Analysis of some keyword search schemes in encrypted data

ik rae Jeong, Jeong O. Kwon

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

With remote storage systems, a user may store his data in the encrypted form at the remote storage server to preserve confidentiality. Later, the user wants to receive his data securely through an untrusted network. The user does not want to receive all of the stored data but the data related to specific words, to reduce the communication overload in the network. In this case, we need secure and efficient keyword search schemes over the encrypted data. In the paper, we show that the keyword search schemes suggested by Byun et al. and Ballard et al. do not provide semantic security which is the most important security requirement for the keyword search schemes.

Original languageEnglish
Pages (from-to)213-215
Number of pages3
JournalIEEE Communications Letters
Volume12
Issue number3
DOIs
Publication statusPublished - 2008 Mar 1

Fingerprint

Keyword Search
Servers
Semantics
Communication
Semantic Security
Confidentiality
Storage System
Overload
Server
Requirements

Keywords

  • Communication
  • Confi-dentiality
  • Keyword search
  • Remote storage system

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Analysis of some keyword search schemes in encrypted data. / Jeong, ik rae; Kwon, Jeong O.

In: IEEE Communications Letters, Vol. 12, No. 3, 01.03.2008, p. 213-215.

Research output: Contribution to journalArticle

@article{de58c91ddafc4c9c8c4455cacd9e8c93,
title = "Analysis of some keyword search schemes in encrypted data",
abstract = "With remote storage systems, a user may store his data in the encrypted form at the remote storage server to preserve confidentiality. Later, the user wants to receive his data securely through an untrusted network. The user does not want to receive all of the stored data but the data related to specific words, to reduce the communication overload in the network. In this case, we need secure and efficient keyword search schemes over the encrypted data. In the paper, we show that the keyword search schemes suggested by Byun et al. and Ballard et al. do not provide semantic security which is the most important security requirement for the keyword search schemes.",
keywords = "Communication, Confi-dentiality, Keyword search, Remote storage system",
author = "Jeong, {ik rae} and Kwon, {Jeong O.}",
year = "2008",
month = "3",
day = "1",
doi = "10.1109/LCOMM.2008.071610",
language = "English",
volume = "12",
pages = "213--215",
journal = "IEEE Communications Letters",
issn = "1089-7798",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "3",

}

TY - JOUR

T1 - Analysis of some keyword search schemes in encrypted data

AU - Jeong, ik rae

AU - Kwon, Jeong O.

PY - 2008/3/1

Y1 - 2008/3/1

N2 - With remote storage systems, a user may store his data in the encrypted form at the remote storage server to preserve confidentiality. Later, the user wants to receive his data securely through an untrusted network. The user does not want to receive all of the stored data but the data related to specific words, to reduce the communication overload in the network. In this case, we need secure and efficient keyword search schemes over the encrypted data. In the paper, we show that the keyword search schemes suggested by Byun et al. and Ballard et al. do not provide semantic security which is the most important security requirement for the keyword search schemes.

AB - With remote storage systems, a user may store his data in the encrypted form at the remote storage server to preserve confidentiality. Later, the user wants to receive his data securely through an untrusted network. The user does not want to receive all of the stored data but the data related to specific words, to reduce the communication overload in the network. In this case, we need secure and efficient keyword search schemes over the encrypted data. In the paper, we show that the keyword search schemes suggested by Byun et al. and Ballard et al. do not provide semantic security which is the most important security requirement for the keyword search schemes.

KW - Communication

KW - Confi-dentiality

KW - Keyword search

KW - Remote storage system

UR - http://www.scopus.com/inward/record.url?scp=41849099663&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=41849099663&partnerID=8YFLogxK

U2 - 10.1109/LCOMM.2008.071610

DO - 10.1109/LCOMM.2008.071610

M3 - Article

VL - 12

SP - 213

EP - 215

JO - IEEE Communications Letters

JF - IEEE Communications Letters

SN - 1089-7798

IS - 3

ER -