[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/11774716_15guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Efficient conjunctive keyword search on encrypted data storage system

Published: 19 June 2006 Publication History

Abstract

We study conjunctive keyword search scheme allowing for remote search of data containing each of several keywords on encrypted data storage system. A data supplier first uploads encrypted data on a storage system, and then a user of the storage system searches data containing keywords over encrypted data hence insider (such as an administrator of the storage system) and outsider attackers do not learn anything else about the data. Recently, Golle et al. first suggested conjunctive keyword search scheme, but the communication and storage costs linearly depend on the number of stored data in the database, hence it is not really suitable for a large scale database.
In this paper, we propose an efficient conjunctive keyword search scheme over encrypted data in aspects of communication and storage costs. Concretely, we reduce the storage cost of a user and the communication cost between a user and a data supplier to the constant amounts. We formally define security model for a conjunctive keyword search scheme and prove that the proposed scheme is secure under the decisional bilinear Diffie-Hellman (DBDH) assumption in the random oracle model.

References

[1]
M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Shi, "Encryption with keyword search, revisited: consistency conditions, relations to anonymous IBE, and extensions", In Proceedings of Crypto '05, LNCS Vol. 3621, pp. 205-222, Springer-Verlag, 2005.
[2]
B. Bloom, "Space/time trade-offs in hash coding with allowable errors", Communications of the ACM, 13(7):422-426, 1970.
[3]
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search", In Proceedings of Eurocrypt '04, LNCS Vol. 3089, pp. 31-45, Springer-Verlag, 2004.
[4]
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private Information Retrieval", In Proceedings of 29th STOC, 1997.
[5]
G. Di. Crescenzo, Y. Ishai, and R. Ostrovsky, "Universal Servie-providers for Dtabase Private Information Retrieval", In Proceedings of 17th PODC, 1998.
[6]
Y. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data", In Proceedings of ACNS '05 LNCS Vol. 3531, pp. 442-455, Springer-Verlag, 2005, An early version of this paper is appeared on Cryptology ePrint Archieve. Availabe at http://eprint.iacr.org/2004/051
[7]
P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive keyword search over encrytped data", In Proceedings of ACNS '04, LNCS Vol. 3089, pp. 31-45, Springer-Verlag, 2004.
[8]
E. Goh, "Secure Indexes", In Cryptology ePrint Archieve on March 16, 2004, This paper is availabe at http://eprint.iacr.org/2003/216
[9]
Microsoft Developer Network (MSDN), in the part of Maximum Capacity Specifications for SQL Server 2005. Refer to http://msdn2.microsoft.com/en-us/library/ms143432(SQL.90).aspx
[10]
R. Ostrovsky and W. Skeith, "Private keyword search on streaming data", This paper will be appear in Crypto05.
[11]
W. Ogata and K. Kurosawa, "Oblivious keyword search" Journal of Complexity Vol. 20, Issues 2-3, pp. 356-371, 2004.
[12]
D. J. Park, K. Kim, and P. J. Lee, "Public Key Encryption with Conjunctive Field Keyword Search", In Proceedings of WISA '04, LNCS Vol. 3325, pp. 73-86, Springer-Verlag, 2004.
[13]
D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data", In Proceedings of IEEE sysmposium on Security and Privacy, 2000.

Cited By

View all
  • (2023)A Survey on Searchable Symmetric EncryptionACM Computing Surveys10.1145/361799156:5(1-42)Online publication date: 27-Nov-2023
  • (2020)Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked SearchSecurity and Communication Networks10.1155/2020/72985182020Online publication date: 1-Jan-2020
  • (2020)Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary LanguageIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2017.278758817:2(320-334)Online publication date: 11-Mar-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
EuroPKI 2006: Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
June 2006
260 pages
ISBN:3540351515
  • Editors:
  • Andrea S. Atzeni,
  • Antonio Lioy

Sponsors

  • Istituto Superiore Mario Boella: Istituto Superiore Mario Boella

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 19 June 2006

Author Tags

  1. conjunctive keyword search over encrypted data
  2. database security and privacy

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Survey on Searchable Symmetric EncryptionACM Computing Surveys10.1145/361799156:5(1-42)Online publication date: 27-Nov-2023
  • (2020)Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked SearchSecurity and Communication Networks10.1155/2020/72985182020Online publication date: 1-Jan-2020
  • (2020)Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary LanguageIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2017.278758817:2(320-334)Online publication date: 11-Mar-2020
  • (2018)Research on Privacy Preserving of Searchable EncryptionProceedings of the 2018 2nd High Performance Computing and Cluster Technologies Conference10.1145/3234664.3234665(58-68)Online publication date: 22-Jun-2018
  • (2018)Integrity-verifiable conjunctive keyword searchable encryption in cloud storageInternational Journal of Information Security10.1007/s10207-017-0394-917:5(549-568)Online publication date: 1-Oct-2018
  • (2018)Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted DatabaseComputer Security10.1007/978-3-319-98989-1_5(83-100)Online publication date: 3-Sep-2018
  • (2017)Multiuser Searchable Encryption with Token Freshness VerificationSecurity and Communication Networks10.1155/2017/64351382017Online publication date: 1-Jan-2017
  • (2017)Efficient No-dictionary Verifiable Searchable Symmetric EncryptionFinancial Cryptography and Data Security10.1007/978-3-319-70972-7_28(498-516)Online publication date: 3-Apr-2017
  • (2016)Executing Boolean Queries on an Encrypted Bitmap IndexProceedings of the 2016 ACM on Cloud Computing Security Workshop10.1145/2996429.2996436(11-22)Online publication date: 28-Oct-2016
  • (2016)An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean QueriesJournal of Medical Systems10.1007/s10916-016-0610-640:12(1-11)Online publication date: 1-Dec-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media