Secure conjunctive keyword search over encrypted data

被引:463
|
作者
Golle, P
Staddon, J
Waters, B
机构
[1] Xerox Corp, Palo Alto Res Ctr, Palo Alto, CA 94304 USA
[2] Princeton Univ, Princeton, NJ 08544 USA
关键词
searching on encrypted data;
D O I
10.1007/978-3-540-24852-1_3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the setting in which a user stores encrypted documents (e.g. e-mails) on an untrusted server. In order to retrieve documents satisfying a certain search criterion, the user gives the server a capability that allows the server to identify exactly those documents. Work in this area has largely focused on search criteria consisting of a single keyword. If the user is actually interested in documents containing each of several keywords (conjunctive keyword search) the user must either give the server capabilities for each of the keywords individually and rely on an intersection calculation (by either the server or the user) to determine the correct set of documents, or alternatively, the user may store additional information on the server to facilitate such searches. Neither solution is desirable; the former enables the server to learn which documents match each individual keyword of the conjunctive search and the latter results in exponential storage if the user allows for searches on every set of keywords. We define a security model for conjunctive keyword search over encrypted data and present the first schemes for conducting such searches securely. We propose first a scheme for which the communication cost is linear in the number of documents, but that cost can be incurred "offline" before the conjunctive query is asked. The security of this scheme relies on the Decisional Diffie-Hellman (DDH) assumption. We propose a second scheme whose communication cost is on the order of the number of keyword fields and whose security relies on a new hardness assumption.
引用
收藏
页码:31 / 45
页数:15
相关论文
共 50 条
  • [1] Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners
    Yin, Hui
    Qin, Zheng
    Zhang, Jixin
    Ou, Lu
    Li, Fangmin
    Li, Keqin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 689 - 700
  • [2] Secure Ranked Keyword Search over Encrypted Cloud Data
    Wang, Cong
    Cao, Ning
    Li, Jin
    Ren, Kui
    Lou, Wenjing
    2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2010, 2010,
  • [3] POSTER: Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data
    Zhang, Yu
    Lu, Songfeng
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1535 - 1537
  • [4] Common secure index for conjunctive keyword-based retrieval over encrypted data
    Wang, Peishun
    Wang, Huaxiong
    Pieprzyk, Josef
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2007, 4721 : 108 - +
  • [5] Secure Multi-Keyword Search Over Encrypted Outsourced Data
    Anukrishna, P. R.
    Paul, Vince
    International Journal of Computer Science and Network Security, 2016, 16 (11): : 86 - 89
  • [6] Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing
    Nie, Kai
    Wang, Yunling
    Tao, Xiaoling
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (06) : 707 - 718
  • [7] Efficient conjunctive keyword search on encrypted data storage system
    Lyun, Jin Wook
    Lee, Dong Hoon
    Lim, Jongin
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2006, 4043 : 184 - 196
  • [8] An efficient, secure and verifiable conjunctive keyword search scheme based on rank metric codes over encrypted outsourced cloud data
    Yousefipoor, Vahid
    Eghlidos, Taraneh
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [9] On a security model of conjunctive keyword search over encrypted relational database
    Byun, Jin Wook
    Lee, Dong Hoon
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (08) : 1364 - 1372
  • [10] Efficient conjunctive keyword search over encrypted electronic medical records
    Zhang L.-L.
    Zhang Y.-Q.
    Liu X.-F.
    Quan H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1577 - 1591