Abstract
The cloud computing service with which they may outsource the data storage and process them with various terminals at any time any where is getting vitalized as the network and computing technology develops. Especially, DaaS(Database as a Service) is widely used out of cloud computing services. However, it needs to encrypt the database stored in outsourcing storage because there is a security problem that the database stored in the server could be read by hackers and unethical server administrator without prior consent of the owner if the individual’s sensitive information such as its physical information is stored without being encrypted in the database. However, entrusting the data storage makes no sense if the owner has to search the data by decrypting them after downloading all encrypted data into his terminals in order to search his data in safe with the existing encryption algorithm. A Searchable Encryption System has currently been appeared in order to solve such a problem. But, the existing searchable encryption system has the same typed trapdoors which are created to search the same keywords because numerous search queries are transmitted to the entrusted storage center and the administrator of the center shall be able to analogize the keywords and learn which data the user stores and search through such queries. Thus, this paper proposes a Searchable Encryption System using the one time trapdoor which prevents the unethical server administrator from analogizing the contents of search and data through search queries by creating the different trapdoor whenever the same user searches the same keywords.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryp-tion with Keyword Search. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland (May 2004)
Boneh, D., Waters, B.: Conjunctive, Subset and Range Queries on Encrypted Data. In: Proceedings of the 4th Theory of Cryptography Conference, Amsterdam, Netherlands (Febraury 2007)
Hwang, Y.H., Lee, P.J.: Public key encryption with conjunctive key-word search and its extension to a multi-user system. In: Proceeding of First International Conference on Pairing-Based Cryptography, Tokyo, Japan (July 2007)
Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private Query on Encrypted Data in Multi-User Settings. In: Proceeding of the 4th International Conference on Information Security Practice and Experience, Sydney, Australia (April 2008)
Kamara, S., Lauter, K.: Cryptographic cloud-storage. In: Proceedings of Workshops on Financial Cryptography and Data Security, Canary Islands, Spain (January 2010)
Ion, M., Russello, G., Crispo, B.: Enforcing Multi-user Access Policies to Encrypted Cloud Databases. In: International Symposium on Policies for Distributed Systems and Networks, Trento, Italy (June 2011)
Zhang, B., Zhang, F.: An efficient public key encryption with conjunctive-subset keywords search. Journal of Network and Computer Applications 34(1) (2011)
Yang, Y.: Towards Multi-user Private Keyword Search for Cloud Computing. In: Proceeding of International Conference on Cloud Computing, Singapore (July 2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, SH., Ryou, JC., Lee, IY. (2014). A Study on Searchable Encryption System against Chosen-Ciphertext Attack. In: Jeong, YS., Park, YH., Hsu, CH., Park, J. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 280. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41671-2_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-41671-2_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41670-5
Online ISBN: 978-3-642-41671-2
eBook Packages: EngineeringEngineering (R0)