3-Multi ranked encryption with enhanced security in cloud computing
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, YeEun | - |
dc.contributor.author | Son, Junggab | - |
dc.contributor.author | Parizi, Reza M. | - |
dc.contributor.author | Srivastava, Gautam | - |
dc.contributor.author | Oh, Heekuck | - |
dc.date.accessioned | 2023-07-05T05:38:53Z | - |
dc.date.available | 2023-07-05T05:38:53Z | - |
dc.date.issued | 2023-04 | - |
dc.identifier.issn | 2468-5925 | - |
dc.identifier.issn | 2352-8648 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/113112 | - |
dc.description.abstract | Searchable Encryption (SE) enables data owners to search remotely stored ciphertexts selectively. A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users, and even return the top-k most relevant search results when requested. We refer to a model that satisfies all of the conditions a 3-multi ranked search model. However, SE schemes that have been proposed to date use fully trusted trapdoor generation centers, and several methods assume a secure connection between the data users and a trapdoor generation center. That is, they assume the trapdoor generation center is the only entity that can learn the information regarding queried keywords, but it will never attempt to use it in any other manner than that requested, which is impractical in real life. In this study, to enhance the security, we propose a new 3- multi ranked SE scheme that satisfies all conditions without these security assumptions. The proposed scheme uses randomized keywords to protect the interested keywords of users from both outside adversaries and the honest-but-curious trapdoor generation center, thereby preventing attackers from determining whether two different queries include the same keyword. Moreover, we develop a method for managing multiple encrypted keywords from every data owner, each encrypted with a different key. Our evaluation demonstrates that, despite the trade-off overhead that results from the weaker security assumption, the proposed scheme achieves reason- able performance compared to extant schemes, which implies that our scheme is practical and closest to real life. | - |
dc.format.extent | 14 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Elsevier | Chongqing University of Posts and Telecommunications | - |
dc.title | 3-Multi ranked encryption with enhanced security in cloud computing | - |
dc.type | Article | - |
dc.publisher.location | 중국 | - |
dc.identifier.doi | 10.1016/j.dcan.2022.05.021 | - |
dc.identifier.scopusid | 2-s2.0-85152453674 | - |
dc.identifier.wosid | 000995820500001 | - |
dc.identifier.bibliographicCitation | Digital Communications and Networks, v.9, no.2, pp 313 - 326 | - |
dc.citation.title | Digital Communications and Networks | - |
dc.citation.volume | 9 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 313 | - |
dc.citation.endPage | 326 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | PUBLIC-KEY ENCRYPTION | - |
dc.subject.keywordPlus | KEYWORD SEARCH | - |
dc.subject.keywordAuthor | Searchable encryption | - |
dc.subject.keywordAuthor | Multi-keyword search | - |
dc.subject.keywordAuthor | Multiple data owners | - |
dc.subject.keywordAuthor | users | - |
dc.subject.keywordAuthor | Ranked search | - |
dc.subject.keywordAuthor | Enhanced security | - |
dc.identifier.url | https://www.sciencedirect.com/science/article/pii/S2352864822001146 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.