Acrse-Ik- An Attribute Based Confidentiality Retaining Searchable Encryption Technique using Interim Keyword for Protected Cloud Storage
Gvicto Sudha George1, K. Meenakshi2, Almas Begum3

1Gvicto Sudha George, Department of CSE, Dr. MGR Educational and Research Institute, Chennai (Tamil Nadu), India.
2K. Meenakshi, Department of CSE, SRM Institute of Science and Technology, Chennai (Tamil Nadu), India.
3Almas Begum, Department of CSE, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India.
Manuscript received on 21 May 2019 | Revised Manuscript received on 07 June 2019 | Manuscript Published on 15 June 2019 | PP: 252-256 | Volume-8 Issue-1S2 May 2019 | Retrieval Number: A00580581S219/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Data stored in the cloud server is in the encrypted format because the cloud server cannot be held accountable always. The cloud server makes use of the searchable encryption algorithm to fetch the required data by avoiding the decryption process. The attribute-based keyword search allows the users to access the data that they require from the cloud server any time. This method ensures that the rights of the users who access the server are not disclosed as a public data in the cloud server which is done by generating search key by the user. But still this method poses a threat to the privacy of the information.To overcome this shortfall, this paper proposes a new scheme that utilizes short lived keywords. The proposed method uses search tokens generated in a specific time span to extract ciphertext for the users and also privacy of the generated search tokens are upheld. The proposed method does not suffer from the chosen keyword attack which is verified by the random oracle model. Moreover in the proposed method it can be proved that the two parameter time complexity and the number of attributes are proportional to each other in a linear fashion. Also this scheme is well suited for real word applications.
Keywords: Cloud Security, Searchable Encryption, Short Lived Keyword Search, Secrecy, Access Policy.
Scope of the Article: Cloud Computing and Networking