Abstract—Secure
search over encrypted remote data is crucial in cloud computing to guarantee
the data privacy and usability. To prevent unauthorized data usage,
fine-grained access control is necessary in multi-user system. However,
authorized user may intentionally leak the secret key for financial benefit.
Thus, tracing and revoking the malicious user who abuses secret key needs to be
solved imminently. In this paper, we propose an escrow free traceable attribute
based multiple keywords subset search system with verifiable outsourced
decryption (EF-TAMKS-VOD). The key escrow free mechanism could effectively
prevent the key generation centre (KGC) from unscrupulously searching and
decrypting all encrypted files of users. Also, the decryption process only
requires ultra lightweight computation, which is a desirable feature for
energy-limited devices. In addition, efficient user revocation is enabled after
the malicious user is figured out. Moreover, the proposed system is able to
support flexible number of attributes rather than polynomial bounded. Flexible
multiple keyword subset search pattern is realized, and the change of the query
keywords order does not affect the search result. Security analysis indicates
that EF-TAMKS-VOD is provably secure. Efficiency analysis and ex perimental results show that EF-TAMKS-VOD improves the
efficiency and greatly reduces the computation overhead of users’ terminals.
CONCLUSION
The enforcement of access control and the support of keyword
search are important issues in secure cloud storage system. In this work, we
defined a new paradigm of searchable encryption system, and proposed a concrete
construction. It supports flexible multiple keywords subset search, and solves
the key escrow problem during the key generation procedure. Malicious user who
sells secret key for benefit can be traced. The decryption operation is partly
outsourced to cloud Any Query Call Us: 9566355386
server
and the correctness of half-decrypted result can be verified by data user. The
performance analysis and simulation show its efficiency in computation and
storage overhead. Experimental results indicate that the computation overhead
at user’s terminal is significantly reduced, which greatly saves the energy for
resource-constrained devices of users.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System
: Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive : 1.44 Mb.
• Monitor
: 15 VGA Colour.
• Mouse
: Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP/7.
• Coding Language : JAVA/J2EE
• Data Base : MYSQL
REFERENCES
[1] C. Wang, N. Cao, J. Li, K. Ren,
W. Lou. “Secure ranked keyword
search
over encrypted cloud data”[C]//IEEE 30th Internationa
lConference on Distributed Computing Systems (ICDCS),
IEEE,2010: 253-262.
[2] Q. Zhang, L. T. Yang, Z. Chen, P. Li, M. J. Deen. “Privacy-preserving Any Query Call
Us: 9566355386
Double-Projection
Deep Computation Model with Crowdsourcing on Cloud
for Big Data Feature Learning,” IEEE Internet of Things Journal, 2017, DOI:
10.1109/JIOT.2017.2732735.
[3] R. Chen, Y. Mu, G. Yang, F. Guo and X. Wang, “Dual-Server Public- Key Encryption with
Keyword Search for Secure Cloud Storage,” IEEE Transactions on Information
Forensics and Security, 2016, vol.
11, no. 4, 789-798.