An Efficient Multi-keyword Symmetric Searchable Encryption Scheme for Secure Data Outsourcing

Автор: Vasudha Arora, S.S. Tyagi

Журнал: International Journal of Computer Network and Information Security(IJCNIS) @ijcnis

Статья в выпуске: 11 vol.8, 2016 года.

Бесплатный доступ

Symmetric searchable encryption (SSE) schemes allow a data owner to encrypt its data in such a way that it could be searched in encrypted form. When searching over encrypted data the retrieved data, search query, and search query outcome everything must be protected. A series of SSE schemes have been proposed in the past decade. In this paper, we are going to propose our an efficient multi-keyword symmetric searchable encryption scheme for secure data outsourcing and evaluate the performance of our proposed scheme on a real data set.

SSE, TRSE, Searchable encryption, homomorphic encryption, Information Retrieval. Data outsourcing

Короткий адрес: https://sciup.org/15011707

IDR: 15011707

Список литературы An Efficient Multi-keyword Symmetric Searchable Encryption Scheme for Secure Data Outsourcing

  • D. Boneh, G. Crescenzo, R. Ostrovsky, G. Persiano, " Public Key Encryption with Keyword Search", Proc. International Conference on Theory and Applications of Cryptographic Techniques (Eurocrypt), 2004.
  • D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data," Proc. IEEE Symp. Security and Privacy, 2000.
  • R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Proc. ACM 13th Conf. Computer and Comm. Security (CCS), 2006.
  • C. Wang, N. Cao, K. Ren, W. Lou, " Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data", IEEE Transactions On Parallel and Distributed Systems, Vol. 23, No. 8, August 2012.
  • Swaminathan, Y. Mao, G.-M. Su, H. Gou, A.L. Varna, S. He, M. Wu, and D.W. Oard, "Confidentiality-Preserving Rank-Ordered Search," Proc. Workshop Storage Security and Survivability, 2007.
  • P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive Keyword Search over Encrypted Data," Proc. Second Int'l Conf. Applied Cryptography and Network Security (ACNS), pp. 31-45, 2004.
  • N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-Preserving Multikeyword Ranked Search over Encrypted Cloud Data," Proc. IEEE INFOCOM, 2011.
  • H. Hu, J. Xu, C. Ren, and B. Choi, "Processing Private Queries over Untrusted Data Cloud through Privacy Homomorphism," Proc. IEEE 27th Int'l Conf. Data Eng. (ICDE), 2011.
  • E. Christal Joy, K. Indira, " Multi keyword Ranked Search over Encrypted Cloud Data", International Journal of Applied Engineering Research, Vol. 9, No. 20, pp 7149-7176, 2014.
  • J. Yu, P. Lu, Y. Zhu, G. Xue, M. Li, " Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data", IEEE Transactions on Dependable and Secure Computing, vol. 10, No. 4, July 2013.
  • Raghavendra S, Geeta C M, Rajkumar Buyya, Venugopal K R, S S Iyengar, and L M Patnaik, MSIGT: Most Significant Index Generation Technique for Cloud Environment, Proceedings of the 2015 Annual IEEE India Conference (INDICON 2015), Delhi, India, Dec. 17-20, 2015.
  • V. Arora, S.S. Tyagi, " Analysis of Symmetric Searchable Encryption Over Encrypted Cloud Data", International Journal of Computer Applications (0975-8887), vol. 127, no. 12, pp 46-51, October 2015.
  • A. Singhal, "Modern Information Retrieval: A Brief Overview," IEEE Data Eng. Bull., vol. 24, no. 4, pp. 35-43, 2001.
  • C.D. Manning, P. Raghavan, H. Schutze," An Introduction to Information Retrieval", Cambridge University Press, Online edition ©, 2009 Cambridge UP.
  • S. L. Pallickara, S. Pallickara, and M. Zupanski, "Towards Efficient Data Search and Subsetting of Large-Scale Atmospheric Datasets," Future Generation Computer Systems, vol. 28, no. 1, pp. 112–118, 2012.
  • R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient constructions, "Proc. 13th conf. computer and communication security (CCS), 2006.
  • A. Boldyreva, N. Chenette, Y. Lee, A. Neill, " Order Preserving Symmetric Encryption", Advances in Cryptology- CRYPTO 2011, 31st Annual International Cryptography Conference, LNCS, Springer, 2011.
  • L. Xiao, I. Yen, "Security Analysis for Order Preserving Encryption Schemes", IEEE, 2012.
  • D. Dubin, "The Most Influential Paper Gerard Salton Never Wrote," Library Trends, vol. 52, no. 4, pp. 748-764, 2004.
  • M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully Homomorphic Encryption over the Integers," Proc. 29th Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques, H. Gilbert, pp. 24-43, 2010.
  • Z. Xia, X. Wang, X. Sun, Q. Wang, " A Secure and Dynamic Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data", IEEE transaction on Parallel and Distributed Systems Vol: pp No:99,2015.
  • "NSF Research Awards Abstracts 1990-2003," http://kdd.ics.uci. edu/databases/nsfabs/nsfawards.html, 2013.
Еще
Статья научная