“…The cloud server provides the huge cyberspace for cloud users to upload data, store data, update data and download the data. Data privacy has become an important research issue in today's cloud storage service [5,12,15,17,[23][24][25]. Therefore, the data senders will encrypt sensitive data or records before uploading them to the cloud storage space, whereas, in fact, this encrypted data will become an unrecognized ciphertext and even the data senders or the authorize data receivers cannot recognize its content.…”
In this paper, we propose an extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services, which achieves the essential requirements of a secure cloud storage service. A secure cloud storage service has to satisfy five security requirements: consistency, ciphertext indistinguishability, trapdoor indistinguishability and resist off-line keyword guessing attacks (including offline outside keyword guessing attack and off-line inside keyword guessing attack). Moreover, due to the characteristics of extended chaotic maps and session key establishment, which allow two communication parties to agree a common session key and the agreed session key is only known by the data sender and the authorized data receiver. Therefore, in this paper, we integrated the concept of session key establishment and extended chaotic maps into our proposed scheme which aims to resist the off-line keyword guessing attacks not only from the outside cloud attackers but also from an inside malicious cloud server. To the best of our knowledge, none of the recently proposed secure keyword search schemes can resist inside keyword guessing attacks and this work is the first attempt to provide a secure keyword search scheme without inside keyword guessing attacks in cloud storage services.
“…The cloud server provides the huge cyberspace for cloud users to upload data, store data, update data and download the data. Data privacy has become an important research issue in today's cloud storage service [5,12,15,17,[23][24][25]. Therefore, the data senders will encrypt sensitive data or records before uploading them to the cloud storage space, whereas, in fact, this encrypted data will become an unrecognized ciphertext and even the data senders or the authorize data receivers cannot recognize its content.…”
In this paper, we propose an extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services, which achieves the essential requirements of a secure cloud storage service. A secure cloud storage service has to satisfy five security requirements: consistency, ciphertext indistinguishability, trapdoor indistinguishability and resist off-line keyword guessing attacks (including offline outside keyword guessing attack and off-line inside keyword guessing attack). Moreover, due to the characteristics of extended chaotic maps and session key establishment, which allow two communication parties to agree a common session key and the agreed session key is only known by the data sender and the authorized data receiver. Therefore, in this paper, we integrated the concept of session key establishment and extended chaotic maps into our proposed scheme which aims to resist the off-line keyword guessing attacks not only from the outside cloud attackers but also from an inside malicious cloud server. To the best of our knowledge, none of the recently proposed secure keyword search schemes can resist inside keyword guessing attacks and this work is the first attempt to provide a secure keyword search scheme without inside keyword guessing attacks in cloud storage services.
“…The concerns while designing the data integrity schemes because they are vulnerable to different attacks [44]- [46]. The possible attacks against the schemes are discussed as follows:…”
Abstract-Cloud computing exhibits a remarkable potential to offer cost-effective and more flexible services on-demand to the customers over the network. It dynamically increases the capabilities of the organization without training new people, investment in new infrastructure or licensing new software. Cloud computing has grown dramatically in the last few years due to the scalability of resources and appear as a fast-growing segment of the IT industry. The dynamic and scalable nature of cloud computing creates security challenges in their management by examining policy failure or malicious activity. In this paper, we examine the detailed design of cloud computing architecture in which deployment models, service models, cloud components, and cloud security are explored. Furthermore, this study identifies the security challenges in cloud computing during the transfer of data into the cloud and provides a viable solution to address the potential threats. The task of Trusted Third Party (TTP) is introducing that ensure the sufficient security characteristics in the cloud computing. The security solution using the cryptography is specifically as the Public Key Infrastructure (PKI) that operates with Single-Sign-On (SSO) and Lightweight Directory Access Protocol (LDAP) which ensure the integrity, confidentiality, availability, and authenticity involved in communications and data.
“…The TPA is able to publicly audit the integrity of the shared data in the cloud for the group. The group is an entity consisting of users, who create data and share with each other [12]. Users in the group trust each other and are able to manage the group cooperatively.…”
Section: Integrity Auditing Of Shared Datawith Secure User Revocationmentioning
confidence: 99%
“…Nevertheless, in order to keep a good reputation, cloud service agency may purposefully hide data loss events. In cloud storage, data integrity and leakage are getting to be a major concern of cloud users [12].…”
Cloud computing is the process and adoption of existing technologies and paradigms. The aim of cloud processing is to allow users to take benefit from all of these solutions, without the need for deep information about or competence with each of them. This new era of information storage service also introduces new security issues, because data is organized on third party which might not exactly be trust deserving always. Data integrity is main security concern. Information integrity is the preservation of, and the guarantee of the accuracy and consistency of, data over its entire life-cycle. This kind of survey paper elaborates different protocols that verify remote control data accuracy. These protocols have been proposed a model for ensuring the long-term security and availability of data stored at remote untrusted hosts.
General TermsCloud data, Data verifiability and User revocation
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citationsâcitations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.