期刊文献+

Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server 被引量:4

Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server
原文传递
导出
摘要 The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is difficult to search and thus limited for practical usage. The keyword search encryption is a helpful mechanism that provides a searchable ciphertext for some predefined keywords. The previous studies failed to consider the attack from the data storage server to guess the keyword. This kind of attack may cause some critical information revealed to the untrusted server. This paper proposes a new keyword search encryption model that can effectively resist the keyword-guessing attack performed by the untrusted data storage(testing) server. The testing(query)secret is divided into multiple shares so that the security can be guaranteed if the servers cannot conspire with each other to retrieve all shares of the secret. The user data stored in an untrusted server, such as the centralized data center or cloud computing server, may be dangerous of eavesdropping if the data format is a plaintext. However, the general ciphertext is difficult to search and thus limited for practical usage. The keyword search encryption is a helpful mechanism that provides a searchable ciphertext for some predefined keywords. The previous studies failed to consider the attack from the data storage server to guess the keyword. This kind of attack may cause some critical information revealed to the untrusted server. This paper proposes a new keyword search encryption model that can effectively resist the keyword-guessing attack performed by the untrusted data storage (testing) server. The testing (query) secret is divided into multiple shares so that the security can be guaranteed if the servers cannot conspire with each other to retrieve all shares of the secret.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期440-442,共3页 上海交通大学学报(英文版)
关键词 keyword search encryption keyword-guessing attack cloud computing environment information security keyword search encryption, keyword-guessing attack, cloud computing environment, information security
  • 相关文献

参考文献7

  • 1BONEH D, GRESCENZO G D, OSTROVSKY R, et al. Public key encryption with keyword Search [C]//proceedings of Eurocrypt'Og, LNCS 3027. Berlin, Germany: Springer-Verlag, 2004: 506-522.
  • 2BEAK J, SAFAW-NAINI R, SUSlLO W. Public key en- cryption with keyword search revised [C]/ / Proceedings of the International Conference on Computational Science and Its Applications (ICCSA '08). Berlin: Springer-Verlag, 2008: 1249-1259.
  • 3PARK J H. Efficient hidden vector encryption for con- junctive queries on encrypted data [J]. IEEE Trans- actions on Knowledge and Data Engineering, 2011, 23(10): 1483-1497.
  • 4ZHANG B, ZHANG F. An efficient public key encryption with conjunctive-subset keywords search [J]. Journal of Network and Computer Applications, 2011, 34(1): 262-267.
  • 5BYUN J W, RHEE H S, PARK H A, et al. Off- line keyword guessing attacks on recent keyword search schemes over encrypted data [C]//Proeeedin9s of Secure Data Management, Third VLDB Workshop SDM'06, LNCS 4156. Berlin, Germany: Springer- Verlag, 2006: 75-83.
  • 6RHEE H S, SUSILO W, KIM H J. Secure searchable public key encryption scheme against keyword guess- ing attacks [J]. IEICE Electronics Express, 2009, 6(5): 237-243.
  • 7JEONG I R, KWON J O, HONG D, et al. Construct- ing PEKS schemes secure against keyword guessing attacks is possible? [J] Computer Communications, 2009, 32(2): 394-396.

同被引文献28

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部