3-Multi ranked encryption with enhanced security in cloud computingopen access
- Authors
- Kim, YeEun; Son, Junggab; Parizi, Reza M.; Srivastava, Gautam; Oh, Heekuck
- Issue Date
- Apr-2023
- Publisher
- Elsevier | Chongqing University of Posts and Telecommunications
- Keywords
- Searchable encryption; Multi-keyword search; Multiple data owners; users; Ranked search; Enhanced security
- Citation
- Digital Communications and Networks, v.9, no.2, pp 313 - 326
- Pages
- 14
- Indexed
- SCIE
SCOPUS
- Journal Title
- Digital Communications and Networks
- Volume
- 9
- Number
- 2
- Start Page
- 313
- End Page
- 326
- URI
- https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/113112
- DOI
- 10.1016/j.dcan.2022.05.021
- ISSN
- 2468-5925
2352-8648
- Abstract
- Searchable Encryption (SE) enables data owners to search remotely stored ciphertexts selectively. A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users, and even return the top-k most relevant search results when requested. We refer to a model that satisfies all of the conditions a 3-multi ranked search model. However, SE schemes that have been proposed to date use fully trusted trapdoor generation centers, and several methods assume a secure connection between the data users and a trapdoor generation center. That is, they assume the trapdoor generation center is the only entity that can learn the information regarding queried keywords, but it will never attempt to use it in any other manner than that requested, which is impractical in real life. In this study, to enhance the security, we propose a new 3- multi ranked SE scheme that satisfies all conditions without these security assumptions. The proposed scheme uses randomized keywords to protect the interested keywords of users from both outside adversaries and the honest-but-curious trapdoor generation center, thereby preventing attackers from determining whether two different queries include the same keyword. Moreover, we develop a method for managing multiple encrypted keywords from every data owner, each encrypted with a different key. Our evaluation demonstrates that, despite the trade-off overhead that results from the weaker security assumption, the proposed scheme achieves reason- able performance compared to extant schemes, which implies that our scheme is practical and closest to real life.
- Files in This Item
-
Go to Link
- Appears in
Collections - COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.