A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods
Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ran...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2014/153791 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832564355711893504 |
---|---|
author | Guangchun Luo Ningduo Peng Ke Qin Aiguo Chen |
author_facet | Guangchun Luo Ningduo Peng Ke Qin Aiguo Chen |
author_sort | Guangchun Luo |
collection | DOAJ |
description | Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. We prove that asymmetric searchable structure could be converted to symmetric structure, and functions could be modeled separately apart
from the core searchable structure. Based on this observation, we propose a layered searchable encryption (LSE) scheme, which provides compatibility, flexibility, and security for various settings and functionalities. In this scheme, the outputs of the core searchable component based on either symmetric or asymmetric setting are converted to some uniform mappings, which are then transmitted to loosely coupled functional components to further filter the results. In such a way, all functional components could directly support both symmetric and asymmetric settings. Based on LSE, we propose two representative and novel constructions for ranked keyword query (previously only available in symmetric scheme) and range query (previously only available in asymmetric scheme). |
format | Article |
id | doaj-art-c30379c96e8243a1a7f618c0d91b6217 |
institution | Kabale University |
issn | 2356-6140 1537-744X |
language | English |
publishDate | 2014-01-01 |
publisher | Wiley |
record_format | Article |
series | The Scientific World Journal |
spelling | doaj-art-c30379c96e8243a1a7f618c0d91b62172025-02-03T01:11:11ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/153791153791A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption MethodsGuangchun Luo0Ningduo Peng1Ke Qin2Aiguo Chen3School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, ChinaSchool of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, ChinaSchool of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, ChinaSchool of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, ChinaSearchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. We prove that asymmetric searchable structure could be converted to symmetric structure, and functions could be modeled separately apart from the core searchable structure. Based on this observation, we propose a layered searchable encryption (LSE) scheme, which provides compatibility, flexibility, and security for various settings and functionalities. In this scheme, the outputs of the core searchable component based on either symmetric or asymmetric setting are converted to some uniform mappings, which are then transmitted to loosely coupled functional components to further filter the results. In such a way, all functional components could directly support both symmetric and asymmetric settings. Based on LSE, we propose two representative and novel constructions for ranked keyword query (previously only available in symmetric scheme) and range query (previously only available in asymmetric scheme).http://dx.doi.org/10.1155/2014/153791 |
spellingShingle | Guangchun Luo Ningduo Peng Ke Qin Aiguo Chen A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods The Scientific World Journal |
title | A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods |
title_full | A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods |
title_fullStr | A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods |
title_full_unstemmed | A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods |
title_short | A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods |
title_sort | layered searchable encryption scheme with functional components independent of encryption methods |
url | http://dx.doi.org/10.1155/2014/153791 |
work_keys_str_mv | AT guangchunluo alayeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT ningduopeng alayeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT keqin alayeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT aiguochen alayeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT guangchunluo layeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT ningduopeng layeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT keqin layeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT aiguochen layeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods |