One Time Trapdoor based Searchable Encryption

被引:2
|
作者
Kaushik, Kulvaibhav [1 ]
Varadharajan, Vijayaraghavan [2 ]
机构
[1] Infosys Ltd, Jaipur, Rajasthan, India
[2] Infosys Ltd, Bengaluru, India
来源
2017 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2017) | 2017年
关键词
Searchable Encryption; Trapdoor; Bilinear Pairing; Elliptical curve Cryptography; Cloud computing;
D O I
10.1109/IC2E.2017.25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data outsourcing has emerged as an effective solution to handle huge volume of data, with low costs, robustness and support for efficient analytics. But it also raises concern on data privacy. To overcome the privacy issue, data is stored in an encrypted format. However encryption makes search over the protected data convoluted. The need of the hour is to provide an efficient method for data storage and search over protected data at remote provider without compromising with security. In keyword based search, each data item is associated with a set of keywords over which the search is performed. For a search, user supplies keywords to the owner to get a corresponding trapdoor to be searched over the provider. But the trapdoor is vulnerable to online/offline keyword guessing attack. This paper proposes one time trapdoor scheme, where new trapdoors are generated every time for searching keywords, eliminates the risk of online and offline keyword guessing attack. The data encryption and trapdoor generation is based on the non-polynomial hard problem of bilinear pairing and discrete logarithm. We have considered health care data stored in hierarchical structure as a case study but the scheme holds good for other pattern of storage as well.
引用
收藏
页码:167 / 174
页数:8
相关论文
共 50 条
  • [31] On The Impossibility of Basing Identity Based Encryption on Trapdoor Permutations
    Boneh, Dan
    Papakonstantinou, Periklis A.
    Rackoff, Charles
    Vahlis, Yevgeniy
    Waters, Brent
    PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, : 283 - +
  • [32] Searchable encryption : A survey
    Sharma, Dhruti
    INFORMATION SECURITY JOURNAL, 2023, 32 (02): : 76 - 119
  • [33] Searchable Encryption Schemes
    Premasathian, Nol
    Choto, Somsak
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 147 - 150
  • [34] Decryptable searchable encryption
    Fuhr, Thomas
    Paillier, Pascal
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 228 - 236
  • [35] Survey on the searchable encryption
    Jia, Chun-Fu
    Liu, Zhe-Li
    Li, Jin
    Li, Min
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (01): : 109 - 128
  • [36] A pairing-free certificateless authenticated searchable encryption with multi-trapdoor indistinguishability (MTP-IND) guarantees
    Mohammed Raouf Senouci
    Abdelkader Senouci
    Fagen Li
    Telecommunication Systems, 2024, 85 : 443 - 460
  • [37] A pairing-free certificateless authenticated searchable encryption with multi-trapdoor indistinguishability (MTP-IND) guarantees
    Senouci, Mohammed Raouf
    Senouci, Abdelkader
    Li, Fagen
    TELECOMMUNICATION SYSTEMS, 2024, 85 (03) : 443 - 460
  • [38] Ranked searchable encryption based on differential privacy and blockchain
    Xu, Chungen
    Zhang, Pan
    Mei, Lin
    Zhao, Yu
    Xu, Lei
    WIRELESS NETWORKS, 2024, 30 (06) : 4735 - 4748
  • [39] Searchable Encryption of Image based on Secret Sharing Scheme
    Kamal, Ahmad Akmal Aminuddin Mohd
    Iwamura, Keiichi
    Kang, Hyunho
    2017 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC 2017), 2017, : 1495 - 1503
  • [40] Verifiable Dynamic Searchable Symmetric Encryption Based on Blockchain
    Xu W.-S.
    Zhang J.-B.
    Yuan Y.-L.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (11): : 5392 - 5407