2nd International Conference on Materials Science and Sustainable Manufacturing Technology
A Survey on Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage
R.Subha, B.Suchithra, Sivaram C, Sumesh S, Vikram S, VimalKumar M, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, India.
A key component of data security in cloud computing systems is encryption. Encryption might not be enough,
though, to shield sensitive data from hostile intrusions. One such attack is the keyword guessing attack, in which an
attacker uses a variety of techniques to attempt to decipher a term from the encrypted data. In this research, we suggest a
system for encryption against a cloud computing keyword guessing attack. To achieve improved data security, the
framework combines encryption methods with a safe keyword retrieval system. The framework that is being developed
takes into account the difficulties that come with storing and retrieving encrypted data in cloud environments. Our test
findings demonstrate that the suggested framework successfully thwarts keyword guessing attacks while preserving the
data's confidentiality and integrity.
W. Sun, X. Liu, W. Lou, Y. T. Hou, and H. Li, “Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data,” 2015 IEEE Conference on Computer Communications (INFOCOM), Apr. 2015, doi:10.1109/infocom.2015.7218596.
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public Key Encryption with Keyword Search,” Lecture Notes in Computer Science, pp. 506–522, 2004, doi: 10.1007/978-3-540-24676-3_30.
Y. Miao et al., “Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp. 3206–3217, Jun. 2019, doi: 10.1109/tii.2018.2877146.
L. Fang, W. Susilo, C. Ge, and J. Wang, “Public key encryption with keyword search secure against keyword guessing attacks without random oracle,” Information Sciences, vol. 238, pp. 221–241, Jul. 2013, doi: 10.1016/j.ins.2013.03.008.
W. Zhang, Y. Lin, S. Xiao, J. Wu, and S. Zhou, “Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing,” IEEE Transactions on Computers, vol. 65, no. 5, pp. 1566–1577, May 2016, doi: 10.1109/tc.2015.2448099.
C. Wang, N. Cao, K. Ren, and W. Lou, “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1467–1479, Aug. 2012, doi: 10.1109/tpds.2011.282.
P. Xu, H. Jin, Q. Wu, and W. Wang, “Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack,” IEEE Transactions on Computers, vol. 62, no. 11, pp. 2266–2277, Nov. 2013, doi: 10.1109/tc.2012.215.
H. Cui, Z. Wan, R. H. Deng, G. Wang, and Y. Li, “Efficient and Expressive Keyword Search Over Encrypted Data in Cloud,” IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 3, pp. 409–422, May 2018, doi: 10.1109/tdsc.2016.2599883.
Y. Miao et al., “Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1080–1094, May 2021, doi: 10.1109/tdsc.2019.2897675.
G. S. Poh, J.-J. Chin, W.-C. Yau, K.-K. R. Choo, and M. S. Mohamad, “Searchable Symmetric Encryption,” ACM Computing Surveys, vol.50, no. 3, pp. 1–37, May 2017, doi: 10.1145/3064005.
Cite this article
R.Subha, B.Suchithra, Sivaram C, Sumesh S, Vikram S, VimalKumar M, “A Survey on Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage”, Advances in Computational Intelligence in Materials Science, pp. 044-046, May. 2023. doi:10.53759/acims/978-9914-9946-9-8_8