On a security model of conjunctive keyword search over encrypted relational database

被引:11
|
作者
Byun, Jin Wook [1 ]
Lee, Dong Hoon [2 ]
机构
[1] Pyeongtaek Univ, Dept Informat & Commun, Pyeongtek Si, Gyeongi Do, South Korea
[2] Korea Univ, Grad Sch Informat Management & Secur, Sungbuk Ku, Seoul 136701, South Korea
关键词
Privacy of database; Information retrieval; Conjunctive keyword search; Security model; PUBLIC-KEY ENCRYPTION;
D O I
10.1016/j.jss.2011.03.075
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We study a security model for searching documents containing each of several keywords (conjunctive keyword search) over encrypted documents. A conjunctive keyword search protocol consists of three entities: a data supplier, a storage system such as database, and a user of storage system. A data supplier uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing each of several keywords with a private trapdoor. That is, a valid user is able to use boolean combinations of queries. Up to now only few conjunctive keyword search schemes have been proposed in the literature. However, the relying security model has not been based on relational databases such as Oracle and MS-Access, hence it is not easy to apply them in practice. Moreover, they have not considered an important security notion for user's trapdoor queries. In this paper, we first formally define a security model for conjunctive keyword search schemes including trapdoor security based on a practical relational database. We apply our security model to the existing conjunctive keyword scheme and discuss its vulnerability and countermeasure. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:1364 / 1372
页数:9
相关论文
共 50 条
  • [1] Secure conjunctive keyword search over encrypted data
    Golle, P
    Staddon, J
    Waters, B
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2004, 3089 : 31 - 45
  • [2] Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database
    Wang, Jianfeng
    Chen, Xiaofeng
    Sun, Shi-Feng
    Liu, Joseph K.
    Au, Man Ho
    Zhan, Zhi-Hui
    [J]. COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 83 - 100
  • [3] POSTER: Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data
    Zhang, Yu
    Lu, Songfeng
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1535 - 1537
  • [4] Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing
    Nie, Kai
    Wang, Yunling
    Tao, Xiaoling
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (06) : 707 - 718
  • [5] Efficient conjunctive keyword search on encrypted data storage system
    Lyun, Jin Wook
    Lee, Dong Hoon
    Lim, Jongin
    [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2006, 4043 : 184 - 196
  • [6] Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data
    Xu, Chang
    Wang, Ruijuan
    Zhu, Liehuang
    Zhang, Chuan
    Lu, Rongxing
    Sharif, Kashif
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (03) : 805 - 817
  • [7] Conjunctive and Disjunctive Keyword Search over Encrypted Mobile Cloud Data in Public Key System
    Zhang, Yu
    Li, Yin
    Wang, Yifan
    [J]. MOBILE INFORMATION SYSTEMS, 2018, 2018
  • [8] Achieving efficient conjunctive keyword searches over encrypted data
    Ballard, L
    Kamara, S
    Monrose, F
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 414 - 426
  • [9] ITREKS: Keyword search over relational database by indexing Tuple relationship
    Zhan, Jiang
    Wang, Shan
    [J]. ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 67 - +
  • [10] Security analysis of secure kNN and ranked keyword search over encrypted data
    Wakaha Ogata
    Takaaki Otemori
    [J]. International Journal of Information Security, 2020, 19 : 419 - 425