IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

A VERIFIABLE AND EFFICIENT SYMMETRIC SEARCHABLE ENCRYPTION SCHEME FOR DYNAMIC DATASET WITH FORWARD AND BACKWARD PRIVACY

AUTHORS:
A. Pavan Teja
K. Somashekhar
M.L. Sudarshanreddy
Y.Yaswanth
Mentor
A. Reddy Neela
Affiliation
Department of mathematical Sciences, Mohan Babu University, India
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

: Cloud storage has now become widely used for the management of sensitive documents, thereby casting a huge shadow over the user’s right to privacy and the security of his data. One of the earliest encryption methods is AES, which is the most widely used among the rest of the traditional methods, and it still provides confidentiality only but not secure searching over the encrypted data. The new research introduces a QKD + AES-based Symmetric Searchable Encryption (SSE) system applicable to dynamic datasets and thus allowing secure keyword-based search without compromising the privacy. Under this scheme, QKD is the method used to send the AES encryption keys to the client and server securely, and thus the quantum adversaries cannot either intercept or manipulate the keys. After that, the AES encryption holds the data securely, while the SHA-256 hashing for the indexing of keywords is employed which allows an efficient and secure search over the encrypted data to be done. The system, besides giving forward privacy which forbids the connection of new data to previous searches, also provides backward privacy which assures that deleted entries will not be accessible in future queries.

Keywords
Article Metrics
Article Views
46
PDF Downloads
1
HOW TO CITE
APA

MLA

Chicago

Copy

Teja, A. P., Somashekhar, K., Sudarshanreddy, M. & Y.Yaswanth, (2026). A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset with Forward and Backward Privacy. International Journal of Science, Strategic Management and Technology, 02(04). https://doi.org/10.55041/ijsmt.v2i4.433

Teja, A., et al.. "A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset with Forward and Backward Privacy." International Journal of Science, Strategic Management and Technology, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i4.433.

Teja, A.,K. Somashekhar,M.L. Sudarshanreddy, and Y.Yaswanth. "A Verifiable and Efficient Symmetric Searchable Encryption Scheme for Dynamic Dataset with Forward and Backward Privacy." International Journal of Science, Strategic Management and Technology 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i4.433.

References
1.Vaddeswaram, “Advancing Quantum Cryptography Algorithms for Secure Data,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 15, no. 9, 2024. Available at IJACSA

2.Vasavi Venkata Lakshmi and Ziaul Haque Choudhury, “Secure Data Access in Cloud Environments Using Quantum Cryptography,” arXiv:2506.10028 [cs.CR], June 2025. Available at arXiv

3.Dhinakaran, D. Selvaraj, N. Dharini, S. Edwin Raja, and C. Sakthi Lakshmi Priya, “Towards a Novel Privacy‑Preserving Distributed Multiparty Data Outsourcing Scheme for Cloud Computing with Quantum Key Distribution,” arXiv:2407.18923 [cs.CR], July 2024. Available at arXiv

4.Varsha Pravin Hole, Nikahat Mulla, and Pravin Basavraj Hole, “Effective Quantum Key Distribution Using Modified Key Sifting Scheme for Cloud Storage Security,” International Journal of Intelligent Engineering and Systems, vol. 16, no. 2, 2023. Available at IJIES

5.Kari Elisabeth Larsen, Lars Magnus Johansen, and Olav Alexander Pedersen, “Quantum Cryptography for Enhanced Security in Cloud‑Based Systems,” International Journal of Electrical Engineering, Mathematics and Computer Science (IJEEMCS), vol. 1, no. 2, 2024. DOI: 10.62951/ijeemcs.v1i2.77. Available at IJEEMCS

6.Umer Nauman, Miaolei Deng, Uzair Salman, et al., “Q‑ECS: Quantum‑Enhanced Cloud Security with Attribute‑Based Cryptography and Quantum Key Distribution,” Journal Unknown (2024‑2025). Available at Semantic Scholar: Q‑ECS

7.Arman Sykot, Md Shawmoon Azad, Wahida Rahman Tanha, BM Monjur Morshed, Syed Emad Uddin Shubha, and M. R. C. Mahdy, “Multi‑Layered Security System: Integrating Quantum Key Distribution with Classical Cryptography to Enhance Steganographic Security,” arXiv:2408.06964 [cs.CR], August 2024. Available at arXiv

8.Koushik Kumar Ganeeb, Vivekananda Jayaram, Manjunatha Sughaturu Krishnappa, Pankaj Gupta, Akshay Nagpal, Amey Ram Banarse, and Seema G Aarella, “Advanced Encryption Techniques for Securing Data Transfer in Cloud Computing: A Comparative Analysis of Classical and Quantum‑Resistant Methods,” International Journal of Computer Applications, vol. 186, no. 48, Nov 2024. Available at SSRN

9.Sebastian Verschoor et al., “A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post‑Quantum Cryptography,” EPJ Quantum Technology, vol. 12, Article number 51, 2025. Available at SpringerOpen

10.“Quantum Safe Cryptography and Security,” ETSI White Paper, 2018. Available at ETSI

 

 
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
AI-Driven Trading Analysis Platform:Architecture, Models, Risk Controls, and Operational Framework
string(7) "Ruban S" S, R.et al.
(2026)
DOI: 10.55041/ijsmt.v2i5.014
The Hero’s Spiritual Transformation: A Comparative Archetypal Study of Arjuna in the Bhagavad Gita and Santiago in the Alchemist
string(20) "Dr.M.Leena Chandrika" Chandrika, D.
(2026)
DOI: 10.55041/ijsmt.v2i4.224
Green Synthesis of Nanoparticles Using Plant Extract and Their Pharmacological Screening
string(17) "Sneha P. Kulkarni" Kulkarni, S. P.et al.
(2026)
DOI: 10.55041/ijsmt.v2i1.005
Scroll to Top