1,323 Hits in 2.9 sec


Instead of giving the server one trapdoor for each keyword in the conjunction set, we use a bilinear map per a set of combined keywords to make them regarded as one keyword.  ...  Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keyword Searches (CKS) schemes improve system usability by retrieving the matched documents.  ...  Outline of the Conjunctive Keyword Searchable Encryption [11].  ... 
doi:10.24297/ijct.v15i14.834 fatcat:2zkbg5fmnzealbmyxaf6r52pwy

Searching Techniques over Encrypted Cloud Data

Azza A., Shereen Saleh, Passent Elkafrawy
2019 International Journal of Computer Applications  
In this paper a comparison between different kinds searchable encryption techniques according to the features of multiple keyword, amount of scale data, search complexity, accuracy, and, amount of storage  ...  This study focuses on different searching techniques over the encrypted data in cloud.  ...  Conjunctive Keyword Search The goal of a conjunctive keyword search (CKS) is to enable the user to ask a conjunctive keyword query to the server, so that the server can test which encrypted data contains  ... 
doi:10.5120/ijca2019918676 fatcat:xhtgrgaqbnhqllebjady6xddiy

A study on searchable encryption schemes

Sunitha Buchade, P.R. Devale
2018 International Journal of Engineering & Technology  
This article concentrates on study of various resil-ient keyword search schemes in area of Cloud SE.  ...  In this paper we summarize and analyze various available keyword searchable schemes based on query expressiveness and query correct-ness.  ...  Conclusion We presented a study of important SE schemes using keyword search with their approach for query expressiveness.  ... 
doi:10.14419/ijet.v7i2.10995 fatcat:jkbeqssiyvfcbcksttcsjb5hce

A Comparative Study of Homomorphic and Searchable Encryption Schemes for Cloud Computing [article]

B.T. Prasanna, C.B. Akki
2015 arXiv   pre-print
This paper focuses on Searchable and Homomorphic Encryption methods. Finally, a comparative study of these two efficient cloud cryptographic methods has been carried out and given here.  ...  Cloud computing is a popular distributed network and utility model based technology.  ...  Table 5 : 5 Public Key Searchable Encryption Schemes Schemes (Year) Keyword Search Type Based on Performance Measured through Boneh (2004) Conjunctive keyword Bilinear map, Identity  ... 
arXiv:1505.03263v1 fatcat:6lugnvheqnepfecz2j6mbjqoyu

Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee

Bing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou
2015 2015 IEEE Conference on Computer Communications (INFOCOM)  
Our scheme features a probabilistic trapdoor generation algorithm and protects the search pattern. In addition, our scheme supports conjunctive multi-keyword search.  ...  Additionally, conjunctive multi-keyword search, which is the most common form of query nowadays, is not supported in those works.  ...  Our scheme also hides the number of keywords in the query. Additionally, our scheme supports multi-keywords conjunctive search.  ... 
doi:10.1109/infocom.2015.7218594 dblp:conf/infocom/WangSLH15 fatcat:y4rmdua4jvephlchhdxnydr27e

A New Public Key Encryption with Conjunctive Field Keyword Search Scheme

M. -S. Hwang, S. -T. Hsu, C. -C. Lee
2014 Information Technology and Control  
The scheme that searching over the encrypted data, which is also named conjunctive keyword searchable scheme, enables one to search the encrypted data by using conjunctive keywords.  ...  According to the existing conjunctive keyword searchable schemes and the assumption that Golle et al. proposed, there are two types: the fixed keyword field scheme and the variable keyword field scheme  ...  Our Contributions In this paper, we study the literatures that search the encrypted data with conjunctive keywords and the security definitions for a conjunctive keyword searchable scheme.  ... 
doi:10.5755/j01.itc.43.3.6429 fatcat:ztdxhc2mlrggriut5yy36idwey

The Research and Outlook for Keyword-Based Searchable Encryption in Cloud Storage

Liang Hu, Tengfei Li, Yan Li, Jianfeng Chu, Hongtu Li, Hongying Han
2015 Journal of Communications  
The main purpose of this paper is to research the SE based on keywords in cloud storage. Firstly, we introduce the research background and the current development of SE schemes.  ...  The search process of SE is as follows: A user sends to the server a secret token, the token could be a transformation of the queried keywords; then the server searches the encrypted data according to  ...  Yong Ho Hwang et al. study the problem of a Public Key Encryption with Conjunctive Keyword search (PECK) and further extend PECK to multi-user environment, which called a multi-user PECK. [25] A multi-user  ... 
doi:10.12720/jcm.10.10.766-772 fatcat:n7w4sknts5bt7by3ym65p4eu5e

Secure searchable encryption: a survey

Yunling Wang, Jianfeng Wang, Xiaofeng Chen
2016 Journal of Communications and Information Networks  
The two main branches of SE are SSE (Searchable Symmetric Encryption) and PEKS (Public key Encryption with Keyword Search ).  ...  SE (Searchable Encryption) is a positive way to protect users sensitive data, while preserving search ability on the server side.  ...  Secure searchable encryption: a survey Conjunctive keyword search Park, et al.  ... 
doi:10.1007/bf03391580 fatcat:johbnuqs6vf5nkjlemgm5rdiva

Fuzzy Based Implementation of Multi - Keyword Ranked Search over Encrypted Cloud Data in Secure Cloud Environment

Gladiss Merlin. N
2017 International Journal of Scientific Research and Management  
The works on searchable encryption focused on single keyword search or Boolean keyword search and the result produced by them are rarely sorted.  ...  This method establishes a set of strict privacy requirements for such a secure cloud data utilization system through MRSE.  ...  Departing from many previous works that focused on queries consisting of a single keyword, we consider the case of queries consisting of arbitrary Boolean expressions on keywords, that is to say conjunctions  ... 
doi:10.18535/ijsrm/v5i12.06 fatcat:zqne5kvarzdw7pgeizjwbztmpm

Applying Multi Property Tree for Multi Keyword Rank Searching and Dynamic Update in Cloud

2019 International journal of recent technology and engineering  
On the basis of MPT data structure the authors have introduced a search scheme called MPTsearch algorithm. Experiments show that the proposed scheme performs better than linear search.  ...  Various types of data structures are used for keyword searching like binary tee, KBB tree, inverted tree, inverted index, Multi Property Tree (MPT).  ...  The authors studied the problem of a PECK (public key encryption with conjunctive keyword) searching.  ... 
doi:10.35940/ijrte.b1100.0982s1019 fatcat:cw7zq4av2bbjbjk6kozxiyuqpu

A Survey of Provably Secure Searchable Encryption

Christoph Bösch, Pieter Hartel, Willem Jonker, Andreas Peter
2014 ACM Computing Surveys  
The first M/S scheme is due to Boneh et al. [2004b] , who proposed a public key encryption with keyword search (PEKS) scheme. Meanwhile, PEKS is also used as a name for the class of M/S schemes.  ...  We survey the notion of provably secure searchable encryption (SE) by giving a complete and comprehensive overview of the two main SE techniques: searchable symmetric encryption (SSE) and public key encryption  ...  Park et al. [2004] (PKL) study the problem of public key encryption with conjunctive field keyword search (PECKS).  ... 
doi:10.1145/2636328 fatcat:3ho3qfcufjhopgigvlvh7qwkem

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds [chapter]

Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray
2014 Lecture Notes in Computer Science  
We propose two progressively refined privacy-preserving conjunctive symmetric searchable encryption (PCSSE) schemes that allow cloud servers to perform conjunctive keyword searches on encrypted documents  ...  It is also able to hide the number of keywords in a query as well as the number of keywords contained in an encrypted document.  ...  The existing exact keyword searchable encryption schemes are not suitable for a conjunctive search.  ... 
doi:10.1007/978-3-662-43936-4_5 fatcat:ekweupjwpvch5hdzgassk6nasu

Public Key Encryption with Keyword Search in Cloud: A Survey

Yunhong Zhou, Na Li, Yanmei Tian, Dezhi An, Licheng Wang
2020 Entropy  
Public key encryption with keyword search (PEKS) has received a lot of attention as an important branch.  ...  To address this issue, searchable encryption is a novel cryptographic primitive that enables user to search queries over encrypted data stored on an untrusted server while guaranteeing the privacy of the  ...  [45] proposed a generic PEKS construction supporting conjunctive keyword from an anonymous IBE scheme and a hierarchical IBE scheme.  ... 
doi:10.3390/e22040421 pmid:33286195 pmcid:PMC7516898 fatcat:qovvzpdonnbd5bswb7j7q5igiq

iPEKS: Fast and Secure Cloud Data Retrieval from the Public-Key Encryption with Keyword Search

Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin
2013 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  
However, given a large number of data (or searchable keywords) would be tested sequentially in these PEKS schemes, previous search results should be employed to improve the efficiency of future searches  ...  In recent years, considerable concern has arisen over the security of the data stored in the cloud. A number of studies have suggested the use of cryptographic primitives to protect the data.  ...  [11] further provided a hidden-vector scheme (HVE) supporting the conjunctions of equality, subset and range predicates [12] .  ... 
doi:10.1109/trustcom.2013.57 dblp:conf/trustcom/TsengCL13 fatcat:wrdoo2kymnfa7gtesnnczh3yai

Semantic search over encrypted data

Tarik Moataz, Abdullatif Shikfa, Nora Cuppens-Boulahia, Frederic Cuppens
2013 ICT 2013  
Searchable encryption is a promising primitive in the context of outsourced data storage and in particular cloud computing.  ...  We study the state of the art in stemming algorithms and in searchable encryption and propose the first semantic symmetric searchable encryption constructions.  ...  SEARCHABLE SYMMETRIC ENCRYPTION We already mentioned in section I-A that there are several searchable encryption schemes in the literature.  ... 
doi:10.1109/ictel.2013.6632121 dblp:conf/ict/MoatazSCC13 fatcat:bj3ehelsg5bc7izsyrg36e2g7a
« Previous Showing results 1 — 15 out of 1,323 results