Cryptanalysis of a Privacy Preserving Ranked Multi-keyword Search Scheme in Cloud Computing

Author(s):  
Xu An Wang
Author(s):  
Wei Zhang ◽  
Jie Wu ◽  
Yaping Lin

Cloud computing has attracted a lot of interests from both the academics and the industries, since it provides efficient resource management, economical cost, and fast deployment. However, concerns on security and privacy become the main obstacle for the large scale application of cloud computing. Encryption would be an alternative way to relief the concern. However, data encryption makes efficient data utilization a challenging problem. To address this problem, secure and privacy preserving keyword search over large scale cloud data is proposed and widely developed. In this paper, we make a thorough survey on the secure and privacy preserving keyword search over large scale cloud data. We investigate existing research arts category by category, where the category is classified according to the search functionality. In each category, we first elaborate on the key idea of existing research works, then we conclude some open and interesting problems.


Author(s):  
Xiangyu Wang ◽  
Jianfeng Ma ◽  
Yinbin Miao ◽  
Ximeng Liu ◽  
Ruikang Yang

2019 ◽  
Vol 24 (8) ◽  
pp. 5609-5631
Author(s):  
Ahmed M. Manasrah ◽  
Mahmoud Abu Nasir ◽  
Maher Salem

2016 ◽  
Vol 65 (5) ◽  
pp. 1566-1577 ◽  
Author(s):  
Wei Zhang ◽  
Yaping Lin ◽  
Sheng Xiao ◽  
Jie Wu ◽  
Siwang Zhou

2014 ◽  
Vol 631-632 ◽  
pp. 897-901
Author(s):  
Xian Yong Meng ◽  
Zhong Chen ◽  
Xiang Yu Meng

In this paper, a novel proxy re-encryption (PRE) scheme with keyword search is proposed, where only the ciphertext containing the keyword set by the delegator can be transformed by the semi-trusted proxy and then decrypted by delegatee. In the proposed scheme, the semi-trusted proxy can convert the ciphertext encrypted under the delegator’s public key into the ciphertext encrypted under the delegatee’s public key. In addition, only the delegatee’s email gateway with a trapdoor can test whether or not a given cipheretext containing some keyword, but can learn nothing else about the sensitive data of email. We proposed an identity-based proxy re-encryption with keyword search scheme, where the delegator and the delegatee extract keys from a trusted party called the key generator center (KGC), who generates public-private key pair for delegator and delegatee based on their identities. Meanwhile, the identity-based proxy re-encryption with keyword search scheme satisfies the properties of PRE including unidirectionality, multi-use and transparency. Additionally, the proposed scheme is efficient in terms of both computation and communication, and can realize security privacy preserving in cloud computing environments.


Sign in / Sign up

Export Citation Format

Share Document