Analysis of some keyword search schemes in encrypted data

Ik Rae Jeong, Jeong Ok Kwon

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)

    Abstract

    With remote storage systems, a user may store his data in the encrypted form at the remote storage server to preserve confidentiality. Later, the user wants to receive his data securely through an untrusted network. The user does not want to receive all of the stored data but the data related to specific words, to reduce the communication overload in the network. In this case, we need secure and efficient keyword search schemes over the encrypted data. In the paper, we show that the keyword search schemes suggested by Byun et al. and Ballard et al. do not provide semantic security which is the most important security requirement for the keyword search schemes.

    Original languageEnglish
    Pages (from-to)213-215
    Number of pages3
    JournalIEEE Communications Letters
    Volume12
    Issue number3
    DOIs
    Publication statusPublished - 2008 Mar

    Bibliographical note

    Funding Information:
    We would like to thank the anonymous reviewers for their useful comments and suggestions. The second author was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2008-(C1090-0801-0025)).

    Keywords

    • Communication
    • Confi-dentiality
    • Keyword search
    • Remote storage system

    ASJC Scopus subject areas

    • Modelling and Simulation
    • Computer Science Applications
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'Analysis of some keyword search schemes in encrypted data'. Together they form a unique fingerprint.

    Cite this