Journal
Journal
KEYWORD SEARCH
V.Shubha1, Tejashwini S. Bahaddurdesai2, Shalini R. Ronad3, Tukaram D. Channadasar4,
Dr. Bahubali Akiwate5
1,2,3,4
Students, 5Associate Professor, Dept. of Computer Science and Engineering,
KLE College of Engineering and Technology, Chikodi, Karnataka-591201
---------------------------------------------------------------------***----------------------------------------------------------------
Abstract: Therefore, it is crucial to find a balance between security and
The Public Key Encryption with Keyword Search (PEKS) accessibility while using cloud storage technology.
scheme is a powerful tool for enabling searches on ciphertext
In order to tackle the problem of secure searching over
by a server in a public-key setting. However, it is important
encrypted data, a revolutionary technique called searchable
to note that the PEKS scheme does suffer from a significant
encryption (SE) was introduced by [1]. With the help of a
vulnerability, known as the Keyword Guessing Attack
searchable encryption scheme, a server can efficiently
(KGA). This attack can allow an attacker to successfully
search for data in its encrypted form on behalf of a client,
guess the correct keyword that has been encrypted in a
without compromising the confidentiality of the plaintext
searchable ciphertext and trapdoor. Fortunately, we can
data [2]. This state-of-the-art method ensures the highest
overcome this vulnerability by relying on security notions
level of data security with minimal loss of information. It
such as keyword privacy and trapdoor privacy. By ensuring
consists of three main entities, data owner, data user, and
that the PEKS scheme satisfies trapdoor privacy, we can be
cloud server. Data owner: The one who encrypts the data
confident that it is secure against KGA.
and index before uploading to the cloud server. Data user:
The one who generates the trapdoor to enable the server to
Keywords: PEKS, searchable encryption, trapdoor privacy,
search over the encrypted data. Cloud server: The server
keyword privacy, cloud server, data user, data owner.
stores the encrypted data and helps to perform searching
operations on the cloud using the trapdoor.
ABBREVIATIONS:
making it suitable for real-world applications. Despite the search schemes over encrypted data’’,. It demonstrated
threat posed by keyword guessing attacks (KGAs), we have that anyone can retrieve information of certain keyword
developed robust security measures such as keyword from any captured query messages. An offline keyword
privacy and trapdoor privacy to protect against information guessing attack (KGA) is a type of attack that allows a
leakage from the keyword and trapdoor sides. In particular, server to attack after receiving a considerable snumber
trapdoor privacy is a crucial feature that must be met by any of trapdoors.
PEKS scheme to ensure its resilience against KGAs. With
these measures in place, we can confidently deploy the [5] Yunhong Zhou, Licheng Wang, Yanmei Tian, “Public
PEKS scheme with minimal security concerns. key encryption with keyword in cloud”. It enables one
to search Patel for encrypted keywords without
The main focus of this review is on trapdoor privacy in compromising the security of the original data. Users
various types of PEKS schemes. We begin by summarizing can outsource encrypted data and keywords to a cloud
the development of PEKS schemes and then introduce the server.
concept of trapdoor privacy. We compare different PEKS
schemes in terms of their underlying tools, computational
[6] L. Pu, C. Lin, B. Chen and D. He, "User-Friendly
hardness, system model, search function, security properties
Public-Key Authenticated Encryption With Keyword
of keyword privacy and trapdoor privacy, and their security
Search for Industrial Internet of Things". It is
against offline KGA and online KGA attacks. Finally, we
significantly reduced comparing with most existing
suggest some potential research directions for the PEKS
classical PEKS schemes without causing other
scheme and conclude this review.
communication costs or security loss.
[3] M. H. Noorallahzade, R. Alimoradi, A. Gholami, "A In the existing system public key encryption with keyword
Survey on Public Key Encryption with Keyword search (PEKS) technique enables servers operating in a
Search: Taxonomy and Methods". Create the public-key environment to conduct searches over cipher
necessary familiarity by expressing various evaluation text. The keyword guessing attack is a serious flaw in the
criteria from different perspectives of security. PEKS system. Using a searchable cipher text and trapdoor,
the attacker can use a keyword guessing attack (KGA) to
[4] J. W. Byun, H. S. Rhee, H.-A. Park, and D. H. Lee, successfully guess the right term. Security concepts like
‘‘Off-line keyword guessing attacks on recent keyword keyword privacy and trapdoor privacy were created to
address this vulnerability.
Trapdoor Privacy in Public Key Encryption with Keyword Search
searches for the keyword, the attacker can guess the correct be queried for trapdoor previously. The challenger
keyword for the corresponding trapdoor. chooses a random b and sends a ciphertext C PEKS
(Apub Wb) to the attacker.
4) The attacker can continue to query for trapdoor TW for
IV. PROPOSED SYSTEM any keyword W, except for the challenge keywords W0
and W1.
The first PEKS scheme was developed using a public key 5) The attacker wins the game if he/she guessed the correct
cryptosystem that employed bilinear pairings. This scheme random b.
was derived from the identity-based encryption scheme. A
typical PEKS scheme involves inputting a keyword and a B. TRAPDOOR PRIVACY:
public key, which generates a keyword ciphertext via the Keyword privacy is an important aspect of a PEKS (Public
PEKS algorithm. This keyword ciphertext is then stored on a Key Encryption with Keyword Search) that ensures that no
cloud server. The receiver can then generate a trapdoor by information about the keyword is leaked from the searchable
running the Trapdoor algorithm with a private key and the ciphertext. Most of the PEKS schemes satisfy this property.
desired keyword as inputs. This trapdoor is sent to the cloud However, Rhee et al. found that the security of the trapdoor
server to run the Test algorithm for searching. The creators is also significant in constructing a PEKS scheme that is
of the scheme also provided a transformation technique that secure against keyword guessing attack. Trapdoor privacy
constructs a secure PEKS scheme, guaranteeing consistency guarantees that no information about the keyword is leaked
from an anonymous identity-based encryption scheme. from the trapdoor. To capture this issue, Rhee et al. proposed
Zhang et al. [18] proposed a more efficient PEKS the notion of trapdoor indistinguishability. The notion of
scheme by eliminating the pairing operation in the trapdoor indistinguishability should prevent an outsider
encryption process. This scheme is designed to be secure attacker from distinguishing between the trapdoor of two
against insider keyword guessing attacks by using the sign challenge keywords of their choice. This should be done
encryption algorithm to generate searchable ciphertext. The under the condition that the attacker is allowed to obtain
proposed scheme achieves trapdoor privacy in the random trapdoors for any non-challenge keywords.
oracle model and logarithmic time pairing-free searching J. Hou[19] proposed a security notion to address
over encrypted data. trapdoor privacy, which is called Perfect Keyword Privacy
(PKP) and Search Pattern Privacy (SPP). This notion was
A. KEYWORD PRIVACY: later formalized by K. Emura et al[10]. and is called Weak
Keyword privacy refers to the condition that the adversary Key Unlinkability. However, it was found that Weak Key
should not be able to distinguish between two ciphertexts of Unlinkability failed to hide the search patterns when more
keywords W0 and W1, respectively, when no trapdoors are than two trapdoors were queried. To overcome this
obtained for the respective keywords. In order to deficiency, they proposed a stronger notion called Strong
demonstrate that the PEKS (Public Key Encryption with Key Unlinkability. Strong Key Unlinkability allows
Keyword Search) scheme is indistinguishable against chosen adversaries to query multiple trapdoors while protecting the
keyword attack (IND-CKA), a game is played between an search pattern at the same time.
attacker and a challenger. In order to construct a secure PEKS scheme, it is
crucial to consider the security of the trapdoor as well as the
A PEKS IND-CKA game is defined as follows: keyword privacy. A major challenge for the PEKS scheme is
1) The challenger first runs the Key Gen (s) algorithm to the keyword guessing attack, which makes the searchable
generate public keys Apub and private key Apriv. Public keyword and trapdoor vulnerable to points of attack when
key Apub is given to the attacker. transmitted over the network. Therefore, solely relying on
2) The attacker can adaptively query for the trapdoor T W keyword privacy is not sufficient to ensure the security of the
for any keyword W of his/her choice from the PEKS scheme since it only protects the privacy from the
challenger. sender side. To be secure against an offline keyword
3) When the attacker is ready, he/she will send two words guessing attack from an outsider attacker, the PEKS scheme
W0 and W1 that he/she wishes to be challenged to the must satisfy both keyword privacy and trapdoor privacy,
challenger. The words chosen by the attacker should not
Trapdoor Privacy in Public Key Encryption with Keyword Search
which protect the privacy from both the sender and the transformation shifts data rows. The third mixes columns.
receiver side. Many studies have proposed a PEKS scheme The last transformation is performed on each column using
with trapdoor privacy and security against offline keyword a different part of the encryption key. Longer keys need
guessing attacks. However, some of these proposals suffer more rounds to complete. The following are the steps of
from inefficiency, as they use computationally expensive AES:
bilinear pairing operations, only allowing single keyword Step 1: Initially the 16-byte key or a 4-word key is
search functionality and higher communication cost. expanded to an array of 44 words where each word is of 4
bytes.
ALGORITHM: Step 2: At the very first of encryption process the 16-byte
A. ADVANCED ENCRYPTION STANDARD plain text block or 4-word plain text block is XORed with
(AES): the 4-word key i.e. W0, W1, W2, W3. The resultant of this
Advanced Encryption Standard was introduced by NIST XOR is provided to the 1st round.
(National Institute of Standard and Technology) in the year Step 3: In the first round, the result of XOR is processed
2001. It is a symmetric block cipher. AES cipher intakes by the Substitute Bytes, Shift Rows, Mix Column and Add
the 128bit plain text block accompanied by a 128-bit key Round Key functions in the respective sequence. To the
to generate cipher text block of 128-bit. And while Add Round Key function, the next 4 words from the
decryption it takes 128-bit cipher text block along with expanded key are provided that are W4, W5, W6, W7. The
expanded key used in encryption in reverse order to recover corresponding result of first-round is provided to the
the plain text block of 128-bit. A round has four functions second round.
among which one is of permutation and three are of Step 4: All round till round nine, performs the same
substitution: functions and in each round, a distinct key is provided from
Substitute Byte, Mix Column and Add Round Key the expanded key. In round ten only three functions are
functions are substitution functions whereas Shift Rows is performed on the input provided by round 9 that are
a permutation function. Both the encryption and decryption Substitute Bytes, Shift Rows and Add Round Key function.
process starts with the Add Round Key function which is The result of round 10 is the cipher text block of the
then followed by the nine-round which has all four corresponding pain text block.
substitutions and permutation function but the last tenth
round has only three functions.
B. TRAPDOOR:
A trap door is kind of a secret entry point into a program that
allows anyone to gain access to any system without going
through the usual security access procedures. Another
definition of a trapdoor is it is a method of bypassing normal
authentication methods. Therefore, it is also known as a back
door. Trapdoors are quite difficult to detect and also in order
to find them the programmers or the developers have to go
through the components of the system. Programmers use
Trapdoor legally to debug and test programs. Trapdoors turn
Fig 2: Block diagram of AES to threats when any dishonest programmers gain illegal
access. Program development and software update activities
The AES encryption algorithm defines numerous should be the first focus of security measures. The operating
transformations that are to be performed on data stored in system that controls the trapdoors is difficult to implement.
an array. The first step of the cipher is to put the data into
an array, after which the cipher transformations are V. ADVANTAGES
repeated over multiple encryption rounds. The first 1. Privacy Protection: Users can search over encrypted data
transformation in the AES encryption cipher is substitution without revealing the actual content of the data or the search
of data using a substitution table. The second
Trapdoor Privacy in Public Key Encryption with Keyword Search
VIII. REFERENCES
[2] Sudeep Ghosh, Abhishek Bisht, Ashok Kumar Das, [11] Z. Li, D. Wang, Achieving one-round password-based
“Provably secure public key encryption with keyword authenticated key exchange over lattices, IEEE Trans.
search for data processing “, Volume 139, June 2023, Serv. Comput. 15 (1) (2022) 308–321.
102876.
[12] Y. Lu and J. Li, ‘‘Lightweight public key authenticated
[3] L. Pu, C. Lin, B. Chen and D. He, "User-Friendly Public encryption with keyword search against adaptively-
Key Authenticated Encryption with Keyword Search for chosen targets adversaries for mobile devices’’, IEEE
Industrial Internet of Things," in IEEE Internet of Things Transaction on Mobile Computing, May 4, 2021.
Journal, vol. 10, Aug.1, 2023.
[13] D. Zhang, Q. Fan, H. Qiao and M. Luo, "A Public-key
[4] C. Ge, Z. Liu, W. Susilo, L. Fang, H. Wang, Attribute- Encryption with Multi-keyword Search Scheme for
based encryption with reliable outsourced decryption in Cloud-based Smart Grids," 2021, IEEE Conference.
cloud computing using smart contract, IEEE Trans.
Dependable Secure Comput(2023). [14] Y. Miao, Q. Tong, R. Deng, K.-K.-R. Choo, X. Liu, and
H. Li, ‘‘Verifiable searchable encryption framework
[5] M.H. Noorallahzade, R. Alimoradi, A. Gholami, "A
against insider keyword-guessing attack in cloud
Survey on Public Key Encryption with Keyword Search:
storage’’, IEEE Transaction on Cloud Computing, Apr.
Taxonomy and Methods", International Journal of
21, 2020.
Mathematics and Mathematical Sciences, vol. 2022,
Article ID 3223509, 2022.
[15] S. Zhu and Y. Han, "Generative trapdoors for public key
cryptography based on automatic entropy optimization",
[6] J. W. Byun, H. S. Rhee, H.-A. Park, and D. H. Lee,
in IEEE Transactions, vol. 18, Aug. 2021.
‘‘Offline keyword guessing attacks on recent keyword
search schemes over encrypted data’’, in Proc. Workshop
[16] Yunhong Zhou, Licheng Wang, Yanmei Tian, “Public
Secure Data Manage. Berlin, Germany, Springer, 2022,
key encryption with keyword in cloud”, Information
pp. 75–83.
Theory, Probability and statistics, 2020.
[7] M. Zeng, H. Qian, J. Chen and K. Zhang, "Forward
[17] R. Behnia, M. O. Ozmen and A. A. Yavuz, "Lattice-
Secure Public Key Encryption with Keyword Search for
Based Public Key Searchable Encryption from
Outsourced Cloud Storage," in IEEE Transactions on
Experimental Perspectives," in IEEE Transactions on
Cloud Computing, vol. 10, Jan.-March 2022.
Dependable and Secure Computing, vol. 17, Nov.-Dec.
2020.
[8] H. Lin, F. Gao, H. Zhang, Z. Jin, W. Li and Q. Wen,
"Public Key Encryption with Equality Test Supporting
[18] Zhang, Y. Wang, Y. Li, “Searchable Public Key
Flexible Designated Authorization in Cloud Storage," in
Encryption Supporting Semantic Multi Keywords
IEEE Systems Journal, vol. 16, March 2022.
Search”, IEEE Access 2019.
[9] Q. Fan, D. He, J. Chen, C. Peng, L. Wang, Isoga: An
[19] Y. Wu, J. Hou, J. Liu, W. Zhou and S. Yao, "Novel multi-
isogeny-based quantum-resist searchable encryption
keyword search on encrypted data in the cloud", IEEE
scheme against keyword guessing attacks, IEEE Syst. J,
Access, vol. 7, pp. 31984-31996, 2019.
(2022) 1–12.
[22] Li, J., Zhang, Y., Ning, J., Huang, X., Poh, G.S. and
Wang, D., 2020. Attribute based encryption with privacy
protection and accountability for Cloud IoT. IEEE
Transactions on Cloud Computing.