Skip to main content
Log in

Secure keyword search using dual encryption in cloud computing

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

This paper manages the secure searching, stockpiling and recovery of client information in the cloud framework. Different services of cloud, security issues and security necessities of cloud information being talked about. We have utilized fuzzy keyword searching scheme to seek and recover the encrypted data by utilizing wild card technique. We have devised a new approach of double encryption framework in light of authentication of the server to give more grounded security to the current fuzzy keyword searching techniques. We have coordinated symmetric and asymmetric encryption algorithms to improve information security. This work, for the most part, concentrates on authentication of the server to enhance the security framework and shield sensitive client’s information from unauthorized exposure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Abbreviations

AES:

Advances encryption algorithm

API:

Application Programming Interface

DES:

Data encryption standard

DoS:

Denial of service

IaaS:

Infrastructure as a service

RSA:

Ron Rivest, Adi Shamir, and Leonard Adleman algorithm

PaaS:

Platform as a service

SSE:

Searchable symmetric encryption

SaaS:

Software as a service

References

  1. Avram MG (2014) Advantages and challenges of adopting cloud computing from an enterprise perspective. In: Proceedings of the 7th international conference interdisciplinarity in engineering, INTER-ENG 2013, vol 12. pp 529–534

  2. Vurukona N, Rao BT (2016) A study on data storage security issues in cloud computing. In: Proceedings of 2nd international conference on intelligent computing, communication and convergence, ICCC-2016 held in Bhubaneswar, Odisha, India, vol 92. pp 128–135

  3. Shekokar N, Sampat K, Chandawalla C, Shah J (2015) Implementation of fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of international conference on advanced computing technologies and applications (ICACTA-2015) held in Mumbai, India, ISBN: 978-1-5108-0136-3, vol 45. pp 499–505

  4. Hegde D, Saritha (2014) Secure fuzzy keyword search using an advanced technique over an encrypted cloud data. Int J Eng Comput Sci 3(3): 5102–5104

  5. Mahajan N, Patil D (2016) Study of authentication and authorization in cloud computing. Int J Recent Innov Trends Comput Commun 4(7):178–180

    Google Scholar 

  6. Zhao Y, Chen X, Ma H, Tang Q, Zhu H (2012) A new trapdoor-indistinguishable public key encryption with keyword search. J Wirel Mob Netw Ubiquitous Comput Dependable Appl (JoWUA) 3(½):72–81

    Google Scholar 

  7. Kokane M, Jain P, Sarandhar P (2013) Data storage security in cloud computing. Int J Adv Res Comput Commun Eng 2(3):1388–1393

    Google Scholar 

  8. Singh R, Kumar S, Agrahari SK (2012) Ensuring data storage security in cloud computing. IOSR J Eng 2(12):17–21

    Article  Google Scholar 

  9. Bhardwaj S, Jain L, Jain S (2010) Cloud computing: a study of infrastructure as a service (IAAS). Int J Eng Inf Technol 2(1):60–63

    Google Scholar 

  10. Kulkarni G, Khatawkar P, Gambhir J (2011) Cloud computing—platform as a service. Int J Eng Adv Technol (IJEAT) 1(2):115–120

    Google Scholar 

  11. Rashmi G Sahoo, Mehfuz S (2013) Securing software as a service model of cloud computing: issues and solutions. Int J Cloud Comput Serv Archit (IJCCSA) 3(4):1–11

    Google Scholar 

  12. Ahmed M, Hossain MA (2014) Cloud computing and security issues in the cloud. Int J Netw Sec Appl (IJNSA) 6(1):25–36

    Google Scholar 

  13. Barona R, Anita EAM (2017) A survey on data breach challenges in cloud computing security: issues and threats. In: International conference on circuit, power and computing technologies (ICCPCT-2017) held in Kollam, India, ISBN: 978-1-5090-4967-7. pp 20–21

  14. Christina AA (2015) Proactive measures on account hijacking in cloud computing network. Asian J Comput Sci Technol 4(2):31–34

    Google Scholar 

  15. Yusop ZM, Abawajy JH (2013) Analysis of insiders attack mitigation strategies. In: International conference on innovation, management and technology research held in Malaysia, vol 129. pp 611–618

  16. Watson MR, Shirazi NH, Marnerides AK, Mauthe A, Hutchison D (2016) Malware detection in cloud computing infrastructures. IEEE Trans Dependable Secure Comput 13(2):192–205

    Article  Google Scholar 

  17. Carlin A, Hammoudeh M, Aldabbas O (2015) Defense for distributed denial of service attacks in cloud computing. In: International conference on advanced wireless, information, and communication technologies (AWICT-2015), vol 73. pp 490–497

  18. Wong R (2017) Research on data security technology based on cloud storage. In: 13th global congress on manufacturing and management, (GCMM-2016). pp 1340–1355

  19. Wickramasinghe SKH, Sudesh RMC, Dissanayaka DKGM, Udarini WAN, Hettiarachchi PHAI, Dhammearatchi D (2016) Cloud computing-enhancement of security with respect to encryption and secure APIs. Imp J Interdiscip Res (IJIR) 2(5):690–695

    Google Scholar 

  20. Revalla M, Gupta A, Bhuse V (2013) On providing user-level data privacy in cloud. In: Proceedings of the international conference on cloud security management, ISBN: 978-1-909507-69-2. pp 106–114

  21. Stallings W (2011) Cryptography and network security: principle and practice, 5th edn. Pearson, London

  22. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings of IEEE symposium on security and privacy, ISBN:0-7695-0665-8. pp 44–55

  23. Wang C, Cao N, Li J, Ren K, Lou WJ (2010) Secure ranked keyword search over encrypted cloud data. In: Proceedings of IEEE 30th international conference on distributed computing systems (ICDCS). pp 253–262

  24. Wang C, Cao N, Ren K, Lou WJ (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479

    Article  Google Scholar 

  25. Li K, Zhang W, Yang C, Yu N (2015) Security analysis on one to-many order preserving encryption-based cloud data search. IEEE Trans Inf Forensics Secur 10(9):1918–1926

    Article  Google Scholar 

  26. Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Proceedings of eurocrypt, LNCS 3027. pp 506–522

  27. Ballard L, Kamara S, Monrose F (2005) Achieving efficient conjunctive keyword searches over encrypted data. In: Proceedings of 7th international conference on information and communications security, ICICS 2005 held in Beijing, China, vol 3783 LNCS, ISSN 03029743. pp 414–426

  28. Pang H, Shen J, Krishnan R (2010) Privacy-preserving similarity-based text retrieval. ACM Trans Internet Technol (TOIT) 10(1):39–42

    Article  Google Scholar 

  29. Cao N, Wang C, Li M, Ren K, Lou WJ (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, 2011. pp 829–837

  30. Li J, Wang Q, Wang C, Cao N, Ren K, Lou WJ (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE INFOCOM. pp 1–5

  31. Khan N, Krishna CR, Khurana A (2014) Secure fuzzy multi-keyword search over outsourced encrypted cloud data. In: Proceedings of IEEE international conference on computer and communication technology (ICCCT). pp 241–249

  32. Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: Proceedings of IEEE international conference on communications (ICC’12). pp 917–922

  33. Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2012) A new efficient verifiable fuzzy keyword search scheme. J Wirel Mob Netw Ubiquitous Comput Dependable Appl 3(4):61–71

    Google Scholar 

  34. Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172

    Article  Google Scholar 

  35. Satapathy SK, Mishra S, Mishra D (2010) Search technique using wildcards or truncation: a tolerance rough set clustering approach. Int J Adv Comput Sci Appl (IJACSA) 1(4):73–77

    Google Scholar 

  36. Mishra S, Satapathy SK, Mishra D (2009) Improved search technique using wildcards or truncation. In: Proceedings of international conference on intelligent agent & multi-agent systems, IAMA 2009. pp. 1–4

  37. Kashyap S, Madan N (2015) A review on: network security and cryptographic algorithm. Int J Adv Res Comput Sci Softw Eng 5(4):1414–1418

    Google Scholar 

  38. P. Krithika, G. Dilipan and M. Shobana (2015) Enhancing cloud computing security for data sharing within group members. IOSR J Comput Eng (IOSR-JCE) 17(2):110–114

  39. Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES, and RSA for security. Glob J Comput Sci Technol Netw Web Sec 13(15):15–22

    Google Scholar 

  40. Preetha M, Nithya M (2013) A study and performance analysis of RSA algorithm. Int J Comput Sci Mob Comput (IJCSMC) 2(6):126–139

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Parul Agarwal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tariq, H., Agarwal, P. Secure keyword search using dual encryption in cloud computing. Int. j. inf. tecnol. 12, 1063–1072 (2020). https://doi.org/10.1007/s41870-018-0091-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-018-0091-6

Keywords

Navigation