Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

On a security model of conjunctive keyword search over encrypted relational database

Full metadata record
DC Field Value Language
dc.contributor.authorByun, Jin Wook-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-07T10:02:26Z-
dc.date.available2021-09-07T10:02:26Z-
dc.date.created2021-06-19-
dc.date.issued2011-08-
dc.identifier.issn0164-1212-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/111935-
dc.description.abstractWe study a security model for searching documents containing each of several keywords (conjunctive keyword search) over encrypted documents. A conjunctive keyword search protocol consists of three entities: a data supplier, a storage system such as database, and a user of storage system. A data supplier uploads encrypted documents on a storage system, and then a user of the storage system searches documents containing each of several keywords with a private trapdoor. That is, a valid user is able to use boolean combinations of queries. Up to now only few conjunctive keyword search schemes have been proposed in the literature. However, the relying security model has not been based on relational databases such as Oracle and MS-Access, hence it is not easy to apply them in practice. Moreover, they have not considered an important security notion for user's trapdoor queries. In this paper, we first formally define a security model for conjunctive keyword search schemes including trapdoor security based on a practical relational database. We apply our security model to the existing conjunctive keyword scheme and discuss its vulnerability and countermeasure. (C) 2011 Elsevier Inc. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE INC-
dc.subjectPUBLIC-KEY ENCRYPTION-
dc.titleOn a security model of conjunctive keyword search over encrypted relational database-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1016/j.jss.2011.03.075-
dc.identifier.scopusid2-s2.0-79957974286-
dc.identifier.wosid000292227600008-
dc.identifier.bibliographicCitationJOURNAL OF SYSTEMS AND SOFTWARE, v.84, no.8, pp.1364 - 1372-
dc.relation.isPartOfJOURNAL OF SYSTEMS AND SOFTWARE-
dc.citation.titleJOURNAL OF SYSTEMS AND SOFTWARE-
dc.citation.volume84-
dc.citation.number8-
dc.citation.startPage1364-
dc.citation.endPage1372-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusPUBLIC-KEY ENCRYPTION-
dc.subject.keywordAuthorPrivacy of database-
dc.subject.keywordAuthorInformation retrieval-
dc.subject.keywordAuthorConjunctive keyword search-
dc.subject.keywordAuthorSecurity model-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE