symmetric searchable encryption
Recently Published Documents


TOTAL DOCUMENTS

42
(FIVE YEARS 23)

H-INDEX

6
(FIVE YEARS 2)

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Ruizhong Du ◽  
Yuqing Zhang ◽  
Mingyue Li

Dynamic symmetric searchable encryption (DSSE) that enables the search and update of encrypted databases outsourced to cloud servers has recently received widespread attention for leakage-abuse attacks against DSSE. In this paper, we propose a dynamic database padding method to mitigate the threat of data leakage during the update operation of outsourcing data. First, we introduce an outlier detection technology where bogus files are generated for padding according to the outlier factors, hiding the document information currently matching search keywords. Furthermore, we design a new index structure suitable for the padded database using the bitmap index to simplify the update operation of the encrypted index. Finally, we present an application scenario of the padding method and realize a forward and backward privacy DSSE scheme (named PDB-DSSE). The security analysis and simulation results show that our dynamic padding algorithm is suitable for DSSE scheme and PDB-DSSE scheme maintains the security and efficiency of the retrieval and update of the DSSE scheme.


2021 ◽  
Vol 64 (8) ◽  
Author(s):  
Yanyu Huang ◽  
Siyi Lv ◽  
Zheli Liu ◽  
Xiangfu Song ◽  
Jin Li ◽  
...  

2020 ◽  
Vol 13 (6) ◽  
pp. 1034-1044 ◽  
Author(s):  
Cheng Guo ◽  
Xue Chen ◽  
Yingmo Jie ◽  
Zhangjie Fu ◽  
Mingchu Li ◽  
...  

Accessible Encryption (SE) permits a client in accordance with transfer records in accordance with the astronaut and according to seem thru it of a faraway manner while defending the security concerning each the statistics yet the inquiries. Right now, entrust a generative then the simple in imitation of actualize Symmetric Searchable Encryption Scheme because instance (SSE) [4]. This tale takes the some round concerning correspondence namely O(n) instances on calculations upstairs n range regarding records . We likewise presented some other variety of Search Pattern Privacy, as gives a percentage about safety on the spillage structure trapdoor [4]. We also advocate the modifications over our graph because of batch inquire who can not reap the versatile vagary recipe. The current method offers the appropriateness whilst maintaining stuff about the data classified, that is viable so much such has advise bother among the full altar about the demand bill and wants in accordance with remove watchwords now the archives are eke out away. We likewise recommend adjustments in our format so the graph execute be utilized upon the potent enemies at the fee on various rounds of transmission yet the inclination space. [6]We may eke exhibit our layout on a range of commercial enterprise datasets. Likewise correct now, utilizes the Hash tying strategy instead than band over encryption action because file for consideration majority which makes such splendid for light poise applications. We are the first in imitation of suggest pardon trapdoors between Symmetric Searchable Encryption because the tussock search.


Sign in / Sign up

Export Citation Format

Share Document