About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings

Research Article

A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query

Download(Requires a free EAI acccount)
4 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-66922-5_28,
        author={Mingyue Li and Ruizhong Du and Chunfu Jia},
        title={A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query},
        proceedings={Security and Privacy in New Computing Environments. Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings},
        proceedings_a={SPNCE},
        year={2021},
        month={1},
        keywords={Data privacy Searchable encryption Structured Query Language (SQL) Multi-user shared},
        doi={10.1007/978-3-030-66922-5_28}
    }
    
  • Mingyue Li
    Ruizhong Du
    Chunfu Jia
    Year: 2021
    A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-66922-5_28
Mingyue Li1,*, Ruizhong Du2, Chunfu Jia1
  • 1: College of Cyber Science, Nankai University
  • 2: School of Cyber Security and Computer, Hebei University
*Contact email: 15630424277@163.com

Abstract

Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud servers separates it from physical control, resulting in data privacy disclosure. Although encryption enhances data confidentiality, it also complicates the execution of encrypted database operations. In this paper, we propose a multi-user shared searchable encryption scheme that supports multi-user selective authorization and secure access to encrypted databases. First, we apply the Diffie-Hellman protocol to a trapdoor generate algorithm to facilitate fine-grained search control without incremental conversions. Second, we utilize a private key to generate an encrypted index by bilinear mapping, which makes it impossible for an adversary to obtain trapdoor keywords by traversing the keyword space and to carry out keyword guessing attacks. Third, we use double-layered encryption to encrypt a symmetric decryption key. Only the proxies whose attributes are matched with access control list can obtain the key of decrypted data. Through theoretical security analysis and experimental verifications, we show that our scheme can provide secure and efficacious ciphertext retrieval without the support of a secure channel.

Keywords
Data privacy Searchable encryption Structured Query Language (SQL) Multi-user shared
Published
2021-01-22
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-66922-5_28
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL