An Encryption Scheme with Hidden Keyword Search for Outsourced Database

An encryption scheme with hidden keyword search is proposed for Outsourced Database. In the proposed scheme, both pseudorandom function and polynomial function are employed in order to reduce computation and shortage overhead. The proposed scheme can not only provide controlled searching, and hidden searching as well as the provable secrecy for encryption, but also support the dynamic change of the permitted group users and be transparent to user when the users are added and removed since they are not involved in the process. Moreover, there is no interaction between database owner and server, server and user or database owner and user when the decrypted key is set up. Each user is only required to receive messages to setup their decrypted key and hence can query over encrypted data and decrypt the encrypted data. Therefore, the proposed scheme is more efficient and more practical for outsourced database.

[1]  Jeroen Doumen,et al.  Using Secret Sharing for Searching in Encrypted Data , 2004, Secure Data Management.

[2]  Bo Zhang,et al.  An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..

[3]  Qiang Tang,et al.  Revisit the Concept of PEKS: Problems and a Possible Solution , 2008 .

[4]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[5]  Pil Joong Lee,et al.  Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System , 2007, Pairing.

[6]  Shuai Liu,et al.  Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing , 2008, 2008 New Technologies, Mobility and Security.

[7]  Sushil Jajodia,et al.  Metadata Management in Outsourced Encrypted Databases , 2005, Secure Data Management.

[8]  Brent Waters,et al.  Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.

[9]  Jan Camenisch,et al.  Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data , 2009, Public Key Cryptography.

[10]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[11]  Dong Hoon Lee,et al.  Trapdoor security in a searchable public-key encryption scheme with a designated tester , 2010, J. Syst. Softw..

[12]  Alberto Ceselli,et al.  Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.

[13]  Sushil Jajodia,et al.  Over-encryption: Management of Access Control Evolution on Outsourced Data , 2007, VLDB.

[14]  Dong Hoon Lee,et al.  Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data , 2006, Secure Data Management.

[15]  Peishun Wang,et al.  Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups , 2008, CANS.