Generating Content Searchable Cipher Texts with Semantic Security

Abstract

Many systems which uses various content distribution over the network requires access restriction, prevention from unauthorized access and hiding the identity of users. Current systems face problems there are some types of attacks are there on user privacy. Lot of work has been done on keyword searchable cipher text with public key encryption. In public key encryption to search keyword has advantage that anyone who knows the public key of receiver can upload file easily with encrypted cipher text. This technique is semantically secure and takes search time equal to number of cipher texts. But system face problems when we retrieve data from large databases.to tackle this problem searchable public-key cipher texts with hidden star like structures (SPCHS) provides fast keyword search with keeping semantic security of keyword which are encrypted. In this paper we focus on another different application of public key encryption in which we are going for content search. We are applying the same technique of semantic security by making the hidden tree structure. Such type of content search is useful while recognizing the spams which are encrypted. While doing this we are keeping focus on search complexity should be linear with the query content size. Finally, we present an architecture with a generic SPCHS construction which we got as output from anonymous identity-based encryption and collision-free full-identity adaptable Identity-Based Key Encapsulation Mechanism (IBKEM) with anonymity.

Authors and Affiliations

Pondkule Priyanka, Yadav Ashwini, Khomane Sharmila, Nale Supriya

Keywords

Related Articles

Improving Security of Network Services against WSDL Threats

WSDL documents are the guide book for attacking and hacking the web services. Since a WSDL documents contains explicit instructions on how to communicate private application, they can cause a series security breach if t...

Implementation of Embedded System Based Face Recognition System

Face Recognition is the ability to detect and recognize a person by their facial characteristics. Face is a multidimensional and hence requires a lot of mathematical computations. Face recognition system is very essenti...

Impact of Fly Ash in Bituminous Mix

Bituminous mix Design is estimated to result in a mix which is sufficiently durable, strong, and to fatigue resistive and permanent deformation, at the same time eco friendly and economical. A mix maker tries to achieve...

Video Watermarking Based On Wavelet Packet Analysis for Various Attack

As the world has moved to the digital era, whole content the living being has been uploaded to the server over internet. People are now very much familiar with the internet and are using for every need. The transition f...

Soil Stabilization using Nano Materials

The main aim of the study is to investigate the effect of addition of different nanomaterial's including Nano clay, Nano cement in the soft soil sample to determine its various properties. Various amount of nanomaterial...

Download PDF file
  • EP ID EP21680
  • DOI -
  • Views 232
  • Downloads 5

How To Cite

Pondkule Priyanka, Yadav Ashwini, Khomane Sharmila, Nale Supriya (2016). Generating Content Searchable Cipher Texts with Semantic Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(3), -. https://www.europub.co.uk/articles/-A-21680