Secure keyword search using dual encryption in cloud computing

This paper manages the secure searching, stockpiling and recovery of client information in the cloud framework. Different services of cloud, security issues and security necessities of cloud information being talked about. We have utilized fuzzy keyword searching scheme to seek and recover the encrypted data by utilizing wild card technique. We have devised a new approach of double encryption framework in light of authentication of the server to give more grounded security to the current fuzzy keyword searching techniques. We have coordinated symmetric and asymmetric encryption algorithms to improve information security. This work, for the most part, concentrates on authentication of the server to enhance the security framework and shield sensitive client’s information from unauthorized exposure.

[1]  Dhishan Dhammearatchi,et al.  Cloud computing – Enhancement of Security with respect to Encryption and secure APIs , 2016 .

[2]  Weiming Zhang,et al.  Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search , 2015, IEEE Transactions on Information Forensics and Security.

[3]  Xingming Sun,et al.  Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query , 2014, IEEE Transactions on Consumer Electronics.

[4]  Guang Gong,et al.  Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers , 2012, 2012 IEEE International Conference on Communications (ICC).

[5]  Swati Kashyap,et al.  A Review on: Network Security and Cryptographic Algorithm , 2015 .

[6]  Cong Wang,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[7]  Cong Wang,et al.  Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[8]  Debahuti Mishra,et al.  Improved search technique using wildcards or truncation , 2009, 2009 International Conference on Intelligent Agent & Multi-Agent Systems.

[9]  Cong Wang,et al.  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.

[10]  Debahuti Mishra,et al.  Search Technique Using Wildcards or Truncation: A Tolerance Rough Set Clustering Approach , 2010 .

[11]  Rongzhi Wang Research on Data Security Technology Based on Cloud Storage , 2017 .

[12]  Qiang Tang,et al.  A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search , 2012, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[13]  Neelam S. Khan,et al.  Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data , 2014, 2014 International Conference on Computer and Communication Technology (ICCCT).

[14]  Qiang Tang,et al.  A New Efficient Verifiable Fuzzy Keyword Search Scheme , 2012, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[15]  Prerna Mahajan,et al.  A Study of Encryption Algorithms AES, DES and RSA for Security , 2013 .

[16]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[17]  G. Sahoo,et al.  Securing Software as a Service Model of Cloud Computing: Issues and Solutions , 2013, CloudCom 2013.

[18]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[19]  E. Anita,et al.  A survey on data breach challenges in cloud computing security: Issues and threats , 2017, 2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT).

[20]  David Hutchison,et al.  Malware Detection in Cloud Computing Infrastructures , 2016, IEEE Transactions on Dependable and Secure Computing.

[21]  M. Avram,et al.  Advantages and Challenges of Adopting Cloud Computing from an Enterprise Perspective , 2014 .

[22]  Monjur Ahmed,et al.  Cloud Computing and Security Issues in the Cloud , 2014, Trinity Journal of Management, IT & Media.

[23]  Sawan Kumar,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[24]  Aaron Gomes CLOUD COMPUTING: PLATFORM AS A SERVICE , 2014 .

[25]  Narendra Shekokar,et al.  Implementation of Fuzzy Keyword Search over Encrypted Data in Cloud Computing , 2015 .

[26]  Ramayya Krishnan,et al.  Privacy-preserving similarity-based text retrieval , 2010, TOIT.

[27]  Lucas Ballard,et al.  Achieving Efficient Conjunctive Keyword Searches over Encrypted Data , 2005, ICICS.

[28]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[29]  Jun Yu,et al.  Capacity Limits of Pseudorandom Channels in Deception Problems , 2015, IEEE Transactions on Information Forensics and Security.

[30]  Manoj Kokane,et al.  Data Storage Security in Cloud Computing , 2013 .