Skip to main content

A System of Shareable Keyword Search on Encrypted Data

  • Conference paper
  • First Online:
Network and System Security (NSS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9955))

Included in the following conference series:

  • 1433 Accesses

Abstract

Nowadays the cloud security becomes a significant issue: while the single user keyword search on encrypted data has been proposed, encrypting files before uploading scarifies the advantage of the convenience of sharing data with others on the cloud.

We design a searchable encryption for the multi-user case. We combine the advantage of efficiency of the symmetric encryption with authentication of the asymmetric encryption to provide a secure and efficient system of shareable keyword search on encrypted data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: A new general framework for secure public key encryption with keyword search. In: Foo, E., Stebila, D. (eds.) ACISP 2015. LNCS, vol. 9144, pp. 59–76. Springer, Heidelberg (2015). doi:10.1007/978-3-319-19962-7_4

    Chapter  Google Scholar 

  2. Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). doi:10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  3. Gu, C., Zheng, Y., Kang, F., Xin, D.: Keyword search over encrypted data in cloud computing from lattices in the standard model. In: Qiang, W., Zheng, X., Hsu, C.-H. (eds.) CloudCom-Asia 2015. LNCS, vol. 9106, pp. 335–343. Springer, Heidelberg (2015). doi:10.1007/978-3-319-28430-9_25

    Chapter  Google Scholar 

  4. Li, J., Jia, C., Li, J., Liu, Z.: A novel framework for outsourcing and sharing searchable encrypted data on hybrid cloud. In: 2012 4th International Conference Intelligent Networking and Collaborative Systems (INCoS) (2012)

    Google Scholar 

  5. Li, J., Li, J., Liu, Z., Jia, C.: Enabling efficient and secure data sharing in cloud computing. Concurrency Comput. Pract. Exp. 26, 1052–1066 (2013)

    Article  Google Scholar 

  6. Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM 2010. IEEE Press (2010)

    Google Scholar 

  7. Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31–45. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Amir, R.: Efficient Common Prefix Search on Encrypted Data as an Additional Service on the Top of the Storage Providers (2013)

    Google Scholar 

  9. Rezapour, A., Chen, S.-T., Sun, H.-M.: Efficient common prefix search on encrypted data as an additional service on the top of the storage providers. In: 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), pp. 975–981 (2015)

    Google Scholar 

  10. Zittrower, S., Zou, C.C.: Encrypted phrase searching in the cloud. In: Global Communications Conference (GLOBECOM). IEEE (2012)

    Google Scholar 

  11. Song, X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy (2000)

    Google Scholar 

  12. Zhang, Y., Jia, Z., Wang, S.: A multi-user searchable symmetric encryption scheme for cloud storage system. In: 2013 5th International Conference Intelligent Networking and Collaborative Systems (INCoS) (2013)

    Google Scholar 

  13. Zhao, Y., Chen, X.F., Ma, H., et al.: A new trapdoor-indistinguishable public key encryption with keyword search. J. Wireless Mobile Netw. (2012)

    Google Scholar 

  14. Liu, Z., Wang, Z., Cheng, X., Jia, C., Yuan, K.: Multi-user searchable encryption with coarser-grained access control in hybrid cloud. In: 2013 4th International Conference on Emerging Intelligent Data and Web Technologies (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hung-Min Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Lu, WT., Wu, W., Lin, SY., Tseng, MC., Sun, HM. (2016). A System of Shareable Keyword Search on Encrypted Data. In: Chen, J., Piuri, V., Su, C., Yung, M. (eds) Network and System Security. NSS 2016. Lecture Notes in Computer Science(), vol 9955. Springer, Cham. https://doi.org/10.1007/978-3-319-46298-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46298-1_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46297-4

  • Online ISBN: 978-3-319-46298-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics