Open Access Open Access  Restricted Access Subscription or Fee Access

Multiparty Searchable Encryption Scheme

Pratima Bhalerao, Sunanda Suryawanshi, Ruchita Sonar, Saiyad Sayyed, Pranjali Kuche

Abstract


In existing symmetric searchable encryption scheme it aims to allow a user to outsource his/her encrypted data into a cloud server and delegate the latter to search on his/her behalf. In these schemes it does not qualify a new secure and scalable solution for the multiparty settings. The users outsource their encrypted data into cloud server and selectively authorize each data to search. Due to this possibility the cloud server may collude with some malicious user which is a challenge to have a secure and scalable multiparty searchable encryption scheme (MPSE).Now based on this analysis we will present a new secure model for MPSE by considering the best case and the worst case scenario. We use Data Encryption Standard (DSE) to implement MPSE.


Keywords


Multiparty Searchable Encryption Scheme (MPSE).

Full Text:

PDF

References


Q. Tang. (2014). Nothing Is for Free: Security in Searching Shared & Encrypted Data. [Online] Available: http://eprint.iacr.org/2014/362

Multi-Key Searchable Encryption- . R. A. Popa and N. Zeldovich. (2013 [Online]. Available: http://eprint.iacr.org/2013/508

Order-Preserving Symmetric Encryption Alexandra Boldyreva, Nathan Chenette, Younho Lee and Adam O'Neill Georgia Institute of Technology, Atlanta, GA, USA fsasha,nchenetteg@gatech.edu.

Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions: Reza Curtmola y (NJIT), Juan Garay (AT&T Labs Research) Seny Kamara ( Microsoft Research), Rafail Ostrovsky (UCLA)

Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization WENJUN LU1, AVINASH L. VARNA2, (Member, IEEE), AND MIN WU3, (Fellow, IEEE) 1Google, Mountain View, CA 95014, USA 2Intel, Pheonix, AZ 85226, USA 3Department of Electrical and Computer Engineering and Institute for Advanced Computer Studies, University of Maryland, College Park, MD 20742, USA Corresponding author: W. Lu (luwj02@gmail.com)

Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques Sombir Singh* M.Tech. Scholar (CSE) BRCM CET, Bahal, India Sunil K. Maakar Asstt. Prof. in CSE Dept BRCM CET, Bahal, India Dr.Sudesh Kumar Assoc. Prof. in CSE Dept. BRCM CET, Bahal, India

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing .Qian Wang, Student Member, IEEE, Cong Wang, Student Member, IEEE, Kui Ren, Member, IEEE, Wenjing Lou, Senior Member, IEEE, and Jin Li

Privacy-Preserving Public Auditing for Secure Cloud Storage.Cong Wang, Student Member, IEEE, Sherman S.-M. Chow, Qian Wang, Student Member, IEEE, Kui Ren, Member, IEEE, and Wenjing Lou, Member, IEEE.

“Providing Security And Privacy To Cloud Data Storage” Yogesh V. Bhapkar, Rakesh S. Gaikwad, Milind R. Hegade ISB&M, SOT, PUNE, SPPU PUNE, MAHARASHTRA , INDIA.

Data Integrity and Security in Cloud Environment Using AES Algorithm. R G Suresh Kumar Associate Professor (Ph.D)Department of Computer Science,India , Kamala kannan .R (M. Tech) Final Year Department of Computer Science,India.

AES and DES Using Secure and Dynamic Data Storage in Cloud Prasanth SP Information Technology & V.S.B.Engineering College, Tamilnadu, India prasanthitboss@gmail.com, Gowtham B Information Technology & V.S.B.Engineering College, Tamilnadu, India. gowthambruse@gmail.com.

Enhancing Cloud Computing Security using AES Algorithm Abha Sachdev ,Assistant Professor Department of Computer Science & Engineering ASET, Amity University, Noida, India , Mohit Bhansali ,Student Department of Computer Science & Engineering ASET, Amity University, Noida, India.

Securing Software as a Service Model of Cloud Computing: Issues and Solutions .Rashmi, Dr.G.Sahoo Birla Institute of Technology Mesra, Ranchi, Jharkhand India .Dr.S.Mehfuz Jamia Milia Islamia,Delhi,India.

Trusted Cloud Computing with Secure Resources and Data Coloring Kai Hwang University of Southern California, Deyi Li Tsinghua University, China.

A Privacy Manager for Cloud Computing Siani Pearson, Yun Shen and Miranda Mowbray HP Labs, Long Down Avenue, Stoke Gifford, Bristol BS34 8QZ, UK {siani.pearson,yun.shen,miranda.mowbray}@hp.com


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.