on Computer and communications security. Acm, Vol. 89–98, 2006
 W. Sun, S. Yu, W. Lou, Y.T. Hou, and H. Li, “Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud,” IEEE Transactions on Parallel and Distributed Systems, Vol. 27, No. 4, pp. 1187–1198, 2016.
 Shamus, “Multiprecision integer and rational arithmetic c/c++ library (miracl),”MIRACL, 2014. [Online] Available at: http://www.certivox. com/miracl/miracl-download/.
 Sneha R. Ghorpade, and S.N. Kini “Dual Server Hybrid Key Encryption with Multi Keyword Search”, an ISO 3297: 2007 Certified Organization, Vol. 5, No. 6, June 2017.
 H. Deng, Q. Wu, B. Qin, J. Domingo-Ferrer, L. Zhang, J. Liu, and W. Shi, “Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts,” Information Sciences, Vol. 275, pp. 370–384, 2014.
 Y. Yu, J. Ni, H. Yang, Y. Mu, and W. Susilo, “Efficient public key encryption with revocable keyword search,”Security and Communication Networks,Vol. 7, No. 2, pp. 466–472, 2014.
 E.J. Gohet al., “Secure indexes”, IACR Cryptology e-Print Archive, Vol. 216, 2003.
 S.T. Hsu, C.C. Yang, and M.S. Hwang, “A study of public key encryption with keyword search”, IJ Network Security, Vol. 15, No. 2, pp. 71–79, 2013.