Secure conjunctive keyword search over encrypted data

被引:463
|
作者
Golle, P
Staddon, J
Waters, B
机构
[1] Xerox Corp, Palo Alto Res Ctr, Palo Alto, CA 94304 USA
[2] Princeton Univ, Princeton, NJ 08544 USA
关键词
searching on encrypted data;
D O I
10.1007/978-3-540-24852-1_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents. Work in this area has largely focused on search criteria consisting of a single keyword. If the user is actually interested in documents containing each of several keywords (conjunctive keyword search) the user must either give the server capabilities for each of the keywords individually and rely on an intersection calculation (by either the server or the user) to determine the correct set of documents, or alternatively, the user may store additional information on the server to facilitate such searches. Neither solution is desirable; the former enables the server to learn which documents match each individual keyword of the conjunctive search and the latter results in exponential storage if the user allows for searches on every set of keywords. We define a security model for conjunctive keyword search over encrypted data and present the first schemes for conducting such searches securely. We propose first a scheme for which the communication cost is linear in the number of documents, but that cost can be incurred "offline" before the conjunctive query is asked. The security of this scheme relies on the Decisional Diffie-Hellman (DDH) assumption. We propose a second scheme whose communication cost is on the order of the number of keyword fields and whose security relies on a new hardness assumption.
引用
收藏
页码:31 / 45
页数:15
相关论文
共 50 条
  • [21] Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things
    Zhang, Yinghui
    Wu, Axin
    Zhang, Tiantian
    Zheng, Dong
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 413 - 421
  • [22] Dynamic secure multi-keyword ranked search over encrypted cloud data
    Hozhabr, Maryam
    Asghari, Parvaneh
    Javadi, Hamid Haj Seyyed
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [23] VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel
    Miao, Yinbin
    Ma, Jianfeng
    Wei, Fushan
    Liu, Zhiquan
    Wang, Xu An
    Lu, Cunbo
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (04) : 995 - 1007
  • [24] VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel
    Yinbin Miao
    Jianfeng Ma
    Fushan Wei
    Zhiquan Liu
    Xu An Wang
    Cunbo Lu
    Peer-to-Peer Networking and Applications, 2017, 10 : 995 - 1007
  • [25] Efficient Keyword Search over Encrypted Cloud Data
    Meharwade, Anuradha
    Patil, G. A.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 139 - 145
  • [26] Secure multi-keyword ranked search over encrypted cloud data for multiple data owners
    Guo, Ziqing
    Zhang, Hua
    Sun, Caijun
    Wen, Qiaoyan
    Li, Wenmin
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 380 - 395
  • [27] Approach to keyword search over encrypted data in cloud
    Zhang, Peng
    Li, Yan
    Lin, Hai-Lun
    Yang, Rong
    Liu, Qing-Yun
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 147 - 153
  • [28] Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing
    Garima Verma
    Soumen Kanrar
    Wireless Personal Communications, 2024, 134 : 975 - 996
  • [29] Secure and Efficient Multi-keyword Fuzzy Search Over Encrypted Data on Alliance Chain
    Song, Jimeng
    Shen, Ziqi
    Yu, Han
    Lai, Rongxin
    Li, Yuancheng
    Wang, Qingle
    Li, Jianbin
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2024, 17 (07) : 652 - 665
  • [30] Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing
    Verma, Garima
    Kanrar, Soumen
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (02) : 975 - 996