Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage

被引:31
作者
Salam, Md Iftekhar [1 ]
Yau, Wei-Chuen [2 ]
Chin, Ji-Jian [2 ]
Heng, Swee-Huay [3 ]
Ling, Huo-Chong [4 ]
Phan, Raphael C-W [2 ]
Sen Poh, Geong [5 ]
Tan, Syh-Yuan [3 ]
Yap, Wun-She [6 ]
机构
[1] Queensland Univ Technol, Informat Secur Inst, Brisbane, Qld 4001, Australia
[2] Multimedia Univ, Fac Engn, Cyberjaya, Selangor, Malaysia
[3] Multimedia Univ, Fac Informat Sci & Technol, Melaka, Malaysia
[4] Curtin Univ, Fac Sci & Engn, Miri, Sarawak, Malaysia
[5] Univ Malaysia Comp Sci & Engn, Putrajaya, Malaysia
[6] Univ Tunku Abdul Rahman, Lee Kong Chian Fac Engn & Sci, Sungai Long, Selangor, Malaysia
关键词
Searchable encryption; Data confidentiality; Cloud storage; Keyword search; PUBLIC-KEY ENCRYPTION; SECURITY;
D O I
10.1186/s13673-015-0039-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the stored data can be managed by encrypting the data at the client side before outsourcing it to the remote cloud storage server. However, once the data is encrypted, it will limit server's capability for keyword search since the data is encrypted and server simply cannot make a plaintext keyword search on encrypted data. But again we need the keyword search functionality for efficient retrieval of data. To maintain user's data confidentiality, the keyword search functionality should be able to perform over encrypted cloud data and additionally it should not leak any information about the searched keyword or the retrieved document. This is known as privacy preserving keyword search. This paper aims to study privacy preserving keyword search over encrypted cloud data. Also, we present our implementation of a privacy preserving data storage and retrieval system in cloud computing. For our implementation, we have chosen one of the symmetric key primitives due to its efficiency in mobile environments. The implemented scheme enables a user to store data securely in the cloud by encrypting it before outsourcing and also provides user capability to search over the encrypted data without revealing any information about the data or the query.
引用
收藏
页数:16
相关论文
共 19 条
[1]  
Adya A, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P1
[2]  
[Anonymous], 2003, CRYPTOLOGY EPRINT AR
[3]  
Benaloh Josh., 2009, P 2009 ACM WORKSHOP, P103, DOI DOI 10.1145/1655008.1655024
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[6]  
Chang YC, 2005, LECT NOTES COMPUT SC, V3531, P442
[7]  
Curtmola Reza, 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180417
[8]  
Hacigumus H., 2002, P 2002 ACM SIGMOD IN, P216, DOI DOI 10.1145/564691.564717
[9]  
Kamara S, 2010, LECT NOTES COMPUT SC, V6054, P136, DOI 10.1007/978-3-642-14992-4_13
[10]  
Kubiatowicz J, 2000, ACM SIGPLAN NOTICES, V35, P190, DOI 10.1145/384264.379239