Abstract
With the growing popularity of cloud computing, cloud storage service becomes an essential part of cloud services and numerous researches have been widely studied in recent years. Recently, Hsu et al. proposed an ElGamal-based simple keyword search scheme over encrypted data in cloud storage services. They claimed that a secure cloud storage service needs to achieve five security requirements, including: consistency, ciphertext indistinguishability, trapdoor indistinguishability, outside keyword guessing attack and inside keyword guessing attacks. However, in this paper, we observe that Hsu et al.’s scheme not only cannot prevent inside keyword guessing attack but also cannot prevent denial of service attack and has low efficiency problem in computing algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249–1259. Springer, Heidelberg (2008)
Baliga, J., Ayre, R.W.A., Hinton, K., Tucker, R.S.: Green cloud computing: Balancing energy in processing, storage, and transport. Proc. of the IEEE 99, 149–167 (2011)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75–83. Springer, Heidelberg (2006)
Cao, N., Yang, Z., Wang, C., Ren, K., Lou, W.: Privacy-preserving query over encrypted graph-structured data in cloud computing. In: IEEE International Conference on Distributed Computing Systems, pp. 393-402 (2011)
Cheng, Z.Y., Liu, Y., Chang, C.C., Chang, S.C.: A smart card based authentication scheme for remote user login and verification. International Journal of Innovative Computing, Information and Control 8(8), 5499–5511 (2012)
Hsu, S.T., Yang, C.C., Hwang, M.S.: A study of public key encryption with keyword search. International Journal of Network Security 15(2), 71–79 (2013)
Hsu, S.T., Hwang, M.S., Yang, C.C.: A study of keyword search over encrypted data in cloud storage service. Master Thesis of National Chung Hsing University, Department of Management Information System (2013)
Hu, C., Liu, P.: A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension. In: Lin, S., Huang, X. (eds.) CSEE 2011, Part II. CCIS, vol. 215, pp. 131–136. Springer, Heidelberg (2011)
Iosup, A., Ostermann, S., Yigitbasi, M.N., Prodan, R., Fahringer, T., Epema, D.H.J.: Performance analysis of cloud computing services for many-tasks scientific computing. IEEE Transactions on Parallel and Distributed Systems 22(6), 931–945 (2011)
Lee, C.C., Chung, P.S., Hwang, M.S.: A survey on attribute-based encryption schemes of access control in cloud environments. International Journal of Network Security 15(4), 231–240 (2013)
Li, X., Qiu, W., Zheng, D., Chen, K., Li, J.: Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics 57(2), 793–800 (2010)
Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, pp. 376–379 (2009)
Rhee, H.S., Park, J.H., Susilo, W., Kee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. The Journal of Systems and Software 83(5), 763–771 (2010)
Rajkumar, B., Yeo, C., Venugopal, S., Malpani, S.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 25(6), 599–616 (2009)
Ranchal, R., Othmane, L.B., Kim, A., Kang, M., Linderman, M.: Protection of identity information in cloud computing without trusted third party. In: IEEE International Symposium on Reliable Distributed Systems, pp. 368–372 (2010)
Tserpes, K., Aisopos, F., Kyriazis, D., Varvarigou, T.: Service selection decision support in the Internet of services. In: Altmann, J., Rana, O.F. (eds.) GECON 2010. LNCS, vol. 6296, pp. 16–33. Springer, Heidelberg (2010)
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems 22(5), 847–859 (2011)
Yoon, E.J., Kim, S.H., Yoo, K.Y.: A security enhanced remote user authentication scheme using smart cards. International Journal of Innovative Computing, Information and Control 8(5(B)), 3661–3675 (2012)
Yoon, E.J., Choi, S.B., Yoo, K.Y.: A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices. International Journal of Innovative Computing, Information and Control 8(4), 2637–2653 (2012)
Yoon, E.J., Yoo, K.Y.: Improving the Lee-Lee’s password based authenticated key agreement protocol. International Journal of Innovative Computing, Information and Control 8(8), 5657–5675 (2012)
Zhao, Y., Chen, X., Ma, H., Tang, Q., Zhu, H.: A new trapdoor-indistinguishable public key encryption with keyword search. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 3(1/2), 72–81 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Li, CT., Shen, JJ., Lee, CW. (2014). Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services. In: Hsu, R.CH., Wang, S. (eds) Internet of Vehicles – Technologies and Services. IOV 2014. Lecture Notes in Computer Science, vol 8662. Springer, Cham. https://doi.org/10.1007/978-3-319-11167-4_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-11167-4_36
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11166-7
Online ISBN: 978-3-319-11167-4
eBook Packages: Computer ScienceComputer Science (R0)