Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2011.18C.4.199

Effective Searchable Symmetric Encryption System using Conjunctive Keyword on Remote Storage Environment  

Lee, Sun-Ho (순천향대학교 컴퓨터소프트웨어공학과)
Lee, Im-Yeong (순천향대학교 컴퓨터소프트웨어공학과)
Abstract
Removable Storage provides the excellent portability with light weight and small size which fits in one's hand, many users have recently turned attention to the high-capacity products. However, due to the easy of portability for Removable Storage, Removable Storage are frequently lost and stolen and then many problems have been occurred such as the leaking of private information to the public. The advent of remote storage services where data is stored throughout the network, has allowed an increasing number of users to access data. The main data of many users is stored together on remote storage, but this has the problem of disclosure by an unethical administrator or attacker. To solve this problem, the encryption of data stored on the server has become necessary, and a searchable encryption system is needed for efficient retrieval of encrypted data. However, the existing searchable encryption system has the problem of low efficiency of document insert/delete operations and multi-keyword search. In this paper, an efficient searchable encryption system is proposed.
Keywords
Serhcable Encryption; Conjunctive Keyword;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Proceedings of the 13th ACM conference on computer and communication security-ACMCCS, pp.79-88, 2006.   DOI
2 Y. H. Hwang, and P. J. Lee, "Public key encryption with conjunctive keyword search and its extension to a multi-user system", International Conference on Pairing-Based Cryptography, Pairing'07, 2007.   DOI   ScienceOn
3 Y. Yang, F. Bao, X. Ding, and R. H. Deng, "International Journal of Applied Cryptography", 1(4), 2009.
4 D. Boneh, G. Di. Crescenzo, and R Ostrovsky, "Public key encryption with keyword search," Eurocrypt'04,
5 D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searching on Encrypted Data," Proceedings of IEEE Symposium on Security and Privacy, pp.44-55, 2000.   DOI
6 E. J. Goh, "Secure Indexes," Technical Report, 2003/216, IACR ePrint Cryptography Archive, 2003.
7 P. Wang, H. Wang and J. Pieprzyk, "Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups", Cryptology and Network Security, pp.178-195, 2008.   DOI   ScienceOn
8 B.Bloom, "Space/time trade-offs in hashcoding with allowable errors." Communications of the ACM, 13(7), pp.422-426, 1970.   DOI
9 김선영, 서재우, 이필중, "검색 가능 암호 기술의 연구 동향," 정보보호학회지, 19(2), pp.63-73, 2009.   과학기술학회마을
10 조남수, 홍도원, "검색 가능 암호 시스템 기술 동향," 전자통신동향분석 23(4), pp.1-9, 2008.   과학기술학회마을
11 B. Zhang, and F. Zhang, "An efficient public key encryption with conjunctive-subset keywords search", Journal of Network and Computer Applications, 34(1), 2011.   DOI   ScienceOn