Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,002 Hits in 3.4 sec

SERVER-AIDED PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH

N Gireesh, M Sreedevi
unpublished
Index Terms-Public key encryption with keyword search, server-aided, off-line keyword guessing attack.  ...  In this work, we provide a practical and applicable treatment on this security vulnerability by formalizing a new PEKS system named Server-Aided Public Key Encryption with Keyword Search (SA-PEKS).  ...  We formalize a new PEKS system named Server-Aided Public Key Encryption with Keyword Search (SA-PEKS) to address the security vulnerability against (inside) offline KGA in existing PEKS systems.  ... 
fatcat:srix6z2ujvbo3j4k2vh7mbou5y

Efficient Verifiable Key-Aggregate Keyword Searchable Encryption for Data Sharing in Outsourcing Storage

Xuqi Wang, Xiangguo Cheng
2019 IEEE Access  
In this scheme, the data owner distributes only one aggregate key to users for keyword search, decryption and verification, who can use the aggregate key to generate a single trapdoor for keyword search  ...  In a secure data sharing system, users can selectively retrieve encrypted files by performing keyword search over the ciphertext of data.  ...  If the file set S only contains one file, it is a practical public key encryption with keyword search scheme. VI.  ... 
doi:10.1109/access.2019.2961169 fatcat:i2ufole3xnc3pixgwna5rwyjra

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation [chapter]

Shuhui Hou, Ryoichi Sasaki, Tetsutaro Uehara, Siuming Yiu
2013 Lecture Notes in Computer Science  
By using encrypted keyword(s) to search over encrypted data, they realized that the investigator can collect the necessary evidence while the private data of irrelevant users can be protected from disclosing  ...  With the rapid development of cloud computing services, it is common to have a large server shared by many different users.  ...  encrypted keyword(s) to the administrator; (2) with the investigator's public key, the administrator encrypts all the data files stored on the server.  ... 
doi:10.1007/978-3-642-36818-9_33 fatcat:uskroasi3jaw3frneb642atsbm

Efficient Encrypted Keyword Search for Multi-user Data Sharing [chapter]

Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang
2016 Lecture Notes in Computer Science  
Specifically, a data owner outsources a set of encrypted files to an untrusted server, shares it with a set of users, and a user is allowed to search keywords in a subset of files that he is authorized  ...  In this paper, we provide a secure and e cient encrypted keyword search scheme for multi-user data sharing.  ...  the server to search for the (encrypted) keyword in documents encrypted with di↵erent keys.  ... 
doi:10.1007/978-3-319-45744-4_9 fatcat:avp27dlzvng6fbgebluxfah6xm

Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation

Shuhui Hou, Ryôichi Sasaki, Tetsutaro Uehara, Siu-Ming Yiu
2013 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
encrypted keyword E pI (w∗ ) as well as his public key pI ; on server side, the administrator encrypts all the documents {W 1 , W 2 , . . ., W L } with the public key pI , where the resulting documents  ...  ; (2) with the investigator’s public key, the administrator encrypts all the data files stored on the server.  ... 
doi:10.22667/jowua.2013.06.31.104 dblp:journals/jowua/HouSUY13 fatcat:7zw2jggwandsrfytzc2cgtszz4

Illustration on Secure and Efficient Multi-keyword Ranked Search on Encrypted Cloud Data

Sai Anusha Kancharla
2018 International Journal for Research in Applied Science and Engineering Technology  
There are so many techniques proposed to perform efficient search on the encrypted data in the cloud and out of them the ranked multi-keyword search have acquired more attention.  ...  In this paper, we propose a model where an efficient search is performed on the encrypted information stored in the cloud by providing the ranks to the keywords.  ...  Two keys are generated in this encryption mechanism one is the public key and the other is private key.  ... 
doi:10.22214/ijraset.2018.4608 fatcat:fyqtjb3w35fitmxd42sahw4dgq

Aiding Effective Encrypted Document Manipulation Incorporated with Document Categorization Technique in Cloud

Samantha Susan Mathew, C.A. Hafsath
2015 Procedia Computer Science  
The homomorphic encryption technique is used for the building of a secure index which has the key role in the search process.  ...  An efficient keyword based search on the encrypted cloud data is proposed here which provides marked improvement over the traditional boolean search approach used in cloud environment.  ...  A method called Public Key Encryption with keyword Search (PEKS) 2 is proposed by D. Boneh, which handles the issue of searching in encrypted data.  ... 
doi:10.1016/j.procs.2015.02.120 fatcat:awtcnbjplrd4bn4ljlhhfmso4m

Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage

Yuan Zhang, Chunxiang Xu, Jianbing Ni, Hongwei Li, Xuemin Sherman Shen
2019 IEEE Transactions on Cloud Computing  
Index Terms-Cloud storage, public-key encryption with keyword search, keyword guessing attacks, key renewal, blockchain.  ...  Generally, if users conventionally encrypt the data, searching is impeded. Public-key encryption with keyword search (PEKS) resolves this tension.  ...  ACKNOWLEDGEMENT This work is supported by in part by the National Key R&D Program of China under Grant 2017YFB0802000 and Grant 2017YFB0802300, in part by the National Natural Science Foundation of China  ... 
doi:10.1109/tcc.2019.2923222 fatcat:rsgnhhhnhvcf5in5ir7t7f2aya

Trapdoor Privacy in Public Key Encryption with Keyword Search: A Review

Koon-Ming Chan, Swee-Huay Heng, Wei-Chuen Yau, Shing-Chiang Tan
2022 IEEE Access  
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting.  ...  A keyword guessing attack (KGA) allows the attacker to successfully guess the correct keyword encrypted in a searchable ciphertext and trapdoor.  ...  .: Trapdoor Privacy in Public Key Encryption with Keyword Search: A Review TABLE 1 . 1 Abbreviation for PEKS Name Server-Aided Public Key Encryption with Keyword SearchSA-PEKS Public Key Authenticated  ... 
doi:10.1109/access.2022.3151429 fatcat:2gblkvolrnagde4e4yc6vatwxy

Multiuser Searchable Encryption with Token Freshness Verification

Dhruti Sharma, Devesh C. Jinwala
2017 Security and Communication Networks  
In such scheme, a user possessing search key constructs search token at any time and consequently requests the server to search over encrypted data.  ...  A Multiuser Searchable Encryption (MUSE) can be defined with the notion of Functional Encryption (FE) where a user constructs a search token from a search key issued by an Enterprise Trusted Authority  ...  The first public key Searchable Encryption scheme is given by Boneh et al. [6] wherein a user with his private key can search over data encrypted with the corresponding public key.  ... 
doi:10.1155/2017/6435138 fatcat:2hypzuxb3nettgyubmamoue6ji

Efficient Multi-User and Multi-Keyword Ranked Search Scheme for Encrypted Cloud Data

Pradeepa D
2020 International Journal of Advanced Trends in Computer Science and Engineering  
To allow the cloud servers to perform a search without understanding any statistics, to assemble a novel search and efficient technique based totally on the encrypted cloud statistics the usage of the  ...  To obtain an efficient search, for every statistics person, a tree-based totally index encrypted with an additive order and secure characteristic is constructed.  ...  First, the searchable encryption schemes need to aid multi-keyword search, and provide the equal user experience as looking in Google search with exceptional keywords; single-keyword search is some distance  ... 
doi:10.30534/ijatcse/2020/65932020 fatcat:ttluytxzj5drzcp4pttptj2664

Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation

Masahiro Kamimura, Naoto Yanai, Shingo Okamura, Jason Paul Cruz
2020 IEEE Access  
We first introduce our provably secure scheme, named first construction, with respect to encrypted files and aggregate keys in a single-server setting.  ...  The main construction guarantees the privacy of a search, encrypted files, and aggregate keys.  ...  [1,m 2 ] ): This algorithm is run by a cloud server to perform keyword search over an encrypted keyword.  ... 
doi:10.1109/access.2020.2967793 fatcat:nwsvvtctczgbpcjbgide5fupu4

Research on Encryption and Key Aggregate Searchable Decryption Methods for Data Storage in Cloud Securely

Akhila. H. Kumar, Et. al.
2021 Turkish Journal of Computer and Mathematics Education  
Now, not entirely the encryption keys but additionally, the search keys need for use, and customers ought to maintain their keys impervious and disbursed.  ...  The variation to cloud-sharing files for the person for an encryption key technique to be used for lots of documents.  ...  guessing attacks. public encryption key scheme(for inside key guessing assaults) and dual-server public-key authenticated encryption with keyword search (DPAEKS), explains a way to seek touchy information  ... 
doi:10.17762/turcomat.v12i10.5651 fatcat:zvwbzjrxgfbztc2xrvakq7io5i

Experiments in Encrypted and Searchable Network Audit Logs

Bhanu Prakash Gopularam, Sashank Dara, Nalini Niranjan
2015 2015 International Conference on Emerging Information Technology and Engineering Solutions  
In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs.  ...  Especially we consider the use case of privacy preserving search in network log audits.  ...  For each keyword wi, the server computes the CP-ABE encryption ci of string (F LAG|K) using search keyword as access policy and PK public key 2) The choice of symmetric encryption for data encryption is  ... 
doi:10.1109/eites.2015.13 fatcat:u7wh6lwhovbxpbyxthexbg5n3i

EFURMS: An Efficient Scheme for File Upload and Ranked Multi-Keyword Search over Encrypted Data in Cloud

Bhavya M, Thriveni J, Venugopal K R
2021 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
These techniques result in reducing the document upload time and speeding up the process of accessing data efficiently using multi-keyword search with top-'K' value.  ...  To protect data from leakage, the widely used technique is to encrypt the data before uploading into cloud storage servers.  ...  After receiving the access user gives a public key, and multiple keywords to the cloud server and sets the' k' value to get top 'k' search results.  ... 
doi:10.35940/ijitee.d8464.0210421 fatcat:nwtlnbev4rhahncxykd7jtmdgm
« Previous Showing results 1 — 15 out of 3,002 results