SlideShare a Scribd company logo
A Secure Searchable Encryption Framework for Privacy-
Critical Cloud Storage Services
ABSTRACT:
Searchable encryption has received a significant attention from the research
community with various constructions being proposed, each achieving
asymptotically optimal complexity for specific metrics (e.g., search, update).
Despite their elegance, the recent attacks and deployment efforts have shown that
the optimal asymptotic complexity might not always imply practical performance,
especially if the application demands a high privacy. In this article, we introduce a
novel Dynamic Searchable Symmetric Encryption (DSSE) framework called
Incidence Matrix (IM)-DSSE, which achieves a high level of privacy, efficient
search/update, and low client storage with actual deployments on real cloud
settings. We harness an incidence matrix along with two hash tables to create an
encrypted index, on which both search and update operations can be performed
effectively with minimal information leakage. This simple set of data structures
surprisingly offers a high level of DSSE security while achieving practical
performance. Specifically, IM-DSSE achieves forward-privacy, backward-privacy
and size-obliviousness simultaneously. We also create several DSSE variants, each
offering different trade-offs that are suitable for different cloud applications and
infrastructures. We fully implemented our framework and evaluated its
performance on a real cloud system (Amazon EC2). We have released IM-DSSE
as an open-sourcelibrary for wide development and adaptation.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB.
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : ASP.NET,C#.NET
 Tool : Visual Studio 2008
 Database : SQL SERVER 2005
REFERENCE:
Thang Hoang, Attila A. Yavuz, Member, IEEE and Jorge Guajardo, “A Secure
Searchable Encryption Framework for Privacy-Critical Cloud Storage Services”,
IEEE Transactions on Services Computing, 2019.
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services

More Related Content

DOCX
Precisely why is ccsp useful for cloud computing (vocal media)
PDF
Design of a small scale and failure-resistent iaa s cloud using openstack
PDF
Making secret sharing based cloud storage usable
PPT
The Open Group Cloud Computing Work Group
DOCX
Collaborative network security in multi tenant data center for cloud computing
DOCX
Secure cloud storage with data dynamic using secure network coding technique
Precisely why is ccsp useful for cloud computing (vocal media)
Design of a small scale and failure-resistent iaa s cloud using openstack
Making secret sharing based cloud storage usable
The Open Group Cloud Computing Work Group
Collaborative network security in multi tenant data center for cloud computing
Secure cloud storage with data dynamic using secure network coding technique

What's hot (18)

PPTX
Fuster-clucking with Mesos and Kubernetes
PPTX
A safety design of
DOCX
Toward secure and dependable
PPTX
N cryptedcloud
PDF
Cloud gateways for regulatory compliance
PDF
Security and Privacy Enhancing Multicloud Architecture
PPTX
ISACA Cloud Security Presentation 2013-09-24
PDF
SophiaConf 2018 - S. Lefeuvre (TAS France)
PDF
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
DOCX
Information flow control for secure cloud computing
DOCX
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
PDF
HNSciCloud PILOT PLATFORM OVERVIEW
PDF
50120130405007
PDF
No More Dark Clouds With PaaSword - An Innovative Security By Design Framework
DOCX
The cisco insieme family
PDF
A secure and dynamic multi
PDF
IBM Cloud & Helix Nebula
PDF
V SYSTEMS - One pager_EN
Fuster-clucking with Mesos and Kubernetes
A safety design of
Toward secure and dependable
N cryptedcloud
Cloud gateways for regulatory compliance
Security and Privacy Enhancing Multicloud Architecture
ISACA Cloud Security Presentation 2013-09-24
SophiaConf 2018 - S. Lefeuvre (TAS France)
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Information flow control for secure cloud computing
ENABLING FINE-GRAINED MULTI-KEYWORD SEARCH SUPPORTING CLASSIFIED SUB-DICTIONA...
HNSciCloud PILOT PLATFORM OVERVIEW
50120130405007
No More Dark Clouds With PaaSword - An Innovative Security By Design Framework
The cisco insieme family
A secure and dynamic multi
IBM Cloud & Helix Nebula
V SYSTEMS - One pager_EN
Ad

Similar to A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services (20)

DOCX
A secure and dynamic multi keyword ranked
PDF
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
DOCX
privacy preserving multi keyword ranked search over encrypted cloud data
PDF
Elastic Security Solution Brief
PDF
An approach for secured data transmission at client end in cloud computing
DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
PDF
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
PDF
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
DOCX
Cloud based multimedia content protection system
PDF
Kp3419221926
PDF
Secure Data Center for Enterprise
PDF
Improving Data Storage Security in Cloud using Hadoop
PDF
Secure modelling schema of distributed information access management in cloud...
PDF
Secure modelling schema of distributed information access management in cloud...
PDF
Secure modelling schema of distributed information access management in cloud...
PDF
Secure modelling schema of distributed information
PDF
Iaetsd time constrained self-destructing
PDF
A Secure MSSS Scheme and AES Encryption over Cloud Data
PDF
Infographic - Cloud Hosting and Tenancy
A secure and dynamic multi keyword ranked
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
privacy preserving multi keyword ranked search over encrypted cloud data
Elastic Security Solution Brief
An approach for secured data transmission at client end in cloud computing
Towards secure multi keyword top-k retrieval over encrypted cloud data
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
Execution Analysis of Different Cryptographic Encryption Algorithms on Differ...
Enhancing Data Storage Security in Cloud Computing Through Steganography
Cloud based multimedia content protection system
Kp3419221926
Secure Data Center for Enterprise
Improving Data Storage Security in Cloud using Hadoop
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information
Iaetsd time constrained self-destructing
A Secure MSSS Scheme and AES Encryption over Cloud Data
Infographic - Cloud Hosting and Tenancy
Ad

More from JAYAPRAKASH JPINFOTECH (20)

PDF
Java Web Application Project Titles 2023-2024.pdf
PDF
Dot Net Final Year IEEE Project Titles.pdf
PDF
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
PDF
Python IEEE Project Titles 2023 - 2024.pdf
PDF
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
DOCX
Spammer detection and fake user Identification on Social Networks
DOCX
Sentiment Classification using N-gram IDF and Automated Machine Learning
DOCX
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
DOCX
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
DOCX
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
DOCX
Crop Yield Prediction and Efficient use of Fertilizers
DOCX
Collaborative Filtering-based Electricity Plan Recommender System
DOCX
Achieving Data Truthfulness and Privacy Preservation in Data Markets
DOCX
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
DOCX
Towards Fast and Reliable Multi-hop Routing in VANETs
DOCX
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
DOCX
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
DOCX
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
DOCX
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
DOCX
Node-Level Trust Evaluation in Wireless Sensor Networks
Java Web Application Project Titles 2023-2024.pdf
Dot Net Final Year IEEE Project Titles.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Spammer detection and fake user Identification on Social Networks
Sentiment Classification using N-gram IDF and Automated Machine Learning
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Crop Yield Prediction and Efficient use of Fertilizers
Collaborative Filtering-based Electricity Plan Recommender System
Achieving Data Truthfulness and Privacy Preservation in Data Markets
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
Towards Fast and Reliable Multi-hop Routing in VANETs
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Node-Level Trust Evaluation in Wireless Sensor Networks

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PPTX
Cell Types and Its function , kingdom of life
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Lesson notes of climatology university.
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Classroom Observation Tools for Teachers
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Computing-Curriculum for Schools in Ghana
Cell Structure & Organelles in detailed.
Cell Types and Its function , kingdom of life
TR - Agricultural Crops Production NC III.pdf
Anesthesia in Laparoscopic Surgery in India
human mycosis Human fungal infections are called human mycosis..pptx
Lesson notes of climatology university.
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Complications of Minimal Access Surgery at WLH
GDM (1) (1).pptx small presentation for students
Classroom Observation Tools for Teachers
Microbial disease of the cardiovascular and lymphatic systems
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
VCE English Exam - Section C Student Revision Booklet
STATICS OF THE RIGID BODIES Hibbelers.pdf
Computing-Curriculum for Schools in Ghana

A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services

  • 1. A Secure Searchable Encryption Framework for Privacy- Critical Cloud Storage Services ABSTRACT: Searchable encryption has received a significant attention from the research community with various constructions being proposed, each achieving asymptotically optimal complexity for specific metrics (e.g., search, update). Despite their elegance, the recent attacks and deployment efforts have shown that the optimal asymptotic complexity might not always imply practical performance, especially if the application demands a high privacy. In this article, we introduce a novel Dynamic Searchable Symmetric Encryption (DSSE) framework called Incidence Matrix (IM)-DSSE, which achieves a high level of privacy, efficient search/update, and low client storage with actual deployments on real cloud settings. We harness an incidence matrix along with two hash tables to create an encrypted index, on which both search and update operations can be performed effectively with minimal information leakage. This simple set of data structures surprisingly offers a high level of DSSE security while achieving practical performance. Specifically, IM-DSSE achieves forward-privacy, backward-privacy and size-obliviousness simultaneously. We also create several DSSE variants, each offering different trade-offs that are suitable for different cloud applications and infrastructures. We fully implemented our framework and evaluated its performance on a real cloud system (Amazon EC2). We have released IM-DSSE as an open-sourcelibrary for wide development and adaptation. SYSTEM REQUIREMENTS:
  • 2. HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1 GB. SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : ASP.NET,C#.NET  Tool : Visual Studio 2008  Database : SQL SERVER 2005 REFERENCE: Thang Hoang, Attila A. Yavuz, Member, IEEE and Jorge Guajardo, “A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services”, IEEE Transactions on Services Computing, 2019.