On a security model of conjunctive keyword search over encrypted relational database
نویسندگان
چکیده
We study a security model for searching documents containing each of several keywords (conjunctive keyword search) over encrypted documents. A conjunctive keyword search protocol consists of three entities: a data supplier, a storage system such as database, and a user of storage system. A data supplier uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing each of several keywords with a private trapdoor. That is, a valid user is able to use boolean combinations of queries. Up to now only few conjunctive keyword search schemes have been proposed in the literature. However, the relying security model has not been based on relational databases such as Oracle and MS-Access, hence it is not easy to apply them in practice. Moreover, they have not considered an important security notion for user’s trapdoor queries. In this paper, we first formally define a security model for conjunctive keyword search schemes including trapdoor security based on a practical relational database. We apply our security model to the existing conjunctive keyword scheme and discuss its vulnerability and countermeasure.
منابع مشابه
Secure Conjunctive Keyword Search over Encrypted Data
We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents. Work in this area has largely focused on search criteria consisting of a single keyword. If the user is actually interested i...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملConjunctive Fuzzy Keyword Search Over Encrypted Data in Cloud Computing
As Cloud Computing becomes prevalent, more and more sensitive information are centralized into the cloud. For the protect data privacy, sensitive data usually have to be encrypted before outsourcing, which makes efficient data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to search over encrypted data through keywords and selectively retrie...
متن کاملSelective Document Retrieval from Encrypted Database
We propose the concept of selective document retrieval (SDR) from an encrypted database which allows a client to store encrypted data on a third-party server and perform efficient search remotely. We propose a new SDR scheme based on the recent advances in fully homomorphic encryption schemes. The proposed scheme is secure in our security model and can be adapted to support many useful search f...
متن کاملA Study of Conjunctive Keyword Searchable Schemes
We study the development of conjunctive keyword searchable scheme which enables one to search encrypted documents by using more than one keyword. The notion of conjunctive keyword searching was presented by Golle et al. in 2004. However, their security model was constructed in a symmetric-key setting which is not applicable for the overall applications in the reality. So Park et al. extended Go...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Systems and Software
دوره 84 شماره
صفحات -
تاریخ انتشار 2011