A Partial-Filename Search Mechanism for Encrypted Filenames in a P2P Network

被引:1
作者
Chiou, Shin-Yan [1 ,2 ,3 ]
机构
[1] Chang Gung Univ, Coll Engn, Dept Elect Engn, Taoyuan 333, Taiwan
[2] Linkou Chang Gung Mem Hosp, Dept Nucl Med, Taoyuan, Taiwan
[3] Keelung Chang Gung Mem Hosp, Dept Neurosurg, Keelung, Taiwan
关键词
encrypted filename search; partial filename search; P2P; security; confidentiality; QUERY AUTHENTICATION; KEYWORD SEARCH; EFFICIENT; SERVICE;
D O I
10.6688/JISE.202409_40(5).0012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The efficiency and accuracy of data search, storage, confidentiality and security of P2P systems is a serious concern. Previous studies have proposed using a partial filename search function which allows the user to input a partial filename to search for associated filenames on the remote system. However, if the file name is encrypted for enhanced security, this search function is ineffective. This paper proposes a search mechanism for encrypted filenames. In the case of filename encryption, the proposed method can also achieve a partial filename search function while maintaining filename confidentiality. The proposed system was implemented on an Android smartphone to simulate encrypted filename search. To the best of our knowledge, this is the first work done on partial-filename search for encrypted filenames.
引用
收藏
页码:1115 / 1138
页数:24
相关论文
共 40 条
[21]   An efficient search mechanism for supporting partial filename queries in structured peer-to-peer overlay [J].
Lee, Guanling ;
Peng, Sheng-Lung ;
Chen, Yi-Chun ;
Huang, Jia-Sin .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2012, 5 (04) :340-349
[22]   A trust-based P2P resource search method integrating with Q-learning for future Internet [J].
Liu, Huan-lin ;
Chen, Gao-xiang ;
Chen, Yong ;
Chen, Qian-bin .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (03) :532-542
[23]   Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data [J].
Liu, Yaru ;
Yu, Jia ;
Yang, Ming ;
Hou, Wenqiang ;
Wang, Huaqun .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 128 :178-191
[24]  
Mittal SA, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P1187, DOI 10.1109/CCAA.2016.7813922
[25]   An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data [J].
Peng, Tianyue ;
Lin, Yaping ;
Yao, Xin ;
Zhang, Wei .
IEEE ACCESS, 2018, 6 :21924-21933
[26]   Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage [J].
Sun, Jin ;
Ren, Lili ;
Wang, Shangping ;
Yao, Xiaomin .
IEEE ACCESS, 2019, 7 :66655-66667
[27]   Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud [J].
Wang, Boyang ;
Li, Baochun ;
Li, Hui .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (01) :92-106
[28]   Identity-Based Distributed Provable Data Possession in Multicloud Storage [J].
Wang, Huaqun .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (02) :328-340
[29]   Verifiable Public Key Encryption With Keyword Search Based on Homomorphic Encryption in Multi-User Setting [J].
Wu, D. N. ;
Gan, Q. Q. ;
Wang, X. M. .
IEEE ACCESS, 2018, 6 :42445-42453
[30]   Novel Multi-Keyword Search on Encrypted Data in the Cloud [J].
Wu, Yunyun ;
Hou, Jingyu ;
Liu, Jing ;
Zhou, Wanlei ;
Yao, Shaowen .
IEEE ACCESS, 2019, 7 :31984-31996