IJSTR

International Journal of Scientific & Technology Research

Home Contact Us
ARCHIVES
ISSN 2277-8616











 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

IJSTR >> Volume 8 - Issue 10, October 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



An Efficient Privacy Preserving And Data Retrieval In Multiple Clouds

[Full Text]

 

AUTHOR(S)

Dorababu Sudarsa, P.Venkateswara rao, Venkata Naresh Mandhala, S. Sagar Imambi

 

KEYWORDS

Privacy-preserving keyword search, reliability, cloud computing, STRE, CSPs, encrypted files, ABE Technique.

 

ABSTRACT

Cloud computing is growing rapidly and it is known for accessing and storing huge amount of data. There are multiple CSPs and also known as data owners. The role of owner of the data includes to upload the encrypted files to the multiple clouds. Cloud consumers appreciate fewer data storage and extremely incredible estimation capacities offered by different multiple clouds. Cloud service providers acquire numerous issues in protection safeguarding for outsourcing data. Our work incorporates furnishing proficient security utilizing STorage and REtrieval (STRE) mechanism with Attribute based Encryption(ABE) method. STRE mechanism makes data owner to distribute the data and search the encrypted data in various multiple clouds. STRE system also offers better assurance on the user's search pattern. ABE technique enables the files to encrypt efficiently.

 

REFERENCES

[1] Li, J., Lin, D., Squicciarini, A.C., Li, J. and Jia, C., 2015. Towards privacy-preserving storage and retrieval in multiple clouds. IEEE Transactions on Cloud Computing, 5(3), pp.499-509.
[2] Curtmola, R., Garay, J., Kamara, S. and Ostrovsky, R., 2011. Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security, 19(5), pp.895-934.
[3] Yavuz, A.A. and Guajardo, J., 2015, August. Dynamic searchable symmetric encryption with minimal leakage and efficient updates on commodity hardware. In International Conference on Selected Areas in Cryptography (pp. 241-259). Springer, Cham.
[4] Kamara, S. and Papamanthou, C., 2013, April. Parallel and dynamic searchable symmetric encryption. In International Conference on Financial Cryptography and Data Security (pp. 258-274). Springer, Berlin, Heidelberg.
[5] Chang, Y.C. and Mitzenmacher, M., 2005, June. Privacy preserving keyword searches on remote encrypted data. In International Conference on Applied Cryptography and Network Security (pp. 442-455). Springer, Berlin, Heidelberg.
[6] Song, D.X., Wagner, D. and Perrig, A., 2000, May. Practical techniques for searches on encrypted data. In Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000 (pp. 44-55). IEEE.
[7] Goldreich, O. and Ostrovsky, R., 1996. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM), 43(3), pp.431-473.
[8] Cao, N., Wang, C., Li, M., Ren, K. and Lou, W., 2013. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on parallel and distributed systems, 25(1), pp.222-233.
[9] Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y.T. and Li, H., 2013. Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Transactions on Parallel and Distributed Systems, 25(11), pp.3025-3035.
[10] Goh, E.J., 2003. Secure indexes. IACR Cryptology ePrint Archive, 2003, p.216.
[11] Kuchta, V., 2016. Distributed protocols for digital signatures and public key encryption (Doctoral dissertation, University of Surrey).
[12] Lewko, A. and Waters, B., 2011, May. Decentralizing attribute-based encryption. In Annual international conference on the theory and applications of cryptographic techniques (pp. 568-588). Springer, Berlin, Heidelberg.
[13] Aluvalu, R. and Muddana, L., 2015. A survey on access control models in cloud computing. In Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1 (pp. 653-664). Springer, Cham.
[14] Li, J., Lin, D., Squicciarini, A. and Jia, C., 2014, September. STRE: Privacy-preserving storage and retrieval over multiple clouds. In International Conference on Security and Privacy in Communication Networks (pp. 36-44). Springer, Cham., doi:10.1109/TKDE.2007.190746.(PrePrint)