Privacy Preserving Searchable Encryption with Fine-grained Access Control
Privacy Preserving Searchable Encryption with Fine-grained Access Control
Project Title: | Privacy Preserving Searchable Encryption with Fine-grained Access Control. |
Implementation: | Java,MYSQL |
Project Cost: (In Indian Rupees) | Rs.3000/ |
Project Buy Link: | Buy Link |
IEEE BASE PAPER ABSTRACT:
Searchable encryption facilitates cloud server to search over encrypted data without decrypting the data. Single keyword based searchable encryption enables a user to access a subset of documents, which contains the keyword of the user’s interest. In this paper, we present a single keyword based searchable encryption scheme for the applications where multiple data owners upload their data and then multiple users can access the data. The scheme uses attribute based encryption that allows user to access the selective subset of data from cloud without revealing his/her access rights to the cloud server. The scheme is proven adaptively secure against chosen-keyword attack in the random oracle model. We have implemented the scheme on Google cloud instance and the performance of the scheme found practical in real-world applications.
PROJECT OUTPUT VIDEO:
EXISTING SYSTEM:
-
Koo et al proposed an author-based search over encrypted data anonymously.
-
Shi et al, have presented a scheme, authorized searchable public-key encryption (ASPKE), in which a data owner decides the access policy for his encrypted data and keeps it hidden inside the ciphertext. The AS-PKE scheme uses the access structure in form of LSSS.
-
Wang et al proposed a scheme that supports only one value per attribute in the ciphertext access policy, where the access structure is formed with AND gate on multivalued attributes. However, we found a security flaw in Wang et al’s scheme.
DISADVANTAGES OF EXISTING SYSTEM:
-
These schemes do not address the important issue of receiver anonymity.
-
The major limitation of the Shi et al’s scheme is that the user has to acquire the search token from the trusted authority, which increases the per query interaction overhead for search operation on user side. Furthermore, the scheme works in the scenario, where there are fixed number of keyword fields for which the search should be carried out.
PROPOSED SYSTEM:
-
We present a privacy preserving single keyword-based searchable encryption scheme (PSE) with fine-grained access control.
-
We present an attribute based searchable encryption with access policy enforced by the data owner and hidden inside the ciphertext. The scheme is designed with multi-sender and multi-receiver setup, aimed at facilitating a data owner(sender) to encrypt the index of keywords related to his document and uploads it along with the access policy and the encrypted document on cloud storage, where the access policy is decided by the data owner and kept hidden inside the ciphertext.
-
The user(receiver) sends his search query in the form of trapdoor to the cloud storage server. The cloud server uses this trapdoor to search over all encrypted indexes uploaded on the cloud storage. The documents corresponding to the indexes for which the search operation returns true are sent back to the user as the result of his query.
ADVANTAGES OF PROPOSED SYSTEM:
-
The proposed PSE scheme provides a keyword based search facility over attribute based encrypted data with hidden access policy.
-
The scheme is applicable in a scenario where there are multiple data owners and multiple data receivers.
-
The scheme allows each user in the system with a set of attribute values, where a trusted authority verifies the user’s attributes and assigns him a secret key.
-
One of the key features of the PSE scheme is that once the secret key obtained, the user can generate the search query himself in the form of a trapdoor using the secret key assigned to him.
MODULES:
-
Attribute Center
-
Token Generator
-
Data Owner
-
Cloud Service Provider
-
Receiver (Data) User
MODULES DESCSRIPTION:
Attribute Center:
The Attribute Centre (AC) is a trusted third party of the system. AC is responsible for generating system parameters and issuing keys to users of the system.
Token Generator:
The Token Generator (TG) is a trusted third party of the system, which assists a data owner for generating encrypted index. TG is involved in the process of generating encrypted index. For a small system/organization the AC itself can play the role of the TG. However, in the case of a system with sufficiently large number of users, autonomous entities (e.g. TGs) should play this role.
Data Owner:
Data owner encrypts and stores the data on cloud storage server. The encrypted data consists of two parts: (i) the index of encrypted keywords, and (ii) the encrypted document.
Cloud Service Provider:
Cloud Service Provider (CSP) provides storage and computation services for the entities of the system.
Receiver (Data) User:
Receiver user generates and submits a trapdoor to CSP. The CSP searches over the encrypted indexes using this trapdoor. The documents corresponding to the indexes for which the search operation returns true are returned to the user. Finally, the user decrypts the resultant documents.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
-
System : Pentium Dual Core.
-
Hard Disk : 120 GB.
-
Monitor : 15’’ LED
-
Input Devices : Keyboard, Mouse
-
Ram : 1 GB
SOFTWARE REQUIREMENTS:
-
Operating system : Windows 10.
-
Coding Language : JAVA.
-
Tool : Netbeans 7.2.1
-
Database : MYSQL
REFERENCE:
Payal Chaudhari and Manik Lal Das, “Privacy Preserving Searchable Encryption with Fine-grained Access Control”, IEEE Transactions on Cloud Computing ( Early Access ), 2021.