Submit your paper : editorIJETjournal@gmail.com Paper Title : VERIFIABLE AND MULTI-KEYWORD SEARCHABLE ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD STORAGE ISSN : 2395-1303 Year of Publication : 2020 10.29126/23951303/IJET-10 MLA Style: Dr.E.Punarselvam,Mr.M.Dhamodaran, M.Saravanan, S.Sasidharan, S.Sreedhar, K.Vignesh VERIFIABLE AND MULTI-KEYWORD SEARCHABLE ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD STORAGE " Volume 6 - Issue 2(1-9) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org APA Style: Dr.E.Punarselvam,Mr.M.Dhamodaran, M.Saravanan, S.Sasidharan, S.Sreedhar, K.Vignesh VERIFIABLE AND MULTI-KEYWORD SEARCHABLE ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD STORAGE " Volume 6 - Issue 2(1-9) March - April,2020 International Journal of Engineering and Techniques (IJET) ,ISSN:2395-1303 , www.ijetjournal.org Abstract The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-by-use nature. Public key encryption with keyword search applies only to the certain circumstances that keyword cipher text can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes and supports multi-keyword search. Searchable encryption is a primitive, which not only protects data privacy of data owners but also enables data users to search over the encrypted data. Most existing searchable encryption schemes are in the single-user setting. There are only few schemes in the multiple data users setting, i.e., encrypted data sharing. Among these schemes, most of the early techniques depend on a trusted third party with interactive search protocols or need cumbersome key management. To remedy the defects, the most recent approaches borrow ideas from attribute-based encryption to enable attribute-based keyword search (ABKS). Reference [1] M. C. Mont, K. McCorry, N. Papanikolaou, and S. Pearson, “Security and privacy governance in cloud computing via SLAS and a policy orchestration service,” in Proc. 2nd Int. Conf. Cloud Comput. Serv. Sci., 2012, pp. 670–674. [2] E.Punarselvam,“Bio-Medical Analysis of lumbar spine image using Gobar filter and canny edge detection algorithm of MRI”, International Journal of Research in computer applications and Robotics,Vol.1 Issue No.8 Nov 2013 PP(42-50) ISSN:2320-7345. [3] C. Metz. (2009, Oct.).DDoS attack rains down on Amazon Cloud [Online]. Available: http://www.theregister.co.uk/2009/10/05/am azon_bitbucket_outage/S [4] K. Lu, D. Wu, J. Fan, S. Todorovic, and A. Nucci, “Robust and efficient detection of DDoS attacks for large-scale internet,” Comput.Netw., vol. 51, no. 18, pp. 5036– 5056, 2007. [5] E.Punarselvam,”Comparative analysis of Bio-CAD Technique and Canny Edge detection Algorithm for Lumbar spine images using Finite Element Method”, International Journal of Engineering Research and Management, Vol. 1 Issue No.8 November 2014 PP(165-168) ISSN:2349-2058.. [6] J. Li, Q.Wang,C.Wang,N. Cao,K. Ren, and W. Lou, "Fuzzy keyword search over encrypted data in cloud computing," International Journal of Engineering Research and Applications, vol. 4, no. 7, pp. 441-445, May 2014, doi: 10.1109/INFCOM.2010.5462196. [7] W. Sun, S. Yu, W. Lou, Y. Hou, and H. Li, "Protecting Your Right: Verifiable Attribute-BasedKeywordSearchwith FineGrained Owner- Enforced Search Authorization in the Cloud," IEEE INFOCOM, vol. 27, no. 4, pp. 226-234, Jul. 2014, doi: 10.1109/INFOCOM.2014.6847943. International Journal of Engineering and Techniques - Volume 6 Issue 2, March- April 2020 [8] Dr.E.Punarselvam,“Robust Data Collection with Multiple Sink Zone In 3-D Underwater Sensor Networks”, in International Journal on Applications in Basic and Applied Sciences, vol. 5, Issue no. 1, December 2019,PP 8-14.ISSN 2455 – 1007 [9] Y. Ye, J. Han,W. Susilo, T. H. Yuen, and J. Li, "ABKS-CSC: attributebased keyword search with constant-size ciphertexts," Security & Communication Networks, vol. 9, no. 18, pp. 5003-5015, Oct. 2016, doi: org/10.1002/sec.1671. [10] Dr.E.Punarselvam,“Effective and Efficient Traffic Scrutiny in Sweet Server with Data Privacy”, International Journal on Applications in Information and Communication Engineering Volume 5 : Issue 2: November 2019, PP 1 – 5 [11] A. Sahai and B. Waters, "Fuzzy identity-based encryption," In Advances in Cryptology – EUROCRYPT, Cramer R. Eds. Berlin, Germany: Springer, 2005, pp. 457-473. [12] V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute -based encryption for fine-grained access control of encrypted data," in Proc. 13th ACM Conf. Comput. Commun.Secur.(CCS), New York, NY, USA: ACM, 2006, pp. 89-98. [13] E.Punarselvam, “Privacy and Secured Multiparty Data Categorization using Cloud Resources”, International Journal of Innovative Research in Science, Engineering and Technology, ISSN(Online) : 2319 – 8753,ISSN (Print) : 2347-6710 Vol. 4, Special Issue 6,May 2015,pp 336-343 [14] B. Waters, "Ciphertext-Policy AttributeBased Encryption: An Expressive, Efficient, and Provably Secure Realization," In Public Key Cryptography – PKC, D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi Eds. Berlin, Germany: Springer, 2011, pp. 53-70. [15] Dr.E.Punarselvam,“Heart Attack Recognition and Heart Rate Monitoring System Using IOT”,in International Journal on Applications in Engineering and Technology, Vol. 5, Issue no. 2, December 2019,PP.5-10.ISSN 2455 - 0523 Keywords Public Key, Encryption Schemes, ABKS,Data Sharing. |