Browse > Article
http://dx.doi.org/10.3837/tiis.2020.05.022

A Novel Cryptosystem Based on Steganography and Automata Technique for Searchable Encryption  

Truong, Nguyen Huy (School of Applied Mathematics and Informatics, Hanoi University of Science and Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.5, 2020 , pp. 2258-2274 More about this Journal
Abstract
In this paper we first propose a new cryptosystem based on our data hiding scheme (2,9,8) introduced in 2019 with high security, where encrypting and hiding are done at once, the ciphertext does not depend on the input image size as existing hybrid techniques of cryptography and steganography. We then exploit our automata approach presented in 2019 to design two algorithms for exact and approximate pattern matching on secret data encrypted by our cryptosystem. Theoretical analyses remark that these algorithms both have O(n) time complexity in the worst case, where for the approximate algorithm, we assume that it uses ⌈(1-ε)m)⌉ processors, where ε, m and n are the error of our string similarity measure and lengths of the pattern and secret data, respectively. In searchable encryption, our cryptosystem is used by users and our pattern matching algorithms are performed by cloud providers.
Keywords
Searchable Encryption; Cryptography; Steganography; Pattern Matching; Automata Technique;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Q. Dong, Z. Guan, L. Wu, Z. Chen, "Fuzzy Keyword Search over Encrypted Data in The Public Key Setting," Web-Age Information Management, pp. 729-740, 2013.
2 R. Dowsley, A. Michalas, M. Nagel, N. Paladi, "A Survey on Design and Implementation of Protected Searchable Data in The Cloud," Computer Science Review, Volume 26, pp. 17-30, 2017.   DOI
3 A. Ehrenfeucht, R, M. McConnell, N. Osheim, S. W. Woo, "Position Heaps: A Simple and Dynamic Text Indexing Data Structure," Journal of Discrete Algorithms, Vol. 9, pp. 100-121, 2011.   DOI
4 Y. K. Gedam, J.N. Varshapriya, "Fuzzy Keyword Search over Encrypted Data in Cloud Computing," Journal of Engineering Research and Applications, 4(7), pp. 197-202, 2014.
5 F. Han, J. Qin, J. Hu, "Secure Searches in The Cloud: A Survey," Future Generation Computer Systems, Vol. 62, pp. 66-75, 2016.   DOI
6 R. Haynberg, J. Rill, D. Achenbach, J. Muller-Quade, "Symmetric Searchable Encryption for Exact Pattern Matching Using Directed Acyclic Word Graphs," in Proc. of 2013 International Conference on Security and Cryptography (SECRYPT), pp. 403-410, 2013.
7 M. Jain, S. K. Lenka, "A Review of Digital Image Steganography Using LSB and LSB Array," International Journal of Applied Engineering Research, 11(3), pp. 1820-1824, 2016.
8 N. S. Jho, D. Hong, "Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search," KSII Transactions on Internet and Information Systems, 7(5), pp. 1328-1342, 2013.   DOI
9 M. S. John, P. SumaLatha, M. Joshuva, "A Comparative Study of Index-Based Searchable Encryption Techniques," International Journal of Advanced Research in Computer Science, 6(3), pp. 13-15, 2015.
10 G. M. Landau, U. Vishkin, "Efficient String Matching with k Mismatches," Theoretical Computer Science, Vol. 43, pp. 239-249, 1986.   DOI
11 S. Song, J. Zhang, X. Liao, J. Du, Q. Wen, "A Novel Secure Communication Protocol Combining Steganography and Cryptography," Procedia Engineering, Vol. 15, pp. 2767-2772, 2011.   DOI
12 J. V. Leeuwen, "Handbook of Theoretical Computer Science," Elsevier MIT Press, Vol. A, pp. 290-300, 1990.
13 Z. Mei, B. Wu, S. Tian, Y. Ruan, Z. Cui, "Fuzzy Keyword Search Method over Ciphertexts Supporting Access Control," KSII Transactions on Internet and Information Systems, 11(11), pp. 5671-5693, 2017.   DOI
14 G. Navarro, "A Guided Tour to Approximate String Matching," ACM Computing Surveys, 33 (1), pp. 3188, 2001.   DOI
15 P. H. Paris, N. Abadie, C. Brando, "Linking Spatial Named Entities to The Web of Data for Geographical Analysis of Historical Texts," Journal of Map & Geography Libraries, 13(1), pp. 82-110, 2017.   DOI
16 D. X. Song, D. Wagner, A. Perrig, "Practical Techniques for Searches on Encrypted Data," in Proc. of 2000 IEEE Symposium on Security and Privacy, pp. 44, 2000.
17 D. R. Stinson, "Cryptography: Theory and Practice (CRC Press Series on Discrete Mathematics and Its Application)," CRC Press, pp. 1-20, 180-184, 1995.
18 M. Strizhov, Z. Osman, I. Ray, "Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup," Future Internet, 8(3), 28, 2016.   DOI
19 D. M. Sunday, "A Very Fast Substring Search Algorithm," Communications of The ACM, 33(8), pp. 132-142, 1990.   DOI
20 N. H. Truong, "A New Digital Image Steganography Approach Based on The Galois Field GF(pm) Using Graph and Automata," KSII Transactions on Internet and Information Systems, 13(9), pp. 4788-4813, 2019.   DOI
21 N. H. Truong, "A New Approach to Exact Pattern Matching," Journal of Computer Science and Cybernetics, 35(3), pp. 197-216, 2019.   DOI
22 S. Chakraborty, S. K. Bandyopadhyay, "Steganography Method Based on Data Embedding by Sudoku Solution Matrix," International Journal of Engineering Science Invention, 2(7), pp. 36-42, 2013.
23 D. Bakkelund, "An LCS-based String Metric," University of Oslo (Norway), September 23, 2009.
24 P. Bharti, R. Soni, "A New Approach of Data Hiding in Images Using Cryptography and Steganography," International Journal of Computer Applications, 58(18), pp. 1-5, 2012.   DOI
25 A. Blumer, J. Blumer, D. Haussler, A. Ehrenfeucht, M. T. Chen, J. Seiferas, "The Smallest Automation Recognizing The Subwords of A Text," Theoretical Computer Science, Volume 40, pp. 31-55, 1985.
26 A. Chatterjee, A.K. Das, "Secret Communication Combining Cryptography and Steganography," Progress in Advanced Computing and Intelligent Engineering, Vol. 563, pp. 281-291, 2018.   DOI
27 G. Chugh, "Information Hiding - Steganography & Watermarking: A Comparative Study," International Journal of Advanced Research in Computer Science, 4(4), pp. 165-171, 2013.
28 N. Desmoulins, P. A. Fouque, C. Onete, O. Sanders, "Pattern Matching on Encrypted Streams," Advances in Cryptology - ASIACRYPT 2018, pp. 121-148, 2018.
29 Varsha, R. S. Chhillar, "Data Hiding Using Steganography and Cryptography," International Journal of Computer Science and Mobile Computing, 4(4), pp. 802-805, 2015.
30 N. H. Truong, "Automata Technique for The LCS Problem," Journal of Computer Science and Cybernetics, 35(1), pp. 21-37, 2019.   DOI
31 R.M. Yadav, D. S. Tomar, R. K. Baghel, "A Study on Image Steganography Approaches in Digital Images," Engineering Universe for Scientific Research and Management, 6(5), pp. 1-6, 2014.
32 W. Yunling, W. Jianfeng, C. Xiaofeng, "Secure Searchable Encryption": A Survey, Journal of Communications and Information Networks, 1(4), pp. 52-65, 2016.   DOI
33 L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, A. Vasilakos, "Security and Privacy for Storage and Computation in Cloud Computing," Information Sciences, Vol. 258, pp. 371-386, 2014.   DOI
34 B.B. Zaidan, A. A. Zaidan, A. K. Al-Frajat, H. A. Jalab, "On The Differences between Hiding Information and Cryptography Techniques: An Overview," Journal of Applied Science, 10(15), pp. 1650-1655, 2010.   DOI