#

Advances in Computational Intelligence in Materials Science

Book Series

About the Book
About the Author
Table of Contents

Buy this Book

eBook
  • • Included format: Online and PDF
  • • eBooks can be used on all reading devices
  • • ISSN : 2960-2408
  • • ISBN : 978-9914-9946-9-8


Hand Cover
  • • Including format: Hardcover
  • • Shipping Available for individuals worldwide
  • • ISSN : 2960-2394
  • • ISBN : 978-9914-9946-8-1


Services for the Book

Download Product Flyer
Download High-Resolutions Cover

2nd International Conference on Materials Science and Sustainable Manufacturing Technology

A Survey on Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage

R.Subha, B.Suchithra, Sivaram C, Sumesh S, Vikram S, VimalKumar M, Department of Computer Science and Engineering, Sri Eshwar College of Engineering, Coimbatore, India.


Online First : 07 June 2023
Publisher Name : AnaPub Publications, Kenya.
ISBN (Online) : 978-9914-9946-9-8
ISBN (Print) : 978-9914-9946-8-1
Pages : 044-046

Abstract


A key component of data security in cloud computing systems is encryption. Encryption might not be enough, though, to shield sensitive data from hostile intrusions. One such attack is the keyword guessing attack, in which an attacker uses a variety of techniques to attempt to decipher a term from the encrypted data. In this research, we suggest a system for encryption against a cloud computing keyword guessing attack. To achieve improved data security, the framework combines encryption methods with a safe keyword retrieval system. The framework that is being developed takes into account the difficulties that come with storing and retrieving encrypted data in cloud environments. Our test findings demonstrate that the suggested framework successfully thwarts keyword guessing attacks while preserving the data's confidentiality and integrity.

Keywords


Encryption Framework, Guessing Attacks, Cloud Storage, Secure Keyword

  1. W. Sun, X. Liu, W. Lou, Y. T. Hou, and H. Li, “Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data,” 2015 IEEE Conference on Computer Communications (INFOCOM), Apr. 2015, doi:10.1109/infocom.2015.7218596.
  2. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public Key Encryption with Keyword Search,” Lecture Notes in Computer Science, pp. 506–522, 2004, doi: 10.1007/978-3-540-24676-3_30.
  3. Y. Miao et al., “Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp. 3206–3217, Jun. 2019, doi: 10.1109/tii.2018.2877146.
  4. L. Fang, W. Susilo, C. Ge, and J. Wang, “Public key encryption with keyword search secure against keyword guessing attacks without random oracle,” Information Sciences, vol. 238, pp. 221–241, Jul. 2013, doi: 10.1016/j.ins.2013.03.008.
  5. W. Zhang, Y. Lin, S. Xiao, J. Wu, and S. Zhou, “Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing,” IEEE Transactions on Computers, vol. 65, no. 5, pp. 1566–1577, May 2016, doi: 10.1109/tc.2015.2448099.
  6. C. Wang, N. Cao, K. Ren, and W. Lou, “Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 8, pp. 1467–1479, Aug. 2012, doi: 10.1109/tpds.2011.282.
  7. P. Xu, H. Jin, Q. Wu, and W. Wang, “Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack,” IEEE Transactions on Computers, vol. 62, no. 11, pp. 2266–2277, Nov. 2013, doi: 10.1109/tc.2012.215.
  8. H. Cui, Z. Wan, R. H. Deng, G. Wang, and Y. Li, “Efficient and Expressive Keyword Search Over Encrypted Data in Cloud,” IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 3, pp. 409–422, May 2018, doi: 10.1109/tdsc.2016.2599883.
  9. Y. Miao et al., “Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1080–1094, May 2021, doi: 10.1109/tdsc.2019.2897675.
  10. G. S. Poh, J.-J. Chin, W.-C. Yau, K.-K. R. Choo, and M. S. Mohamad, “Searchable Symmetric Encryption,” ACM Computing Surveys, vol.50, no. 3, pp. 1–37, May 2017, doi: 10.1145/3064005.

Cite this article


R.Subha, B.Suchithra, Sivaram C, Sumesh S, Vikram S, VimalKumar M, “A Survey on Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage”, Advances in Computational Intelligence in Materials Science, pp. 044-046, May. 2023. doi:10.53759/acims/978-9914-9946-9-8_8

Copyright


© 2023 R.Subha, B.Suchithra, Sivaram C, Sumesh S, Vikram S, VimalKumar M. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.