Abstract
This paper manages the secure searching, stockpiling and recovery of client information in the cloud framework. Different services of cloud, security issues and security necessities of cloud information being talked about. We have utilized fuzzy keyword searching scheme to seek and recover the encrypted data by utilizing wild card technique. We have devised a new approach of double encryption framework in light of authentication of the server to give more grounded security to the current fuzzy keyword searching techniques. We have coordinated symmetric and asymmetric encryption algorithms to improve information security. This work, for the most part, concentrates on authentication of the server to enhance the security framework and shield sensitive client’s information from unauthorized exposure.
Similar content being viewed by others
Abbreviations
- AES:
-
Advances encryption algorithm
- API:
-
Application Programming Interface
- DES:
-
Data encryption standard
- DoS:
-
Denial of service
- IaaS:
-
Infrastructure as a service
- RSA:
-
Ron Rivest, Adi Shamir, and Leonard Adleman algorithm
- PaaS:
-
Platform as a service
- SSE:
-
Searchable symmetric encryption
- SaaS:
-
Software as a service
References
Avram MG (2014) Advantages and challenges of adopting cloud computing from an enterprise perspective. In: Proceedings of the 7th international conference interdisciplinarity in engineering, INTER-ENG 2013, vol 12. pp 529–534
Vurukona N, Rao BT (2016) A study on data storage security issues in cloud computing. In: Proceedings of 2nd international conference on intelligent computing, communication and convergence, ICCC-2016 held in Bhubaneswar, Odisha, India, vol 92. pp 128–135
Shekokar N, Sampat K, Chandawalla C, Shah J (2015) Implementation of fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of international conference on advanced computing technologies and applications (ICACTA-2015) held in Mumbai, India, ISBN: 978-1-5108-0136-3, vol 45. pp 499–505
Hegde D, Saritha (2014) Secure fuzzy keyword search using an advanced technique over an encrypted cloud data. Int J Eng Comput Sci 3(3): 5102–5104
Mahajan N, Patil D (2016) Study of authentication and authorization in cloud computing. Int J Recent Innov Trends Comput Commun 4(7):178–180
Zhao Y, Chen X, Ma H, Tang Q, Zhu H (2012) A new trapdoor-indistinguishable public key encryption with keyword search. J Wirel Mob Netw Ubiquitous Comput Dependable Appl (JoWUA) 3(½):72–81
Kokane M, Jain P, Sarandhar P (2013) Data storage security in cloud computing. Int J Adv Res Comput Commun Eng 2(3):1388–1393
Singh R, Kumar S, Agrahari SK (2012) Ensuring data storage security in cloud computing. IOSR J Eng 2(12):17–21
Bhardwaj S, Jain L, Jain S (2010) Cloud computing: a study of infrastructure as a service (IAAS). Int J Eng Inf Technol 2(1):60–63
Kulkarni G, Khatawkar P, Gambhir J (2011) Cloud computing—platform as a service. Int J Eng Adv Technol (IJEAT) 1(2):115–120
Rashmi G Sahoo, Mehfuz S (2013) Securing software as a service model of cloud computing: issues and solutions. Int J Cloud Comput Serv Archit (IJCCSA) 3(4):1–11
Ahmed M, Hossain MA (2014) Cloud computing and security issues in the cloud. Int J Netw Sec Appl (IJNSA) 6(1):25–36
Barona R, Anita EAM (2017) A survey on data breach challenges in cloud computing security: issues and threats. In: International conference on circuit, power and computing technologies (ICCPCT-2017) held in Kollam, India, ISBN: 978-1-5090-4967-7. pp 20–21
Christina AA (2015) Proactive measures on account hijacking in cloud computing network. Asian J Comput Sci Technol 4(2):31–34
Yusop ZM, Abawajy JH (2013) Analysis of insiders attack mitigation strategies. In: International conference on innovation, management and technology research held in Malaysia, vol 129. pp 611–618
Watson MR, Shirazi NH, Marnerides AK, Mauthe A, Hutchison D (2016) Malware detection in cloud computing infrastructures. IEEE Trans Dependable Secure Comput 13(2):192–205
Carlin A, Hammoudeh M, Aldabbas O (2015) Defense for distributed denial of service attacks in cloud computing. In: International conference on advanced wireless, information, and communication technologies (AWICT-2015), vol 73. pp 490–497
Wong R (2017) Research on data security technology based on cloud storage. In: 13th global congress on manufacturing and management, (GCMM-2016). pp 1340–1355
Wickramasinghe SKH, Sudesh RMC, Dissanayaka DKGM, Udarini WAN, Hettiarachchi PHAI, Dhammearatchi D (2016) Cloud computing-enhancement of security with respect to encryption and secure APIs. Imp J Interdiscip Res (IJIR) 2(5):690–695
Revalla M, Gupta A, Bhuse V (2013) On providing user-level data privacy in cloud. In: Proceedings of the international conference on cloud security management, ISBN: 978-1-909507-69-2. pp 106–114
Stallings W (2011) Cryptography and network security: principle and practice, 5th edn. Pearson, London
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings of IEEE symposium on security and privacy, ISBN:0-7695-0665-8. pp 44–55
Wang C, Cao N, Li J, Ren K, Lou WJ (2010) Secure ranked keyword search over encrypted cloud data. In: Proceedings of IEEE 30th international conference on distributed computing systems (ICDCS). pp 253–262
Wang C, Cao N, Ren K, Lou WJ (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467–1479
Li K, Zhang W, Yang C, Yu N (2015) Security analysis on one to-many order preserving encryption-based cloud data search. IEEE Trans Inf Forensics Secur 10(9):1918–1926
Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Proceedings of eurocrypt, LNCS 3027. pp 506–522
Ballard L, Kamara S, Monrose F (2005) Achieving efficient conjunctive keyword searches over encrypted data. In: Proceedings of 7th international conference on information and communications security, ICICS 2005 held in Beijing, China, vol 3783 LNCS, ISSN 03029743. pp 414–426
Pang H, Shen J, Krishnan R (2010) Privacy-preserving similarity-based text retrieval. ACM Trans Internet Technol (TOIT) 10(1):39–42
Cao N, Wang C, Li M, Ren K, Lou WJ (2011) Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, 2011. pp 829–837
Li J, Wang Q, Wang C, Cao N, Ren K, Lou WJ (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceedings of IEEE INFOCOM. pp 1–5
Khan N, Krishna CR, Khurana A (2014) Secure fuzzy multi-keyword search over outsourced encrypted cloud data. In: Proceedings of IEEE international conference on computer and communication technology (ICCCT). pp 241–249
Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: Proceedings of IEEE international conference on communications (ICC’12). pp 917–922
Wang J, Ma H, Tang Q, Li J, Zhu H, Ma S, Chen X (2012) A new efficient verifiable fuzzy keyword search scheme. J Wirel Mob Netw Ubiquitous Comput Dependable Appl 3(4):61–71
Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172
Satapathy SK, Mishra S, Mishra D (2010) Search technique using wildcards or truncation: a tolerance rough set clustering approach. Int J Adv Comput Sci Appl (IJACSA) 1(4):73–77
Mishra S, Satapathy SK, Mishra D (2009) Improved search technique using wildcards or truncation. In: Proceedings of international conference on intelligent agent & multi-agent systems, IAMA 2009. pp. 1–4
Kashyap S, Madan N (2015) A review on: network security and cryptographic algorithm. Int J Adv Res Comput Sci Softw Eng 5(4):1414–1418
P. Krithika, G. Dilipan and M. Shobana (2015) Enhancing cloud computing security for data sharing within group members. IOSR J Comput Eng (IOSR-JCE) 17(2):110–114
Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES, and RSA for security. Glob J Comput Sci Technol Netw Web Sec 13(15):15–22
Preetha M, Nithya M (2013) A study and performance analysis of RSA algorithm. Int J Comput Sci Mob Comput (IJCSMC) 2(6):126–139
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tariq, H., Agarwal, P. Secure keyword search using dual encryption in cloud computing. Int. j. inf. tecnol. 12, 1063–1072 (2020). https://doi.org/10.1007/s41870-018-0091-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-018-0091-6