Skip to main content

Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8662))

Abstract

With the growing popularity of cloud computing, cloud storage service becomes an essential part of cloud services and numerous researches have been widely studied in recent years. Recently, Hsu et al. proposed an ElGamal-based simple keyword search scheme over encrypted data in cloud storage services. They claimed that a secure cloud storage service needs to achieve five security requirements, including: consistency, ciphertext indistinguishability, trapdoor indistinguishability, outside keyword guessing attack and inside keyword guessing attacks. However, in this paper, we observe that Hsu et al.’s scheme not only cannot prevent inside keyword guessing attack but also cannot prevent denial of service attack and has low efficiency problem in computing algorithms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249–1259. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. Baliga, J., Ayre, R.W.A., Hinton, K., Tucker, R.S.: Green cloud computing: Balancing energy in processing, storage, and transport. Proc. of the IEEE 99, 149–167 (2011)

    Article  Google Scholar 

  3. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petković, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75–83. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  5. Cao, N., Yang, Z., Wang, C., Ren, K., Lou, W.: Privacy-preserving query over encrypted graph-structured data in cloud computing. In: IEEE International Conference on Distributed Computing Systems, pp. 393-402 (2011)

    Google Scholar 

  6. Cheng, Z.Y., Liu, Y., Chang, C.C., Chang, S.C.: A smart card based authentication scheme for remote user login and verification. International Journal of Innovative Computing, Information and Control 8(8), 5499–5511 (2012)

    Google Scholar 

  7. Hsu, S.T., Yang, C.C., Hwang, M.S.: A study of public key encryption with keyword search. International Journal of Network Security 15(2), 71–79 (2013)

    Google Scholar 

  8. Hsu, S.T., Hwang, M.S., Yang, C.C.: A study of keyword search over encrypted data in cloud storage service. Master Thesis of National Chung Hsing University, Department of Management Information System (2013)

    Google Scholar 

  9. Hu, C., Liu, P.: A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension. In: Lin, S., Huang, X. (eds.) CSEE 2011, Part II. CCIS, vol. 215, pp. 131–136. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  10. Iosup, A., Ostermann, S., Yigitbasi, M.N., Prodan, R., Fahringer, T., Epema, D.H.J.: Performance analysis of cloud computing services for many-tasks scientific computing. IEEE Transactions on Parallel and Distributed Systems 22(6), 931–945 (2011)

    Article  Google Scholar 

  11. Lee, C.C., Chung, P.S., Hwang, M.S.: A survey on attribute-based encryption schemes of access control in cloud environments. International Journal of Network Security 15(4), 231–240 (2013)

    Google Scholar 

  12. Li, X., Qiu, W., Zheng, D., Chen, K., Li, J.: Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics 57(2), 793–800 (2010)

    Article  Google Scholar 

  13. Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, pp. 376–379 (2009)

    Google Scholar 

  14. Rhee, H.S., Park, J.H., Susilo, W., Kee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. The Journal of Systems and Software 83(5), 763–771 (2010)

    Article  Google Scholar 

  15. Rajkumar, B., Yeo, C., Venugopal, S., Malpani, S.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 25(6), 599–616 (2009)

    Article  Google Scholar 

  16. Ranchal, R., Othmane, L.B., Kim, A., Kang, M., Linderman, M.: Protection of identity information in cloud computing without trusted third party. In: IEEE International Symposium on Reliable Distributed Systems, pp. 368–372 (2010)

    Google Scholar 

  17. Tserpes, K., Aisopos, F., Kyriazis, D., Varvarigou, T.: Service selection decision support in the Internet of services. In: Altmann, J., Rana, O.F. (eds.) GECON 2010. LNCS, vol. 6296, pp. 16–33. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  18. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems 22(5), 847–859 (2011)

    Article  Google Scholar 

  19. Yoon, E.J., Kim, S.H., Yoo, K.Y.: A security enhanced remote user authentication scheme using smart cards. International Journal of Innovative Computing, Information and Control 8(5(B)), 3661–3675 (2012)

    Google Scholar 

  20. Yoon, E.J., Choi, S.B., Yoo, K.Y.: A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices. International Journal of Innovative Computing, Information and Control 8(4), 2637–2653 (2012)

    Google Scholar 

  21. Yoon, E.J., Yoo, K.Y.: Improving the Lee-Lee’s password based authenticated key agreement protocol. International Journal of Innovative Computing, Information and Control 8(8), 5657–5675 (2012)

    Google Scholar 

  22. Zhao, Y., Chen, X., Ma, H., Tang, Q., Zhu, H.: A new trapdoor-indistinguishable public key encryption with keyword search. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 3(1/2), 72–81 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, CT., Shen, JJ., Lee, CW. (2014). Security and Efficiency Analysis on a Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services. In: Hsu, R.CH., Wang, S. (eds) Internet of Vehicles – Technologies and Services. IOV 2014. Lecture Notes in Computer Science, vol 8662. Springer, Cham. https://doi.org/10.1007/978-3-319-11167-4_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11167-4_36

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11166-7

  • Online ISBN: 978-3-319-11167-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics