A Partial-Filename Search Mechanism for Encrypted Filenames in a P2P Network

被引:1
作者
Chiou, Shin-Yan [1 ,2 ,3 ]
机构
[1] Chang Gung Univ, Coll Engn, Dept Elect Engn, Taoyuan 333, Taiwan
[2] Linkou Chang Gung Mem Hosp, Dept Nucl Med, Taoyuan, Taiwan
[3] Keelung Chang Gung Mem Hosp, Dept Neurosurg, Keelung, Taiwan
关键词
encrypted filename search; partial filename search; P2P; security; confidentiality; QUERY AUTHENTICATION; KEYWORD SEARCH; EFFICIENT; SERVICE;
D O I
10.6688/JISE.202409_40(5).0012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The efficiency and accuracy of data search, storage, confidentiality and security of P2P systems is a serious concern. Previous studies have proposed using a partial filename search function which allows the user to input a partial filename to search for associated filenames on the remote system. However, if the file name is encrypted for enhanced security, this search function is ineffective. This paper proposes a search mechanism for encrypted filenames. In the case of filename encryption, the proposed method can also achieve a partial filename search function while maintaining filename confidentiality. The proposed system was implemented on an Android smartphone to simulate encrypted filename search. To the best of our knowledge, this is the first work done on partial-filename search for encrypted filenames.
引用
收藏
页码:1115 / 1138
页数:24
相关论文
共 40 条
  • [1] Bellare M., 1993, P 1 ACM C COMP COMM, P62
  • [2] Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 222 - 233
  • [3] Efficient and Scalable Query Authentication for Cloud-Based Storage Systems with Multiple Data Sources
    Chandrasekhar, Santosh
    Singhal, Mukesh
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (04) : 520 - 533
  • [4] User Differentiated Verifiable File Search on the Cloud
    Chen, Fei
    Xiang, Tao
    Fu, Xinwen
    Yu, Wei
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (06) : 948 - 961
  • [5] Chen F, 2014, IEEE CONF COMM NETW, P346, DOI 10.1109/CNS.2014.6997503
  • [6] A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA
    Chenam, Venkata Bhikshapathi
    Ali, Syed Taqi
    [J]. COMPUTER STANDARDS & INTERFACES, 2022, 81
  • [7] A Real-Time, Automated and Privacy-Preserving Mobile Emergency-Medical-Service Network for Informing the Closest Rescuer to Rapidly Support Mobile-Emergency-Call Victims
    Chiou, Shin-Yan
    Liao, Zhen-Yuan
    [J]. IEEE ACCESS, 2018, 6 : 35787 - 35800
  • [8] Daemen J., 2002, ISC, V196
  • [9] Diffie W., 1997, IEEE Computer Society Technical Committee on Security and Privacy, V76, P72
  • [10] Doulkeridis C., 2008, LSDS IR 08, P35