On a security model of conjunctive keyword search over encrypted relational database
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Byun, Jin Wook | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-07T10:02:26Z | - |
dc.date.available | 2021-09-07T10:02:26Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2011-08 | - |
dc.identifier.issn | 0164-1212 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/111935 | - |
dc.description.abstract | We study a security model for searching documents containing each of several keywords (conjunctive keyword search) over encrypted documents. A conjunctive keyword search protocol consists of three entities: a data supplier, a storage system such as database, and a user of storage system. A data supplier uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing each of several keywords with a private trapdoor. That is, a valid user is able to use boolean combinations of queries. Up to now only few conjunctive keyword search schemes have been proposed in the literature. However, the relying security model has not been based on relational databases such as Oracle and MS-Access, hence it is not easy to apply them in practice. Moreover, they have not considered an important security notion for user's trapdoor queries. In this paper, we first formally define a security model for conjunctive keyword search schemes including trapdoor security based on a practical relational database. We apply our security model to the existing conjunctive keyword scheme and discuss its vulnerability and countermeasure. (C) 2011 Elsevier Inc. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.subject | PUBLIC-KEY ENCRYPTION | - |
dc.title | On a security model of conjunctive keyword search over encrypted relational database | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1016/j.jss.2011.03.075 | - |
dc.identifier.scopusid | 2-s2.0-79957974286 | - |
dc.identifier.wosid | 000292227600008 | - |
dc.identifier.bibliographicCitation | JOURNAL OF SYSTEMS AND SOFTWARE, v.84, no.8, pp.1364 - 1372 | - |
dc.relation.isPartOf | JOURNAL OF SYSTEMS AND SOFTWARE | - |
dc.citation.title | JOURNAL OF SYSTEMS AND SOFTWARE | - |
dc.citation.volume | 84 | - |
dc.citation.number | 8 | - |
dc.citation.startPage | 1364 | - |
dc.citation.endPage | 1372 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | PUBLIC-KEY ENCRYPTION | - |
dc.subject.keywordAuthor | Privacy of database | - |
dc.subject.keywordAuthor | Information retrieval | - |
dc.subject.keywordAuthor | Conjunctive keyword search | - |
dc.subject.keywordAuthor | Security model | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.