Block Chain Assisted Document Updation using Positional Index Altering Scheme in Cloud Server: Asymmetric Searchable Encryption Approach

Authors

  • Beena G. Pillai, Dayanand Lal N.

Keywords:

Asymmetric Encryption, Blockchain, Ethereum, positional index-altering scheme, Smart contract.

Abstract

Users have the option to share or use their data on the cloud. Cloud computing provides a great deal of convenience for users. However, it also brings up a number of security issues. Data owners may be unable to fully trust cloud servers and lose control over their data, which is one of the key security risks of cloud computing. One of the main issues with the existing system is security when changing files. Ensuring security during updates and encrypting the submitted material is the most significant problem. This paper presents an index-altering approach in Cloud Server that uses a Positional Index to facilitate blockchain-assisted document updating. In this situation, use a smart contract to utilize trustworthy cloud computing and Blockchain technologies. The work’s implementation of forward and backward privacy and document updating is its most crucial component. It also fends off both active and passive assaults. The Diffie–Hellman (DH) key exchange protocol, the Positional Index Altering Scheme, the Fuzzy duo Trapdoor key search, the Homographic Asymmetric El-Gamal encryption technique, and the Blockchain smart contract are the security features of the suggested scheme. In a decentralized search system, the entire evaluation is validated.

Downloads

Download data is not yet available.

References

C. Liu et al., “Search pattern leakage in searchable encryption: Attacks and new construction,” Information Sciences, vol. 265, pp. 176–188, 2014.

K. Gai, K.-K. R. Choo, and L. Zhu, “Blockchain-enabled reengineering of cloud datacenters,” IEEE Cloud Computing, vol. 5, no. 6, pp. 21–25, 2018.

M. Andoni et al., “Blockchain technology in the energy sector: A systematic review of challenges and opportunities,” Renewable and sustainable energy reviews, vol. 100, pp. 143–174, 2019.

P. Chaudhari and M. L. Das, “Privacy preserving searchable encryption with fine-grained access control,” IEEE Transactions on Cloud Comput- ing, vol. 9, no. 2, pp. 753–762, 2019.

H. Li et al., “Blockchain-based searchable symmetric encryption scheme,” Computers & Electrical Engineering, vol. 73, pp. 32–45, 2019.

S. Wang, Y. Zhang, and Y. Zhang, “A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems,” Ieee Access, vol. 6, pp. 38 437–38 450, 2018.

M. Asif et al., “Blockchain-based authentication and trust management mechanism for smart cities,” Sensors, vol. 22, no. 7, p. 2604, 2022.

J. Niu et al., “Blockchain-based anti-key-leakage key aggregation searchable encryption for iot,” IEEE Internet of Things Journal, vol. 7, no. 2, pp. 1502–1518, 2019.

P. Jiang et al., “Searchain: Blockchain-based private keyword search in decentralized storage,” Future Generation Computer Systems, vol. 107, pp. 781–792, 2020.

W. Zhang et al., “Public-key encryption with bidirectional keyword search and its application to encrypted emails,” Computer Standards & Interfaces, vol. 78, p. 103542, 2021.

F. Zare and H. Mala, “Cryptanalysis of an asymmetric searchable encryption scheme,” in 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). IEEE, 2017, pp. 82–85.

J. Zhang et al., “Efficient and provable security searchable asymmetric encryption in the cloud,” IEEE Access, vol. 6, pp. 68 384–68 393, 2018.

H. S. Rhee et al., “Trapdoor security in a searchable public-key encryption scheme with a designated tester,” Journal of Systems and Software, vol. 83, no. 5, pp. 763–771, 2010.

S. Lv et al., “Forward secure searchable encryption using key-based blocks chain technique,” in International Conference on Algorithms and Architectures for Parallel Processing. Springer, 2018, pp. 85–97.

M. Zeng et al., “A searchable asymmetric encryption scheme with support for boolean queries for cloud applications,” The Computer Journal, vol. 62, no. 4, pp. 563–578, 2019.

Y. Wei et al., “Fsse: Forward secure searchable encryption with keyed- block chains,” Information Sciences, vol. 500, pp. 113–126, 2019.

B. Qin et al., “Public-key authenticated encryption with keyword search revisited: Security model and constructions,” Information Sciences, vol. 516, pp. 515–528, 2020.

Z. Chen et al., “Multi-user boolean searchable encryption supporting fast ranking in mobile clouds,” Computer Communications, vol. 164, pp. 100–113, 2020.

J. Baek, R. Safavi-Naini, and W. Susilo, “Public key encryption with keyword search revisited,” in Computational Science and Its Applications–ICCSA 2008: International Conference, Perugia, Italy, June 30–July 3, 2008, Proceedings, Part I 8. Springer, 2008, pp. 1249– 1259.

C. Cai, X. Yuan, and C. Wang, “Hardening distributed and encrypted keyword search via blockchain,” in 2017 IEEE Symposium on Privacy- Aware Computing (PAC). IEEE, 2017, pp. 119–128.

J. W. Byun et al., “Off-line keyword guessing attacks on recent keyword search schemes over encrypted data,” in Workshop on secure data management. Springer, 2006, pp. 75–83.

D. Boneh et al., “Public key encryption with keyword search,” in Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23. Springer, 2004, pp. 506– 522.

Y. Zhang et al., “Outsourcing service fair payment based on blockchain and its applications in cloud computing,” IEEE Transactions on Services Computing, vol. 14, no. 4, pp. 1152–1166, 2018.

W. BingJian, C. TzungHer, and J. FuhGwo, “Security improvement against malicious server’s attack for a dpeks scheme,” Int J Inf Educ Technol, vol. 1, no. 4, pp. 350–353, 2011.

Q. Tang and L. Chen, “Public-key encryption with registered keyword search,” in European public key infrastructure workshop. Springer, 2009, pp. 163–178.

Q. Huang and H. Li, “An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks,” Information Sciences, vol. 403, pp. 1–14, 2017.

S. Xiao et al., “Asymmetric searchable encryption from inner product encryption,” in Advances on P2P, Parallel, Grid, Cloud and Internet Computing: Proceedings of the 11th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC–2016) Novem- ber 5–7, 2016, Soonchunhyang University, Asan, Korea. Springer, 2017, pp. 123–132.

Y. Lu, J. Li, and Y. Zhang, “Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks,” IEEE Transactions on Services Computing, vol. 14, no. 6, pp. 2041–2054, 2019.

N. H. Sultan et al., “Authorized keyword search over outsourced encrypted data in cloud environment,” IEEE Transactions on Cloud Computing, vol. 10, no. 1, pp. 216–233, 2019.

Downloads

Published

16.03.2024

How to Cite

Dayanand Lal N., B. G. P. . (2024). Block Chain Assisted Document Updation using Positional Index Altering Scheme in Cloud Server: Asymmetric Searchable Encryption Approach . International Journal of Intelligent Systems and Applications in Engineering, 12(3), 1020–1029. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5381

Issue

Section

Research Article