Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing

K. Nie, Yunling Wang, Xiaoling Tao
{"title":"Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing","authors":"K. Nie, Yunling Wang, Xiaoling Tao","doi":"10.1504/ijes.2019.10025616","DOIUrl":null,"url":null,"abstract":"Cloud computing has brought many appealing features for its users, such as on-demand computing resources, flexible and ubiquitous access and economical cost. Individuals and enterprises are motivated to outsource mass data to the cloud server. However, the privacy and security of the users' data are the main obstacles preventing the application of cloud computing. Searchable encryption technique is a positive way to protect users' sensitive data, while preserving search ability over encrypted data on the server side. However, the cloud server may be lazy and return part of the search results to its users as a result of intending to relieve their workload. Therefore, a verification mechanism should be established to guarantee the correctness and completeness of the search results. In this paper, we present an efficient publicly verifiable keyword search scheme over encrypted data. Our scheme achieves the conjunctive keyword search and ensures the correctness and completeness of the search results even if the untrusted cloud server returns an empty set deliberately. Compared with existing conjunctive keyword search schemes, our scheme is more efficient in the aspect of verifying the search results. Furthermore, we prove that the proposed scheme can achieve the desired security properties.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Embed. Syst.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijes.2019.10025616","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cloud computing has brought many appealing features for its users, such as on-demand computing resources, flexible and ubiquitous access and economical cost. Individuals and enterprises are motivated to outsource mass data to the cloud server. However, the privacy and security of the users' data are the main obstacles preventing the application of cloud computing. Searchable encryption technique is a positive way to protect users' sensitive data, while preserving search ability over encrypted data on the server side. However, the cloud server may be lazy and return part of the search results to its users as a result of intending to relieve their workload. Therefore, a verification mechanism should be established to guarantee the correctness and completeness of the search results. In this paper, we present an efficient publicly verifiable keyword search scheme over encrypted data. Our scheme achieves the conjunctive keyword search and ensures the correctness and completeness of the search results even if the untrusted cloud server returns an empty set deliberately. Compared with existing conjunctive keyword search schemes, our scheme is more efficient in the aspect of verifying the search results. Furthermore, we prove that the proposed scheme can achieve the desired security properties.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云计算中加密数据的高效、可公开验证的联合关键字搜索
云计算为其用户带来了许多吸引人的特性,如按需计算资源、灵活和无处不在的访问以及经济的成本。个人和企业都有动力将大量数据外包给云服务器。然而,用户数据的隐私性和安全性是阻碍云计算应用的主要障碍。可搜索加密技术是一种保护用户敏感数据的积极方法,同时在服务器端保留对加密数据的搜索能力。但是,云服务器可能会偷懒,将部分搜索结果返回给用户,因为它打算减轻用户的工作量。因此,需要建立一种验证机制来保证搜索结果的正确性和完整性。在本文中,我们提出了一种有效的、可公开验证的加密数据关键字搜索方案。我们的方案实现了连接关键字搜索,即使不受信任的云服务器故意返回空集,也能保证搜索结果的正确性和完整性。与现有的连接关键字搜索方案相比,我们的方案在验证搜索结果方面效率更高。进一步证明了该方案能够达到预期的安全性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
NITIDS: a robust network intrusion dataset Solution to the conformable fractional differential systems with higher order Flexible heuristic-based prioritised latency-sensitive IoT application execution scheme in the 5G era Selection gate-based networks for semantic relation extraction A combination classification method based on Ripper and Adaboost
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1