Skip to main content

A Study on Searchable Encryption System against Chosen-Ciphertext Attack

  • Conference paper
Ubiquitous Information Technologies and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 280))

  • 1436 Accesses

Abstract

The cloud computing service with which they may outsource the data storage and process them with various terminals at any time any where is getting vitalized as the network and computing technology develops. Especially, DaaS(Database as a Service) is widely used out of cloud computing services. However, it needs to encrypt the database stored in outsourcing storage because there is a security problem that the database stored in the server could be read by hackers and unethical server administrator without prior consent of the owner if the individual’s sensitive information such as its physical information is stored without being encrypted in the database. However, entrusting the data storage makes no sense if the owner has to search the data by decrypting them after downloading all encrypted data into his terminals in order to search his data in safe with the existing encryption algorithm. A Searchable Encryption System has currently been appeared in order to solve such a problem. But, the existing searchable encryption system has the same typed trapdoors which are created to search the same keywords because numerous search queries are transmitted to the entrusted storage center and the administrator of the center shall be able to analogize the keywords and learn which data the user stores and search through such queries. Thus, this paper proposes a Searchable Encryption System using the one time trapdoor which prevents the unethical server administrator from analogizing the contents of search and data through search queries by creating the different trapdoor whenever the same user searches the same keywords.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryp-tion with Keyword Search. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland (May 2004)

    Google Scholar 

  2. Boneh, D., Waters, B.: Conjunctive, Subset and Range Queries on Encrypted Data. In: Proceedings of the 4th Theory of Cryptography Conference, Amsterdam, Netherlands (Febraury 2007)

    Google Scholar 

  3. Hwang, Y.H., Lee, P.J.: Public key encryption with conjunctive key-word search and its extension to a multi-user system. In: Proceeding of First International Conference on Pairing-Based Cryptography, Tokyo, Japan (July 2007)

    Google Scholar 

  4. Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private Query on Encrypted Data in Multi-User Settings. In: Proceeding of the 4th International Conference on Information Security Practice and Experience, Sydney, Australia (April 2008)

    Google Scholar 

  5. Kamara, S., Lauter, K.: Cryptographic cloud-storage. In: Proceedings of Workshops on Financial Cryptography and Data Security, Canary Islands, Spain (January 2010)

    Google Scholar 

  6. Ion, M., Russello, G., Crispo, B.: Enforcing Multi-user Access Policies to Encrypted Cloud Databases. In: International Symposium on Policies for Distributed Systems and Networks, Trento, Italy (June 2011)

    Google Scholar 

  7. Zhang, B., Zhang, F.: An efficient public key encryption with conjunctive-subset keywords search. Journal of Network and Computer Applications 34(1) (2011)

    Google Scholar 

  8. Yang, Y.: Towards Multi-user Private Keyword Search for Cloud Computing. In: Proceeding of International Conference on Cloud Computing, Singapore (July 2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sun-Ho Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, SH., Ryou, JC., Lee, IY. (2014). A Study on Searchable Encryption System against Chosen-Ciphertext Attack. In: Jeong, YS., Park, YH., Hsu, CH., Park, J. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 280. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41671-2_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41671-2_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41670-5

  • Online ISBN: 978-3-642-41671-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics