Analysis of some keyword search schemes in encrypted data

Ik Rae Jeong, Jeong Ok Kwon

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)

Abstract

With remote storage systems, a user may store his data in the encrypted form at the remote storage server to preserve confidentiality. Later, the user wants to receive his data securely through an untrusted network. The user does not want to receive all of the stored data but the data related to specific words, to reduce the communication overload in the network. In this case, we need secure and efficient keyword search schemes over the encrypted data. In the paper, we show that the keyword search schemes suggested by Byun et al. and Ballard et al. do not provide semantic security which is the most important security requirement for the keyword search schemes.

Original languageEnglish
Pages (from-to)213-215
Number of pages3
JournalIEEE Communications Letters
Volume12
Issue number3
DOIs
Publication statusPublished - 2008 Mar

Bibliographical note

Funding Information:
We would like to thank the anonymous reviewers for their useful comments and suggestions. The second author was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2008-(C1090-0801-0025)).

Keywords

  • Communication
  • Confi-dentiality
  • Keyword search
  • Remote storage system

ASJC Scopus subject areas

  • Modelling and Simulation
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Analysis of some keyword search schemes in encrypted data'. Together they form a unique fingerprint.

Cite this