Skip to main content

Searchable Public Key Encryption Scheme with Data Integrity Checking

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 2))

Abstract

Searchable public key encryption allows data owners to store the encrypted data in the cloud server and the users can directly search over the encrypted data in the cloud server to obtain the desired data. However, in such situation, for example, in the process of network transmission, the data can be damaged due to the incorrect operation caused by the data owner or other unexpected circumstances, leading to serious consequences that the transmitted data is not consistent with the original data. Thus, the searchable public key encryption scheme with data integrity checking is necessary. In this paper, we implement the data integrity checking and further improve the security and integrity of the scheme. We first propose the concrete scheme and then analyze the security and the performance of the scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Feng DG, Zhang M, Zhang Y, Xu Z. Study on cloud computing security. Ruan Jian Xue Bao/Journal of Software, 2011, 22(1): 71−83 (in Chinese with English abstract)

    Google Scholar 

  2. Li JW, Jia CF, Liu ZL, Li J, Li M. Survey on the searchable encryption. Ruan Jian Xue Bao/Journal of Software, 2015, 26(1):109-128 (in Chinese).

    Google Scholar 

  3. Shen ZR, Xue W, Shu JW. Survey on the research and development of searchable encryption schemes. Ruan Jian Xue Bao/Journal of Software, 2014, 25(4):880−895 (in Chinese)

    Google Scholar 

  4. Ateniese G, Burns R C, Curtmola R, et al. Remote data checking using provable data possession[J]. ACM Transactions on Information and System Security (TISSEC), 2011, 14(1): 12

    Google Scholar 

  5. Song D, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proc. of the 2000 IEEE Symp. on Security and Privacy. Berkeley: IEEE Computer Society, 2000. 44−55

    Google Scholar 

  6. Shen ZR, Xue W, Shu JW. Survey on the research and development of searchable encryption schemes. Ruan Jian Xue Bao/Journal of Software, 2014, 25(4):880−895 (in Chinese).

    Google Scholar 

  7. Chang E C, Xu J. Remote Integrity Check with Dishonest Storage Server[C]//Computer Security-ESORICS 2008. Springer Berlin Heidelberg, 2008: 223-237.

    Google Scholar 

  8. Hao Z, Zhong S, Yu N. A Privacy - Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability [J]. Knowledge and Data Engineering, IEEE Transactions on, 2011, 23(9): 1432-1437

    Google Scholar 

  9. Boneh D, Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In: Proc. of the EUROCRYPT. Berlin, Heidelberg: Springer-Verlag, 2004. 506−522

    Google Scholar 

  10. Baek J, Safavi-Naini R, Susilo W. Public key encryption with keyword search revisited. In: Proc. of the Int’l Conf. on Computational Science and Its Applications. Berlin, Heidelberg: Springer-Verlag, 2008. 1249−1259

    Google Scholar 

  11. Cui, B.; Liu, Z.; Wang, L., “Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage,” in Computers, IEEE Transactions on, vol. PP, no.99, pp.1-1

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Yang, J., Li, S. (2017). Searchable Public Key Encryption Scheme with Data Integrity Checking. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49106-6_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49105-9

  • Online ISBN: 978-3-319-49106-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics