Abstract
With the advent of the era of cloud computing technology, the security and search efficiency of ciphertext retrieval have has become the focus of research. However, in the traditional encryption schemes, most of them only solve the problem of defending against external keyword guessing attacks. We tend to ignore malicious third party cloud server provider, which sometimes tries to guess the user’s ciphertext information through the trapdoor or keywords. For the sake of improving the security of ciphertext, an inside keyword attack scheme on the basis of inverted index is proposed. Firstly, When building inverted indexes, the private key of the data owner is added to protect against the attack of malicious server. Secondly, an efficient public key ciphertext search scheme of parallel encryption index structure is introduced to realize the parallel search task of keywords. Compared with the traditional public-key searchable encryption, our scheme not only improves the search efficiency but also improves the security of the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, pp. 44–55. IEEE (2000)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30
Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75–83. Springer, Heidelberg (2006). https://doi.org/10.1007/11844662_6
Rhee, H.S., Park, J.H., Susilo, W.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)
Wang, B., Song, W., Lou, W., Hou, Y.T.: Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2092–2100. IEEE (2015)
Yanguo, P., Jiangtao, C., Changgen, P., Zuobin, Y.: Certificateless public key encryption with keyword search. China Commun. 11(11), 100–113 (2015)
Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403, 1–14 (2017)
Wang, C.H., Tu, T.Y.: Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J. Shanghai Jiaotong Univ. (Sci.) 19(4), 440–442 (2014)
Fang, L., Susilo, W., Ge, C., Wang, J.: Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci. 238, 221–241 (2013)
Yau, W.C., Heng, S.H., Goi, B.M.: Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds.) ATC 2008. LNCS, vol. 5060, pp. 100–105. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-69295-9_10
Sun, L., Xu, C., Zhang, M., Chen, K., Li, H.: Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci. China Inf. Sci. 61(3), 038106:1–038106:3 (2018)
Zhang, R., Xue, R., Yu, T., Liu, L.: Dynamic and efficient private keyword search over inverted index–based encrypted data. ACM Trans. Internet Technol. 16(3), 21 (2016)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, pp. 44–55. IEEE (2000)
Lynn, B.: PBC Library. https://crypto.stanford.edu/pbc/
Xu, P., Tang, X., Wang, W., Jin, H., Yang, L.T.: Fast and parallel keyword search over public-key ciphertexts for cloud-assisted IoT. IEEE Access 5, 24775–24784 (2017)
Wang, B., Song, W., Lou, W., Hou, Y.T.: Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2092–2100. IEEE (2015)
Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 11(4), 789–798 (2015)
Saito, T., Nakanishi, T.: Designated-senders public-key searchable encryption secure against keyword guessing attacks. In: 2017 Fifth International Symposium on Computing and Networking (CANDAR), pp. 496–502. IEEE (2017)
Xu, P., Wu, Q., Wang, W., Susilo, W., Domingo-Ferrer, J., Jin, H.: Generating searchable public-key ciphertexts with hidden structures for fast keyword search. IEEE Trans. Inf. Forensics Secur. 10(9), 1993–2006 (2015)
Ding, S., Li, Y., Zhang, J., Chen, L., Wang, Z., Xu, Q.: An efficient and privacy-preserving ranked fuzzy keywords search over encrypted cloud data. In: 2016 International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), pp. 1–6. IEEE (2016)
Du, M., Wang, Q., He, M., Weng, J.: Privacy-preserving indexing and query processing for secure dynamic cloud storage. IEEE Trans. Inf. Forensics Secur. 13(9), 2320–2332 (2018)
Shao, Z.Y., Yang, B.: On security against the server in designated tester public key encryption with keyword search. Formation Process. Lett. 115(12), 957–961 (2015)
Acknowledgment
This work is supported by the National Natural Science Foundation of China (61762008) and the Natural Science Foundation Project of Guangxi (2016GXNSFAA 380115).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, C., Chen, N., Huang, R., Xie, Y. (2019). A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks. In: Sun, Y., Lu, T., Yu, Z., Fan, H., Gao, L. (eds) Computer Supported Cooperative Work and Social Computing. ChineseCSCW 2019. Communications in Computer and Information Science, vol 1042. Springer, Singapore. https://doi.org/10.1007/978-981-15-1377-0_4
Download citation
DOI: https://doi.org/10.1007/978-981-15-1377-0_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1376-3
Online ISBN: 978-981-15-1377-0
eBook Packages: Computer ScienceComputer Science (R0)