Untitled Document
   
You are from : ( )  
     
Untitled Document
Untitled Document
 

International Journal of Information Technology & Computer Science ( IJITCS )

Abstract :

Cloud computing is an improvement product of combining web technology, grid computing  and virtualization. It has become one of the most important issues for the information technology in  recent years. A lot of  applications  have been proposed and discussed on the cloud computing environment  because it can bring many benefits like reducing the cost of maintaining data centers in an enterprise, low data management cost and retrieval of data whenever you want, etc. As more sensitive and personal data  is shared and stored in the cloud computing server, a question of trust on cloud computing is wildly been discussed. One method to alleviate the security worries is storing data in the encrypting form. The  drawback of encrypting data is the limitation of usability. In this paper, we construct a group oriented  data access model with keyword search that allows multi-users as one sharing group to reduce the  duplication of the sharing file. Once the user wants to retrieve the file, he must be in the authorized  sharing group and provide correct keywords. The proposed scheme provides the space efficiency for key  storage size and computation efficiency for data retrieving .

Keywords :

: Cloud computing, keyword search encryption, hidden vector encryption, broadcast encryption,  data access control

References :

  1. J. Baek, R. Safavi-Naini, and W. Susilo, “Public key encryption with keyword search revisited,”in  Computational Science and Its Applications-ICCSA 2008, LNCS, vol. 5072, pp. 1249-1259, 2008.
  2. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,”  in Eurocrypt 2004, LNCS, vol. 3027, pp. 506–522, 2004.
  3. D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,”in Proceedings of TCC'07, LNCS, vol. 4392, pp. 535-554, 2007.
  4. D. Boneh, C. Gentry and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and  private keys,”in Crypto’05, vol. 3621, pp. 258-275, 2005.
  5. D. Boneh, X. Boyen, and E. J. Goh, “Hierarchical identity based encryption with constant size ciphertext,”  in Advances in Cryptology–Eurocrypt’05, LNCS, vol. 3494, pp. 440–456, 2005.
  6. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,”in CCS '06 proceedings of the 13th ACM conference on Computer and communications  security, pp. 89-98, 2006.
  7.  Y. H. Hwang and P.J. Lee, “Public key encryption with conjunctive keyword search and its extension to a multi-user system,”in Pairing-based Cryptography –PAIRING 2007, LNCS, vol. 4575, pp. 2-22, 2007.
  8. D. Naor, M. Maor, and J. Lotspiech, “Revocation and tracing schemes for stateless receivers,”in Advances in Cryptology–Crypto’01, vol. 2139, pp. 41–62, 2001.
  9. M. Naor and B. Pinkas, “Efficient trace and revoke schemes,” inProceedings of the 4th International Conference on Financial Cryptography (FC’00), vol. 1962, pp. 1–20, 2000.
  10. J. H. Park, “Efficient hidden vector encryption for conjunctive queries on encrypted data,”IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 10, pp. 1483-1497, 2011.
  11. J. H. Park, H. J. Kim, M. H. Sung and D. H. Lee, “Public key broadcast encryption schemes with shorter transmissions,”IEEE Transactions on Broadcasting, vol. 54, no. 3, pp.401-411, 2008.
  12. A. Sahai and B. Waters, “Fuzzy identity based encryption,”in Advances in Cryptology–Eurocrypt 2005, LNCS, vol. 3494, pp. 457–473, 2005

Untitled Document
     
Untitled Document
   
  Copyright © 2013 IJITCS.  All rights reserved. IISRC® is a registered trademark of IJITCS Properties.