Analysis of some keyword search schemes in encrypted data

Ik Rae Jeong, Jeong Ok Kwon

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

With remote storage systems, a user may store his data in the encrypted form at the remote storage server to preserve confidentiality. Later, the user wants to receive his data securely through an untrusted network. The user does not want to receive all of the stored data but the data related to specific words, to reduce the communication overload in the network. In this case, we need secure and efficient keyword search schemes over the encrypted data. In the paper, we show that the keyword search schemes suggested by Byun et al. and Ballard et al. do not provide semantic security which is the most important security requirement for the keyword search schemes.

Original languageEnglish
Pages (from-to)213-215
Number of pages3
JournalIEEE Communications Letters
Volume12
Issue number3
DOIs
Publication statusPublished - 2008 Mar

Keywords

  • Communication
  • Confi-dentiality
  • Keyword search
  • Remote storage system

ASJC Scopus subject areas

  • Modelling and Simulation
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Analysis of some keyword search schemes in encrypted data'. Together they form a unique fingerprint.

  • Cite this