Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

3-Multi ranked encryption with enhanced security in cloud computingopen access

Authors
Kim, YeEunSon, JunggabParizi, Reza M.Srivastava, GautamOh, Heekuck
Issue Date
Apr-2023
Publisher
Elsevier | Chongqing University of Posts and Telecommunications
Keywords
Searchable encryption; Multi-keyword search; Multiple data owners; users; Ranked search; Enhanced security
Citation
Digital Communications and Networks, v.9, no.2, pp 313 - 326
Pages
14
Indexed
SCIE
SCOPUS
Journal Title
Digital Communications and Networks
Volume
9
Number
2
Start Page
313
End Page
326
URI
https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/113112
DOI
10.1016/j.dcan.2022.05.021
ISSN
2468-5925
2352-8648
Abstract
Searchable Encryption (SE) enables data owners to search remotely stored ciphertexts selectively. A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users, and even return the top-k most relevant search results when requested. We refer to a model that satisfies all of the conditions a 3-multi ranked search model. However, SE schemes that have been proposed to date use fully trusted trapdoor generation centers, and several methods assume a secure connection between the data users and a trapdoor generation center. That is, they assume the trapdoor generation center is the only entity that can learn the information regarding queried keywords, but it will never attempt to use it in any other manner than that requested, which is impractical in real life. In this study, to enhance the security, we propose a new 3- multi ranked SE scheme that satisfies all conditions without these security assumptions. The proposed scheme uses randomized keywords to protect the interested keywords of users from both outside adversaries and the honest-but-curious trapdoor generation center, thereby preventing attackers from determining whether two different queries include the same keyword. Moreover, we develop a method for managing multiple encrypted keywords from every data owner, each encrypted with a different key. Our evaluation demonstrates that, despite the trade-off overhead that results from the weaker security assumption, the proposed scheme achieves reason- able performance compared to extant schemes, which implies that our scheme is practical and closest to real life.
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Oh, Hee kuck photo

Oh, Hee kuck
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE