SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4008
Adaptable Wildcard Searchable Encryption System
Savi P. Ghadge1, Yogesh A. Patil2, Shivani K. Wankhede3, Guided by Ms. Pradnya Kasture4
1,2,3Student,Department of Computer Engineering RMD Sinhgad School of Engineering Pune , India
4Assistant Professor,Department of Computer Engineering RMD Sinhgad School of Engineering Pune, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Searchable Encryption is a cryptographic
technique which allows search of data in an encryptedformat.
This technique provides user dataconfidentiality insurancefor
public cloud storage service as well as allows multiple
keyword search over encrypted data. Previously existing
systems provide exact or fuzzy keyword search which corrects
spelling errors only and their features are limited. In this
paper, we propose a system known as adaptable wildcard
searchable encryption system which allows multiple keyword
search with auto generated wildcards and wildcard keyword
queries with additional features. In the proposedframeworka
proxy server is presented for the recovery of lost data over
malicious activities. It accomplishes a high level of security
assurance since coordinating outcomes are obscure to the
cloud server in the test stage.
Key Words: Searchable Encryption, Multiple keyword
search, Auto generated wildcard search, Security
assurance.
1. INTRODUCTION
Cloud computing greatly facilitates data providers who
want to outsource their data to the cloud without disclosing
their sensitive data to external parties and would like users
with certain credentials to be able to access the data. This
requires data to be stored in encrypted forms with access
control policies such that no one exceptuserswithattributes
(or credentials) of specific forms can decrypt the encrypted
data. An encryption techniquethatmeetsthisrequirementis
required, where a users private key is associated with an
attribute set, a message is encrypted under an access policy
(or access structure) over a set of attributes, and a user can
decrypt a cipher text with his/her private key if his/her set
of attributes satisfies the access policy associated with this
cipher text. However, the standard ABE system fails to
achieve secure deduplication, which is a technique to save
storage space and network bandwidth by eliminating
redundant copies of the encrypted data stored in the cloud.
On the other hand, to the best of our knowledge, existing
constructions for secure deduplication are not built on
attribute-based encryption. Nevertheless, and secure
deduplication have been widely applied in cloud computing,
it would be desirable to design a cloud storage system
possessing both properties.
Attribute-based encryption (ABE) has been widelyused
in cloud computing where a data provider outsources
his/her encrypted data to a cloud service provider, and can
share the data with users possessing credentials (or
attributes). However, the standard ABE system does not
support secure deduplication, which is crucial for
eliminating duplicate copies of identical data inordertosave
storage space and network bandwidth.
We present an attribute-based storage system with
secure deduplication in a hybrid cloud setting, where a
private cloud is responsible for duplicate detection and a
public cloud manages the storage.
2. LITERATURE SURVEY
Flexible wildcard searchable encryptionsystem byYang
Yang, Ximeng Liu, Members, IEEE, Robert H. Deng, Fellow
IEEE, Jian Weng. According to this paper published in 2017,
searchable encryption is used toprovidedata confidentiality
and to allow users search over encrypted data with wildcard
keyword queries. In this system wildcards need to be
defining while uploading a file.
Hidden Policy cipher text-policy attribute based
encryption with keyword search against keyword guessing
attack by Qui S, Liu J, Shi Y, et al, 2017 states attribute based
keyword search and policy.
Fuzzy keyword search over encrypted data in cloud
computing by Li J, Wang Q year 2010.Exploited edit distance
to measure keywords similarity. It only deals with exact or
fuzzy keyword search to correct some spelling errors.
Efficient wildcard search over encrypted data by Hu C,
Han L in year 2015 introduced wildcard search over
encrypted data but therewasnoautogenerationof wildcard.
3. SYSTEM ANALYSIS
3.1 Existing System:
Fuzzy keyword search introduced intheexistingsystem
deal with exact or fuzzy keyword only to correct spelling
errors. The edit distance to measure keyword similarity is
small. It is useless if the edit distance of query keyword is
large. It was impossible to search multiple users’ data
simultaneously using one trapdoor. It is constructed based
on bloom filter. These Bloom filter based wildcard
searchable encryption schemes return false results to users
with a no negligible probability. Hence it decreases the
Security assurance. Flexible wildcardsearchable encryption
does not generate wildcard automatically. There is no
recovery option for the lost data.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4009
3.2 Proposed System:
To save storage space and network bandwidth by
eliminating redundant copies of theencrypteddata storedin
the cloud we propose a cloud storage system with both
properties associate attribute-based storage system with
secure De-duplication. De-duplication during a hybridcloud
environment, wherever a personal cloud is chargeable for
duplicate detection and a public cloud manages the storage
planned system comparedwiththepreviousinformation de-
duplication systems. As our system support high security
and potency, additionally to boot file transfer upload file by
specifying period and access policy.
In our system, we check deduplication ofcontentby
using tag and upload file in encryption format. Then system
will auto generate wildcard of all files and store on cloud.
End user can download this file by using a private key sent
by the TPA while uploading the file. We propose a proxy
server for the recovery of lost data.
4. IMPLEMENTATION
4.1 Data Owner:
Initially the data owner will upload their respectivefiles
on cloud with attribute constrained like time, date and
access policy. After that the private key get generated
automatically which is known only to data owner and copy
of that key is get stored at TPA side for future work. Only the
data owner having the rights to download the encrypted file
by using key which is generated at storing time. If the
another user wants to download that file, he/shemustknow
the decryption key, if the key get matched then the user can
able to access or download that file successfully.
4.2 Third Party Authorizer:
The role of third party authorizer is to grant excess
policy to users except data owner by providing tag and key
to download the cloud stored data. TPA also checks for
hacked file by sending request to proxy server. By providing
file status it give us privacy policy. Data owner can recover
the hacked data or file by help of TPA; TPA regenerates the
tag and key for recovered data.
4.3 Proxy Server:
The main role of proxy server is to check whether the
cloud stored file is get hacked or not. If the data owner
requested for stored file statusthenproxyservergetinvokes
and as per file contained data , theservercheckswhetherthe
file is get malicious or not , if changes occurred, then it will
acknowledged to TPA that file is get hacked and as per data
owner request proxy server get recovered all the hacked
data.
4.4 Cloud Storage:
Cloudstorageis file storageinthe cloud (online).Instead
of keeping your files on your local hard drive, external hard
drive, or flash drive, you can save them online. Cloud Server
provides data storage space for theuser/data ownertostore
the data that provides the secured and efficient way of
storing the owner’s data.
5. SYSTEM ARCHITECTURE
Fig -1: System Architecture
An entity who named as data owner whouploadthe
files with attribute, time, access policy, time, deduplication.
The uploaded files store on cloud but before that file get
check weather file is original or duplicate. And an user who
request for file for downloading the file andtoaccessthe file.
We used AES algorithm for Encryption and Decryption of
data.
6. DATAFLOW DIAGRAM
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4010
Initially the data owner will upload their respectivefiles
on cloud with attribute constrained like time, date and
access policy with a tag. After that the stored data will
checked for deduplication,if theuploadedfileisoriginal then
file will get encrypted otherwise will give reference to
original one which is on cloud. When the user wants to
access that files which are stored on cloud, will send request
to TPA , after conforming the constrained the TPA will send
private key to user to decrypt the file and then user can
successfully download the desired file.
7. SYSTEM UI
Above graph shows the time required to encrypt data while
storing on cloud.
Above graph shows the time required to decrypt data while
downloading from cloud.
When data owner wants to check whether the cloud stored
file is get hacked or not, request will sent to TPA as per
privacy policy.
To check any malicious data or any changes occurred in
cloud stored data file, whether the cloud stored file is get
hacked or not, response will send back to TPA as perprivacy
policy.
If any malicious data or any changes occurred in cloud
stored data file, if the cloud stored file is get hacked,
regeneration of file tag is carried out by sending request to
proxy server by TPA as per privacy policy and hacked data
will get recovered successfully.
8. CONCLUSION
Our proposed system providesa newandadaptable
wildcard searchable encryption system for secure cloud
storage service, which supports flexible wildcard
representation, flexible search function and flexible user
authorization revocation. By reducing rate of hacked data,
system successfully recovered the hacked files to produce
security factor to stored data.
9. REFERENCES
[1] Yang Yang, Ximeng Liu, Robert H. Deng, Jian Weng,
“Flexible Wildcard Searchable Encryption System”, IEEE
Transactions on Services Computing, June 2017.
[2] Singh A, Chatterjee K. Cloud security issues and
challenges: A survey[J]. Journal of Network and Computer
Applications, 2017, 79: 88-115.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4011
[3] Qiu S, Liu J, Shi Y, et al. Hidden policy ciphertext-
policy attribute based encryption with keyword search
against keyword guessing attack[J]. Science China
Information Sciences, 2017, 60(5): 052105.
[4] Yang Y, Ma M. Conjunctive Keyword Search With
Designated Tester and Timing Enabled ProxyRe-Encryption
Function for EHealth Clouds[J]. IEEE Transactions on
Information Forensics and Security, 2016, 11(4): 746-759.
[5] Yang Y. Attribute-based data retrieval with semantic
keyword search for e-health cloud[J]. Journal of Cloud
Computing, 2015, 4(1): 1.
[6] Hu C, Han L. Efficient wildcard search over encrypted
data[J]. International Journal of Information Security, 2015:
1-9.
[7] Li J, Chen X. Efficient multi-user keyword search over
encrypted data in cloud computing[J]. Computing and
Informatics, 2013, 32(4): 723-738.
[8] Suga T, Nishide T, Sakurai K. Secure keyword search
using Bloom filter with specified character
positions[C]//International Conference on Provable
Security. Springer Berlin Heidelberg, 2012: 235-252.
[9] Bosch C, BrinkmanR, Hartel P, etal.Conjunctivewildcard
search over encrypted data[C]//Workshop on Secure Data
Management. Springer Berlin Heidelberg, 2011: 114-127.
[10] LiJ,WangQ,WangC,etal.Fuzzykeywordsearchoverencrypt
ed dataincloud computing[C]//INFOCOM,2010Proceedings
IEEE. IEEE, 2010: 1-5
[11] Boneh D, Di Crescenzo G, Ostrovsky R, et al. Public key
encryption with keyword search[C]//International
Conference on the Theory andApplicationsofCryptographic
Techniques. Springer Berlin Heidelberg, 2004: 506-522.

More Related Content

PDF
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
PDF
IRJET - Virtual Data Auditing at Overcast Environment
PDF
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
PDF
IRJET- Securing Cloud Data Under Key Exposure
PDF
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
PDF
Data Search in Cloud using the Encrypted Keywords
PDF
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET - Virtual Data Auditing at Overcast Environment
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
Data Search in Cloud using the Encrypted Keywords
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...

What's hot (19)

PDF
Paper id 27201448
PDF
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
PDF
Implementation of De-Duplication Algorithm
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
PDF
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
PDF
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
PDF
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
PDF
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
PDF
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
PDF
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
PDF
A Study of Location and Date-Time Encryption of Cloud using Android Application
PDF
IRJET - Providing High Securtiy for Encrypted Data in Cloud
PDF
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
PDF
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
PDF
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
PDF
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
PDF
Secure retrieval of files using homomorphic encryption for cloud computing
PDF
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
PDF
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Paper id 27201448
A PRACTICAL CLIENT APPLICATION BASED ON ATTRIBUTE-BASED ACCESS CONTROL FOR UN...
Implementation of De-Duplication Algorithm
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorp...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
A Study of Location and Date-Time Encryption of Cloud using Android Application
IRJET - Providing High Securtiy for Encrypted Data in Cloud
IRJET- Privacy Preserving Encrypted Keyword Search Schemes
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
Review on Key Based Encryption Scheme for Secure Data Sharing on Cloud
Secure retrieval of files using homomorphic encryption for cloud computing
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cl...
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Ad

Similar to IRJET- Adaptable Wildcard Searchable Encryption System (20)

PDF
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
DOCX
Attribute based storage supporting
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
PDF
M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
PDF
Secure File Sharing on Cloud
PDF
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
DOCX
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
PDF
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
PDF
A cloud storage system for sharing data securely with privacy preservation an...
PDF
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
PDF
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
DOCX
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
DOCX
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
PDF
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
Ranking Efficient Attribute Based Keyword Searching Over Encrypted Data Along...
Attribute based storage supporting
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
M-Tech Project Attribute-Based Storage Supporting Secure Deduplication of Enc...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
Secure File Sharing on Cloud
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in ...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
A cloud storage system for sharing data securely with privacy preservation an...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A hybrid cloud approach for secure aut...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS A hybrid cloud approach for secure au...
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Construction Project Organization Group 2.pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
737-MAX_SRG.pdf student reference guides
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
composite construction of structures.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPT
Project quality management in manufacturing
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Construction Project Organization Group 2.pptx
additive manufacturing of ss316l using mig welding
CYBER-CRIMES AND SECURITY A guide to understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
737-MAX_SRG.pdf student reference guides
Safety Seminar civil to be ensured for safe working.
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
composite construction of structures.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Automation-in-Manufacturing-Chapter-Introduction.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Project quality management in manufacturing
Fundamentals of safety and accident prevention -final (1).pptx
OOP with Java - Java Introduction (Basics)
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Model Code of Practice - Construction Work - 21102022 .pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf

IRJET- Adaptable Wildcard Searchable Encryption System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4008 Adaptable Wildcard Searchable Encryption System Savi P. Ghadge1, Yogesh A. Patil2, Shivani K. Wankhede3, Guided by Ms. Pradnya Kasture4 1,2,3Student,Department of Computer Engineering RMD Sinhgad School of Engineering Pune , India 4Assistant Professor,Department of Computer Engineering RMD Sinhgad School of Engineering Pune, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Searchable Encryption is a cryptographic technique which allows search of data in an encryptedformat. This technique provides user dataconfidentiality insurancefor public cloud storage service as well as allows multiple keyword search over encrypted data. Previously existing systems provide exact or fuzzy keyword search which corrects spelling errors only and their features are limited. In this paper, we propose a system known as adaptable wildcard searchable encryption system which allows multiple keyword search with auto generated wildcards and wildcard keyword queries with additional features. In the proposedframeworka proxy server is presented for the recovery of lost data over malicious activities. It accomplishes a high level of security assurance since coordinating outcomes are obscure to the cloud server in the test stage. Key Words: Searchable Encryption, Multiple keyword search, Auto generated wildcard search, Security assurance. 1. INTRODUCTION Cloud computing greatly facilitates data providers who want to outsource their data to the cloud without disclosing their sensitive data to external parties and would like users with certain credentials to be able to access the data. This requires data to be stored in encrypted forms with access control policies such that no one exceptuserswithattributes (or credentials) of specific forms can decrypt the encrypted data. An encryption techniquethatmeetsthisrequirementis required, where a users private key is associated with an attribute set, a message is encrypted under an access policy (or access structure) over a set of attributes, and a user can decrypt a cipher text with his/her private key if his/her set of attributes satisfies the access policy associated with this cipher text. However, the standard ABE system fails to achieve secure deduplication, which is a technique to save storage space and network bandwidth by eliminating redundant copies of the encrypted data stored in the cloud. On the other hand, to the best of our knowledge, existing constructions for secure deduplication are not built on attribute-based encryption. Nevertheless, and secure deduplication have been widely applied in cloud computing, it would be desirable to design a cloud storage system possessing both properties. Attribute-based encryption (ABE) has been widelyused in cloud computing where a data provider outsources his/her encrypted data to a cloud service provider, and can share the data with users possessing credentials (or attributes). However, the standard ABE system does not support secure deduplication, which is crucial for eliminating duplicate copies of identical data inordertosave storage space and network bandwidth. We present an attribute-based storage system with secure deduplication in a hybrid cloud setting, where a private cloud is responsible for duplicate detection and a public cloud manages the storage. 2. LITERATURE SURVEY Flexible wildcard searchable encryptionsystem byYang Yang, Ximeng Liu, Members, IEEE, Robert H. Deng, Fellow IEEE, Jian Weng. According to this paper published in 2017, searchable encryption is used toprovidedata confidentiality and to allow users search over encrypted data with wildcard keyword queries. In this system wildcards need to be defining while uploading a file. Hidden Policy cipher text-policy attribute based encryption with keyword search against keyword guessing attack by Qui S, Liu J, Shi Y, et al, 2017 states attribute based keyword search and policy. Fuzzy keyword search over encrypted data in cloud computing by Li J, Wang Q year 2010.Exploited edit distance to measure keywords similarity. It only deals with exact or fuzzy keyword search to correct some spelling errors. Efficient wildcard search over encrypted data by Hu C, Han L in year 2015 introduced wildcard search over encrypted data but therewasnoautogenerationof wildcard. 3. SYSTEM ANALYSIS 3.1 Existing System: Fuzzy keyword search introduced intheexistingsystem deal with exact or fuzzy keyword only to correct spelling errors. The edit distance to measure keyword similarity is small. It is useless if the edit distance of query keyword is large. It was impossible to search multiple users’ data simultaneously using one trapdoor. It is constructed based on bloom filter. These Bloom filter based wildcard searchable encryption schemes return false results to users with a no negligible probability. Hence it decreases the Security assurance. Flexible wildcardsearchable encryption does not generate wildcard automatically. There is no recovery option for the lost data.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4009 3.2 Proposed System: To save storage space and network bandwidth by eliminating redundant copies of theencrypteddata storedin the cloud we propose a cloud storage system with both properties associate attribute-based storage system with secure De-duplication. De-duplication during a hybridcloud environment, wherever a personal cloud is chargeable for duplicate detection and a public cloud manages the storage planned system comparedwiththepreviousinformation de- duplication systems. As our system support high security and potency, additionally to boot file transfer upload file by specifying period and access policy. In our system, we check deduplication ofcontentby using tag and upload file in encryption format. Then system will auto generate wildcard of all files and store on cloud. End user can download this file by using a private key sent by the TPA while uploading the file. We propose a proxy server for the recovery of lost data. 4. IMPLEMENTATION 4.1 Data Owner: Initially the data owner will upload their respectivefiles on cloud with attribute constrained like time, date and access policy. After that the private key get generated automatically which is known only to data owner and copy of that key is get stored at TPA side for future work. Only the data owner having the rights to download the encrypted file by using key which is generated at storing time. If the another user wants to download that file, he/shemustknow the decryption key, if the key get matched then the user can able to access or download that file successfully. 4.2 Third Party Authorizer: The role of third party authorizer is to grant excess policy to users except data owner by providing tag and key to download the cloud stored data. TPA also checks for hacked file by sending request to proxy server. By providing file status it give us privacy policy. Data owner can recover the hacked data or file by help of TPA; TPA regenerates the tag and key for recovered data. 4.3 Proxy Server: The main role of proxy server is to check whether the cloud stored file is get hacked or not. If the data owner requested for stored file statusthenproxyservergetinvokes and as per file contained data , theservercheckswhetherthe file is get malicious or not , if changes occurred, then it will acknowledged to TPA that file is get hacked and as per data owner request proxy server get recovered all the hacked data. 4.4 Cloud Storage: Cloudstorageis file storageinthe cloud (online).Instead of keeping your files on your local hard drive, external hard drive, or flash drive, you can save them online. Cloud Server provides data storage space for theuser/data ownertostore the data that provides the secured and efficient way of storing the owner’s data. 5. SYSTEM ARCHITECTURE Fig -1: System Architecture An entity who named as data owner whouploadthe files with attribute, time, access policy, time, deduplication. The uploaded files store on cloud but before that file get check weather file is original or duplicate. And an user who request for file for downloading the file andtoaccessthe file. We used AES algorithm for Encryption and Decryption of data. 6. DATAFLOW DIAGRAM
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4010 Initially the data owner will upload their respectivefiles on cloud with attribute constrained like time, date and access policy with a tag. After that the stored data will checked for deduplication,if theuploadedfileisoriginal then file will get encrypted otherwise will give reference to original one which is on cloud. When the user wants to access that files which are stored on cloud, will send request to TPA , after conforming the constrained the TPA will send private key to user to decrypt the file and then user can successfully download the desired file. 7. SYSTEM UI Above graph shows the time required to encrypt data while storing on cloud. Above graph shows the time required to decrypt data while downloading from cloud. When data owner wants to check whether the cloud stored file is get hacked or not, request will sent to TPA as per privacy policy. To check any malicious data or any changes occurred in cloud stored data file, whether the cloud stored file is get hacked or not, response will send back to TPA as perprivacy policy. If any malicious data or any changes occurred in cloud stored data file, if the cloud stored file is get hacked, regeneration of file tag is carried out by sending request to proxy server by TPA as per privacy policy and hacked data will get recovered successfully. 8. CONCLUSION Our proposed system providesa newandadaptable wildcard searchable encryption system for secure cloud storage service, which supports flexible wildcard representation, flexible search function and flexible user authorization revocation. By reducing rate of hacked data, system successfully recovered the hacked files to produce security factor to stored data. 9. REFERENCES [1] Yang Yang, Ximeng Liu, Robert H. Deng, Jian Weng, “Flexible Wildcard Searchable Encryption System”, IEEE Transactions on Services Computing, June 2017. [2] Singh A, Chatterjee K. Cloud security issues and challenges: A survey[J]. Journal of Network and Computer Applications, 2017, 79: 88-115.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4011 [3] Qiu S, Liu J, Shi Y, et al. Hidden policy ciphertext- policy attribute based encryption with keyword search against keyword guessing attack[J]. Science China Information Sciences, 2017, 60(5): 052105. [4] Yang Y, Ma M. Conjunctive Keyword Search With Designated Tester and Timing Enabled ProxyRe-Encryption Function for EHealth Clouds[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(4): 746-759. [5] Yang Y. Attribute-based data retrieval with semantic keyword search for e-health cloud[J]. Journal of Cloud Computing, 2015, 4(1): 1. [6] Hu C, Han L. Efficient wildcard search over encrypted data[J]. International Journal of Information Security, 2015: 1-9. [7] Li J, Chen X. Efficient multi-user keyword search over encrypted data in cloud computing[J]. Computing and Informatics, 2013, 32(4): 723-738. [8] Suga T, Nishide T, Sakurai K. Secure keyword search using Bloom filter with specified character positions[C]//International Conference on Provable Security. Springer Berlin Heidelberg, 2012: 235-252. [9] Bosch C, BrinkmanR, Hartel P, etal.Conjunctivewildcard search over encrypted data[C]//Workshop on Secure Data Management. Springer Berlin Heidelberg, 2011: 114-127. [10] LiJ,WangQ,WangC,etal.Fuzzykeywordsearchoverencrypt ed dataincloud computing[C]//INFOCOM,2010Proceedings IEEE. IEEE, 2010: 1-5 [11] Boneh D, Di Crescenzo G, Ostrovsky R, et al. Public key encryption with keyword search[C]//International Conference on the Theory andApplicationsofCryptographic Techniques. Springer Berlin Heidelberg, 2004: 506-522.