On a security model of conjunctive keyword search over encrypted relational database

Jin Wook Byun, Dong Hoon Lee

Research output: Contribution to journalArticle

12 Citations (Scopus)

Abstract

Abstract: We study a security model for searching documents containing each of several keywords (conjunctive keyword search) over encrypted documents. A conjunctive keyword search protocol consists of three entities: a data supplier, a storage system such as database, and a user of storage system. A data supplier uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing each of several keywords with a private trapdoor. That is, a valid user is able to use boolean combinations of queries. Up to now only few conjunctive keyword search schemes have been proposed in the literature. However, the relying security model has not been based on relational databases such as Oracle and MS-Access, hence it is not easy to apply them in practice. Moreover, they have not considered an important security notion for user's trapdoor queries. In this paper, we first formally define a security model for conjunctive keyword search schemes including trapdoor security based on a practical relational database. We apply our security model to the existing conjunctive keyword scheme and discuss its vulnerability and countermeasure.

Original languageEnglish
Pages (from-to)1364-1372
Number of pages9
JournalJournal of Systems and Software
Volume84
Issue number8
DOIs
Publication statusPublished - 2011 Aug 1

Keywords

  • Conjunctive keyword search
  • Information retrieval
  • Privacy of database
  • Security model

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software
  • Information Systems

Cite this

On a security model of conjunctive keyword search over encrypted relational database. / Byun, Jin Wook; Lee, Dong Hoon.

In: Journal of Systems and Software, Vol. 84, No. 8, 01.08.2011, p. 1364-1372.

Research output: Contribution to journalArticle

@article{5c31494d98ec4cc8bcb0d6cdedd20d87,
title = "On a security model of conjunctive keyword search over encrypted relational database",
abstract = "Abstract: We study a security model for searching documents containing each of several keywords (conjunctive keyword search) over encrypted documents. A conjunctive keyword search protocol consists of three entities: a data supplier, a storage system such as database, and a user of storage system. A data supplier uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing each of several keywords with a private trapdoor. That is, a valid user is able to use boolean combinations of queries. Up to now only few conjunctive keyword search schemes have been proposed in the literature. However, the relying security model has not been based on relational databases such as Oracle and MS-Access, hence it is not easy to apply them in practice. Moreover, they have not considered an important security notion for user's trapdoor queries. In this paper, we first formally define a security model for conjunctive keyword search schemes including trapdoor security based on a practical relational database. We apply our security model to the existing conjunctive keyword scheme and discuss its vulnerability and countermeasure.",
keywords = "Conjunctive keyword search, Information retrieval, Privacy of database, Security model",
author = "Byun, {Jin Wook} and Lee, {Dong Hoon}",
year = "2011",
month = "8",
day = "1",
doi = "10.1016/j.jss.2011.03.075",
language = "English",
volume = "84",
pages = "1364--1372",
journal = "Journal of Systems and Software",
issn = "0164-1212",
publisher = "Elsevier Inc.",
number = "8",

}

TY - JOUR

T1 - On a security model of conjunctive keyword search over encrypted relational database

AU - Byun, Jin Wook

AU - Lee, Dong Hoon

PY - 2011/8/1

Y1 - 2011/8/1

N2 - Abstract: We study a security model for searching documents containing each of several keywords (conjunctive keyword search) over encrypted documents. A conjunctive keyword search protocol consists of three entities: a data supplier, a storage system such as database, and a user of storage system. A data supplier uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing each of several keywords with a private trapdoor. That is, a valid user is able to use boolean combinations of queries. Up to now only few conjunctive keyword search schemes have been proposed in the literature. However, the relying security model has not been based on relational databases such as Oracle and MS-Access, hence it is not easy to apply them in practice. Moreover, they have not considered an important security notion for user's trapdoor queries. In this paper, we first formally define a security model for conjunctive keyword search schemes including trapdoor security based on a practical relational database. We apply our security model to the existing conjunctive keyword scheme and discuss its vulnerability and countermeasure.

AB - Abstract: We study a security model for searching documents containing each of several keywords (conjunctive keyword search) over encrypted documents. A conjunctive keyword search protocol consists of three entities: a data supplier, a storage system such as database, and a user of storage system. A data supplier uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing each of several keywords with a private trapdoor. That is, a valid user is able to use boolean combinations of queries. Up to now only few conjunctive keyword search schemes have been proposed in the literature. However, the relying security model has not been based on relational databases such as Oracle and MS-Access, hence it is not easy to apply them in practice. Moreover, they have not considered an important security notion for user's trapdoor queries. In this paper, we first formally define a security model for conjunctive keyword search schemes including trapdoor security based on a practical relational database. We apply our security model to the existing conjunctive keyword scheme and discuss its vulnerability and countermeasure.

KW - Conjunctive keyword search

KW - Information retrieval

KW - Privacy of database

KW - Security model

UR - http://www.scopus.com/inward/record.url?scp=79957974286&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79957974286&partnerID=8YFLogxK

U2 - 10.1016/j.jss.2011.03.075

DO - 10.1016/j.jss.2011.03.075

M3 - Article

VL - 84

SP - 1364

EP - 1372

JO - Journal of Systems and Software

JF - Journal of Systems and Software

SN - 0164-1212

IS - 8

ER -