Secured Framework with a Hash Function-Enabled Keyword Search in Cloud Storage Services

被引:0
|
作者
Punitha, P. [1 ]
Kumar, Lakshmana [2 ]
Revathi, S. [3 ]
Premalatha, R. [4 ]
Aiswarya, R. S. [5 ]
机构
[1] Tagore Inst Engn & Technol, Dept Artificial Intelligence & Data Sci, Salem, India
[2] Tagore Inst Engn & Technol, Dept Artificial Intelligence & Machine Learning, Salem, India
[3] Anna Univ, Dept Informat & Commun Engn, Chennai, India
[4] IFET Coll Engn, Villupuram, India
[5] KPR Inst Engn & Technol, Dept Elect & Commun Engn, Coimbatore, India
关键词
IoT; cloud computing; MECC; IKGA; MD5; PEKS; CL-HPAEKS; AUTHENTICATED ENCRYPTION; ATTACKS;
D O I
10.1142/S0218843024500011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As with IoT devices, cloud computation increases its applicability to other areas that use the information and puts it in a commonplace that is necessary for computing and analysis. These devices need the cloud to store and retrieve data since they are unable to store and process data on their own. Cloud computing offers a variety of services to consumers, including IaaS, PaaS, and SaaS. The usage of cloud resources for data storage that may be accessible by all users associated with cloud computing is a key disadvantage of cloud computing. Without disclosing the data's contents, the usage of Public Key Encryptions with Keyword Search (PEKS) secures publicly encrypted keys against third-party search capabilities that are not trustworthy. PEKs provide a security risk every time Interior Keywords Guessing Attacks (IKGA) are discovered in the system since an unauthorized service estimates the keywords in the trapdoor. This issue can be resolved using various methodologies such as the Certificateless Fleshed Public Key Authenticated Encryption of Keyword Search (CL-HPAEKS), which also uses Altered Elliptic Curve Cryptography (MECC), and the Mutation Centred Flower Pollinations Algorithm (CM-FPA), which uses optimization in keys to be improving the algorithm's performance. The system's security is achieved by adding a Message Fragments 5 (MD5) scramble mechanism. The proposed system achieves system security of 96%, and it takes less time to implement than earlier encryption methods.
引用
收藏
页数:33
相关论文
共 50 条
  • [1] Secure Symmetric Keyword Search with Keyword Privacy for Cloud Storage Services
    Youn, Taek-Young
    Rhee, Hyun Sook
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [2] Orchini Similarity User Authentication Based Streebog Hash Function for Secured Data Storage in Cloud
    Bebe, P. Calista
    Akila, D.
    [J]. PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 468 - 473
  • [3] NFEH: An SDN Framework for Containerized Network Function-enabled End Hosts
    Gandotra, Rahil
    Perigo, Levi
    [J]. 2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,
  • [4] Research on Privacy Preserving Keyword Search in Cloud Storage
    Liu Hong-xia
    Dai Jia-zhu
    Jiang Chao
    [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2010, : 444 - 446
  • [5] FMDV: Dynamic Flow Migration in Virtual Network Function-Enabled Cloud Data Centers
    Aguilera, Phillip
    Gonzalez, Christopher
    Tang, Bin
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 5463 - 5468
  • [6] Efficient Public Encryption Scheme with Keyword Search for Cloud Storage
    Guo, Lifeng
    Li, Zhihao
    Hu, Lei
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (07): : 1404 - 1414
  • [7] Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage
    Kikuchi, Hiroaki
    Itoh, Kouichi
    Ushida, Mebae
    Yamaoka, Yuji
    Oikawa, Takanori
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 164 - 169
  • [8] Secure and privacy preserving keyword searching for cloud storage services
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 927 - 933
  • [9] Hash function design for cloud storage data auditing
    Doukas, Nikolaos
    Markovskyi, Oleksandr P.
    Bardis, Nikolaos G.
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 800 : 42 - 51
  • [10] KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
    Li, Jiguo
    Lin, Xiaonan
    Zhang, Yichen
    Han, Jinguang
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) : 715 - 725