Anonymous Searchable Encryption Scheme for Multi-User Databases

被引:2
|
作者
Varadharajan, Vijayaraghavan [1 ]
Mani, Raghubansh [1 ]
Nallusamy, Rajarathnam [1 ]
机构
[1] Infosys Ltd, Infosys Labs, Convergence Lab, Bangalore 560100, Karnataka, India
关键词
Searchable Encryption; Discrete Log Problem; Multi-user; Proxy Encryption; PRIVATE INFORMATION-RETRIEVAL;
D O I
10.1109/IC2E.2013.30
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the ever advancing technology of fast information processing, protecting data with only access control mechanisms is becoming increasingly difficult. If someone breaks into a database, the entire data will be compromised if it is in plaintext form. One quick remedy is to keep the data in encrypted form. However, encryption will make it difficult to do any operations on the data. This has prompted considerable research in the last decade and has led to various schemes of searchable encryption. It allows search over the encrypted data. There are various techniques which support different levels of querying, making it suitable for variety of applications. However, almost all of them are either symmetric-key or single-user schemes or require key sharing. Here, we are proposing a new scheme which will allow multiple users to encrypt, store and decrypt their own data, along with support for doing data searches over all the data by other users.
引用
收藏
页码:225 / 232
页数:8
相关论文
共 50 条
  • [31] Fine-grained searchable encryption in multi-user setting
    Ye, Jun
    Wang, Jianfeng
    Zhao, Jiaolian
    Shen, Jian
    Li, Kuan-Ching
    SOFT COMPUTING, 2017, 21 (20) : 6201 - 6212
  • [32] Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants
    Chamani, Javad Ghareh
    Wang, Yun
    Papadopoulos, Dimitrios
    Zhang, Mingyang
    Jalili, Rasool
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) : 114 - 130
  • [33] Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage
    Liu, Xueqiao
    Yang, Guomin
    Mu, Yi
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1322 - 1332
  • [34] Improvement of Multi-user Searchable Encrypted Data Scheme
    Tran Thao Phuong
    Omote, Kazumasa
    Nguyen Gia Luyen
    Nguyen Dinh Thuc
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 396 - 401
  • [35] A Revocable Certificateless Encryption Scheme for Multi-User
    Mou, Yiming
    Deng, Lunzhi
    Ruan, Yu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2025, 37 (01):
  • [36] A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment
    Zhou, Yihua
    Tang, Bin
    Yang, Yuguang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [37] An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
    Rao, Deepthi
    Kumar, D. V. N. Siva
    Thilagam, P. Santhi
    2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
  • [38] Search Control in Multi-user Searchable Encryption without Shared keys
    Nair, Manju S.
    Rajasree, M. S.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON DATA SCIENCE & ENGINEERING (ICDSE), 2016, : 197 - 201
  • [39] Multi-User Collusion-Resistant Searchable Encryption for Cloud Storage
    Wang, Yun
    Papadopoulos, Dimitrios
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2993 - 3008
  • [40] Multi-User Searchable Encryption with Efficient Access Control for Cloud Storage
    Lv, Zhiquan
    Zhang, Min
    Feng, Dengguo
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 366 - 373