Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

3-Multi ranked encryption with enhanced security in cloud computing

Full metadata record
DC Field Value Language
dc.contributor.authorKim, YeEun-
dc.contributor.authorSon, Junggab-
dc.contributor.authorParizi, Reza M.-
dc.contributor.authorSrivastava, Gautam-
dc.contributor.authorOh, Heekuck-
dc.date.accessioned2023-07-05T05:38:53Z-
dc.date.available2023-07-05T05:38:53Z-
dc.date.issued2023-04-
dc.identifier.issn2468-5925-
dc.identifier.issn2352-8648-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/113112-
dc.description.abstractSearchable Encryption (SE) enables data owners to search remotely stored ciphertexts selectively. A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users, and even return the top-k most relevant search results when requested. We refer to a model that satisfies all of the conditions a 3-multi ranked search model. However, SE schemes that have been proposed to date use fully trusted trapdoor generation centers, and several methods assume a secure connection between the data users and a trapdoor generation center. That is, they assume the trapdoor generation center is the only entity that can learn the information regarding queried keywords, but it will never attempt to use it in any other manner than that requested, which is impractical in real life. In this study, to enhance the security, we propose a new 3- multi ranked SE scheme that satisfies all conditions without these security assumptions. The proposed scheme uses randomized keywords to protect the interested keywords of users from both outside adversaries and the honest-but-curious trapdoor generation center, thereby preventing attackers from determining whether two different queries include the same keyword. Moreover, we develop a method for managing multiple encrypted keywords from every data owner, each encrypted with a different key. Our evaluation demonstrates that, despite the trade-off overhead that results from the weaker security assumption, the proposed scheme achieves reason- able performance compared to extant schemes, which implies that our scheme is practical and closest to real life.-
dc.format.extent14-
dc.language영어-
dc.language.isoENG-
dc.publisherElsevier | Chongqing University of Posts and Telecommunications-
dc.title3-Multi ranked encryption with enhanced security in cloud computing-
dc.typeArticle-
dc.publisher.location중국-
dc.identifier.doi10.1016/j.dcan.2022.05.021-
dc.identifier.scopusid2-s2.0-85152453674-
dc.identifier.wosid000995820500001-
dc.identifier.bibliographicCitationDigital Communications and Networks, v.9, no.2, pp 313 - 326-
dc.citation.titleDigital Communications and Networks-
dc.citation.volume9-
dc.citation.number2-
dc.citation.startPage313-
dc.citation.endPage326-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusPUBLIC-KEY ENCRYPTION-
dc.subject.keywordPlusKEYWORD SEARCH-
dc.subject.keywordAuthorSearchable encryption-
dc.subject.keywordAuthorMulti-keyword search-
dc.subject.keywordAuthorMultiple data owners-
dc.subject.keywordAuthorusers-
dc.subject.keywordAuthorRanked search-
dc.subject.keywordAuthorEnhanced security-
dc.identifier.urlhttps://www.sciencedirect.com/science/article/pii/S2352864822001146-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Oh, Hee kuck photo

Oh, Hee kuck
ERICA 소프트웨어융합대학 (ERICA 컴퓨터학부)
Read more

Altmetrics

Total Views & Downloads

BROWSE