Generating Content Searchable Cipher Texts with Semantic Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Many systems which uses various content distribution over the network requires access restriction, prevention from unauthorized access and hiding the identity of users. Current systems face problems there are some types of attacks are there on user privacy. Lot of work has been done on keyword searchable cipher text with public key encryption. In public key encryption to search keyword has advantage that anyone who knows the public key of receiver can upload file easily with encrypted cipher text. This technique is semantically secure and takes search time equal to number of cipher texts. But system face problems when we retrieve data from large databases.to tackle this problem searchable public-key cipher texts with hidden star like structures (SPCHS) provides fast keyword search with keeping semantic security of keyword which are encrypted. In this paper we focus on another different application of public key encryption in which we are going for content search. We are applying the same technique of semantic security by making the hidden tree structure. Such type of content search is useful while recognizing the spams which are encrypted. While doing this we are keeping focus on search complexity should be linear with the query content size. Finally, we present an architecture with a generic SPCHS construction which we got as output from anonymous identity-based encryption and collision-free full-identity adaptable Identity-Based Key Encapsulation Mechanism (IBKEM) with anonymity.
Authors and Affiliations
Pondkule Priyanka, Yadav Ashwini, Khomane Sharmila, Nale Supriya
Improving Security of Network Services against WSDL Threats
WSDL documents are the guide book for attacking and hacking the web services. Since a WSDL documents contains explicit instructions on how to communicate private application, they can cause a series security breach if t...
Implementation of Embedded System Based Face Recognition System
Face Recognition is the ability to detect and recognize a person by their facial characteristics. Face is a multidimensional and hence requires a lot of mathematical computations. Face recognition system is very essenti...
Impact of Fly Ash in Bituminous Mix
Bituminous mix Design is estimated to result in a mix which is sufficiently durable, strong, and to fatigue resistive and permanent deformation, at the same time eco friendly and economical. A mix maker tries to achieve...
Video Watermarking Based On Wavelet Packet Analysis for Various Attack
As the world has moved to the digital era, whole content the living being has been uploaded to the server over internet. People are now very much familiar with the internet and are using for every need. The transition f...
Soil Stabilization using Nano Materials
The main aim of the study is to investigate the effect of addition of different nanomaterial's including Nano clay, Nano cement in the soft soil sample to determine its various properties. Various amount of nanomaterial...