Javascript must be enabled to continue!
Multi tenancy cloud data with a shared privacy preserving trusted keyword search
View through CrossRef
In today's cloud computing environment, secure and efficient data sharing is paramount. This project proposes a secure cloud-based data sharing and verification system using the Verifiable yet Accountable Keyword Searchable Encryption (VAKSE) scheme. The system architecture is divided into four modules involving the Cloud Service Provider (CSP), Verifier, Data Owner, and Client, each playing a key role in secure data handling and verification. The first module focuses on the Cloud Service Provider (CSP), which manages user login, stores data owner and client details, generates cryptographic keys, and maintains file information. The CSP is also responsible for handling data requests and adding clients to the system. The second module involves the Verifier, who also logs in securely and is tasked with validating cryptographic keys. The Verifier checks whether a key is original or tampered and ensures that only valid keys are forwarded to the intended data recipients, thereby maintaining data integrity and trust. The third module introduces the Data Owner, who registers and logs in to upload files securely. Upon uploading, a key is generated to securely share data with intended clients. This ensures that the control over data remains with the owner at all times. The fourth module pertains to the Client, who registers, logs in, queries for data, and uses a generated token linked to a private key for verification and decryption. This enables clients to verify the authenticity of the data and decrypt it securely. At the core of this system lies the VAKSE scheme, which enables keyword-searchable encryption with built-in verifiability and accountability. The system utilizes four primary cryptographic algorithms: Setup, KeyGen, Encap, and Decap. The Setup algorithm generates master keys, KeyGen assigns private keys based on identities, Encap encapsulates valid keys into ciphertexts, and Decap deterministically retrieves the encapsulated key using private keys. Additionally, a mechanism is in place to detect and reject invalid ciphertexts, enhancing the robustness of the system. By integrating MAC (Message Authentication Code) encryption and VAKSE, the system ensures confidentiality, authenticity, and verifiability of cloud-stored data, offering a comprehensive solution for secure and accountable cloud-based data sharing.
Thomson & Ryberg Publications
Title: Multi tenancy cloud data with a shared privacy preserving trusted keyword search
Description:
In today's cloud computing environment, secure and efficient data sharing is paramount.
This project proposes a secure cloud-based data sharing and verification system using the Verifiable yet Accountable Keyword Searchable Encryption (VAKSE) scheme.
The system architecture is divided into four modules involving the Cloud Service Provider (CSP), Verifier, Data Owner, and Client, each playing a key role in secure data handling and verification.
The first module focuses on the Cloud Service Provider (CSP), which manages user login, stores data owner and client details, generates cryptographic keys, and maintains file information.
The CSP is also responsible for handling data requests and adding clients to the system.
The second module involves the Verifier, who also logs in securely and is tasked with validating cryptographic keys.
The Verifier checks whether a key is original or tampered and ensures that only valid keys are forwarded to the intended data recipients, thereby maintaining data integrity and trust.
The third module introduces the Data Owner, who registers and logs in to upload files securely.
Upon uploading, a key is generated to securely share data with intended clients.
This ensures that the control over data remains with the owner at all times.
The fourth module pertains to the Client, who registers, logs in, queries for data, and uses a generated token linked to a private key for verification and decryption.
This enables clients to verify the authenticity of the data and decrypt it securely.
At the core of this system lies the VAKSE scheme, which enables keyword-searchable encryption with built-in verifiability and accountability.
The system utilizes four primary cryptographic algorithms: Setup, KeyGen, Encap, and Decap.
The Setup algorithm generates master keys, KeyGen assigns private keys based on identities, Encap encapsulates valid keys into ciphertexts, and Decap deterministically retrieves the encapsulated key using private keys.
Additionally, a mechanism is in place to detect and reject invalid ciphertexts, enhancing the robustness of the system.
By integrating MAC (Message Authentication Code) encryption and VAKSE, the system ensures confidentiality, authenticity, and verifiability of cloud-stored data, offering a comprehensive solution for secure and accountable cloud-based data sharing.
Related Results
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract
Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Tenancy in Palanpur
Tenancy in Palanpur
This chapter examines, in detail, the nature and trends in tenancy in Palanpur. It explores the ways in which the evolution of tenancy is associated with land ownership patterns, l...
Distinguishing German Residential and Commercial Tenancy Law: Are Tenant and Landlord in an Equal Position?
Distinguishing German Residential and Commercial Tenancy Law: Are Tenant and Landlord in an Equal Position?
The German housing market, particularly in major cities, is very tight. This situation makes Tenancy Law the issue that has attracted the most attention in local and federal electi...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract
The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...
TCA-PEKS: Trusted Certificateless Authentication Public-key Encryption with Keyword Search scheme in Cloud Storage
TCA-PEKS: Trusted Certificateless Authentication Public-key Encryption with Keyword Search scheme in Cloud Storage
Abstract
Public key encryption with keyword search (PEKS) technology achieves accurate ciphertext retrieval while protecting data privacy. However, curious or malicious sem...
Autonomy on Trial
Autonomy on Trial
Photo by CHUTTERSNAP on Unsplash
Abstract
This paper critically examines how US bioethics and health law conceptualize patient autonomy, contrasting the rights-based, individualist...

