About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Industrial IoT Technologies and Applications. Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25–26, 2017, Proceedings

Research Article

Improved One-Round Phrase Search Schemes Over Symmetrically Encrypted Data in Storage Outsourcing System

Download(Requires a free EAI acccount)
303 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-60753-5_22,
        author={Ling Shen and Jie Wang},
        title={Improved One-Round Phrase Search Schemes Over Symmetrically Encrypted Data in Storage Outsourcing System},
        proceedings={Industrial IoT Technologies and Applications. Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25--26, 2017, Proceedings},
        proceedings_a={INDUSTRIALIOT},
        year={2017},
        month={9},
        keywords={Cloud storage Information security Searchable symmetric encryption Phrase search},
        doi={10.1007/978-3-319-60753-5_22}
    }
    
  • Ling Shen
    Jie Wang
    Year: 2017
    Improved One-Round Phrase Search Schemes Over Symmetrically Encrypted Data in Storage Outsourcing System
    INDUSTRIALIOT
    Springer
    DOI: 10.1007/978-3-319-60753-5_22
Ling Shen,*, Jie Wang1
  • 1: University of Massachusetts Lowell
*Contact email: aleenapple@163.com

Abstract

Phrase search schemes over encrypted data are efficient methods for protecting users’ data privacy in storage outsourcing systems. We analyze and improve two one-round phrase search schemes over encrypted data. One drawback of F. Kong’s phrase search scheme is that it cannot support single-keyword search. We propose a modification and the improved scheme supports both single-keyword and phrase search. In M. Li’s phrase search scheme, a simple unkeyed hash function is used instead of a keyed pseudo-random function. We present a security analysis and show that the usage of a keyed pseudo-random function can resist the leakage of some useful information. These phrase search schemes can be applied in cloud storage.

Keywords
Cloud storage Information security Searchable symmetric encryption Phrase search
Published
2017-09-19
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-60753-5_22
Copyright © 2017–2025 EAI
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL