Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification

As a very appealing computing standard, cloud computing makes it feasible for resource constrained clients to experience rate effective and flexible resources at ease. In the prevailing systems, the conventional cloud storage scheme is bound to operate its primitive functions in centralized mode. This reason possess problems like data availability, information protection and excessive operational charge. With the improvement of block chain generation, the decentralized scheme has entered the general public view. Compared to contemporary and cutting edge cloud storage, they are predicted to be more scalable, secured and comfortable. But, the use of end-to-end encryption in a decentralized scheme, limits the search functionality as the existing searchable encryption methods are designed only for the centralized device. Moreover, the existing decentralized cloud storage doesn't restrict any data user to get access to all of the files for any keyword search made purposefully through them. Thus, in this manner, user integrity of files and keyword searches are compromised throughout the network. Therefore, as a manner to solve these complications, we systematically join techniques of encryption and hashing to furnish reliable keyword search over encrypted files in decentralized storage. Consequently using the block chain system, the architecture remains incorruptible and protects all the confidential files and keywords in a fully controlled file access environment.

[1]  Olasupo Ajayi,et al.  An Overview of Data Storage in Cloud Computing , 2017, 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS).

[2]  Kaoru Kurosawa,et al.  UC-Secure Searchable Symmetric Encryption , 2012, Financial Cryptography.

[3]  Nilima Dongre,et al.  Ranked multi-keyword search data using cloud , 2017, 2017 International Conference on Inventive Computing and Informatics (ICICI).

[4]  Mikhail Strizhov Towards a Practical and Efficient Search over Encrypted Data in the Cloud , 2015, 2015 IEEE International Conference on Cloud Engineering.

[5]  Wang Shangping,et al.  A Multi-user Searchable Symmetric Encryption Scheme for Cloud Storage System , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[6]  Geong Sen Poh,et al.  On the security advantages of block-based multiserver searchable symmetric encryption , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[7]  Harry Halpin,et al.  Introduction to Security and Privacy on the Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[8]  Tian Xia,et al.  An improvement to TF-IDF: Term Distribution based Term Weight Algorithm , 2011, J. Softw..

[9]  Ee-Chien Chang,et al.  Passive Attacks Against Searchable Encryption , 2019, IEEE Transactions on Information Forensics and Security.

[10]  Qichao Zhang,et al.  A Blockchain-based key Management Scheme for Named Data Networking , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).

[11]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[12]  Gang Chen,et al.  Untangling Blockchain: A Data Processing View of Blockchain Systems , 2017, IEEE Transactions on Knowledge and Data Engineering.

[13]  Christina Fragouli,et al.  Group secret key generation over broadcast erasure channels , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.