PUBLIC KEY ENCRYPTION WITH CONJUNCTIVE FIELD FREE KEYWORD SEARCH SCHEME

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 14

Abstract

Searchable encryption allows a remote server to search over encrypted documents without knowing the sensitive data contents. Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keyword Searches (CKS) schemes improve system usability by retrieving the matched documents. In this type of search, the user has to repeatedly perform the search protocol for many times. Most of existent (CKS) schemes use conjunctive keyword searches with fixed position keyword fields, this type of search is not useful for many applications, such as unstructured text. In our paper, we propose a new public key encryption scheme based on bilinear pairings, the scheme supports conjunctive keyword search queries on encrypted data without needing to specify the positions of the keywords where the keywords can be in any arbitrary order. Instead of giving the server one trapdoor for each keyword in the conjunction set, we use a bilinear map per a set of combined keywords to make them regarded as one keyword. In another meaning, the proposed method will retrieve the data in one round of communication between the user and server. Furthermore, the search process could not reveal any information about the number of keywords in the query expression. Through analysis section we determine how such scheme could be used to guarantee fast and secure access to the database.

Authors and Affiliations

FAIROUZ SHER ALI, SONG FENG LU

Keywords

Related Articles

Performance Analysis of Biscuit Manufacturing Plant in Steady State Using Fuzzy Availability

This paper deals with the performance analysis of biscuit manufacturing plant consisting of six sub-systems using fuzzy availability in the steady state. These six sub-systems are arranged in series and parallel configur...

Stability Aware Routing in Mobile Ad-Hoc Networks using multiple Route

Previous work on routing in MANETs has resulted innumerous routing protocols that aim at satisfying constraints such asminimum hop or low energy. Existing routing protocols often fail todiscover stable routes between sou...

Intrinsic and Extrinsic Motivation to E learning in Higher Education Institutions

There were many researches which were conducted about implementation of e learning in Higher Education Institutions, but few of them were focused on the motivation of e learning. Even though, there are many applications...

A REVIEW ON MULTIQUERY SYSTEM FOR CONTENT BASED IMAGE RETRIEVAL

In recent years, very large collections of images and videos have grown rapidly. In parallel with this growth, content-based retrieval and querying the indexed collections are required to access visual information. Two o...

IMPLEMENTATION OF FINGER TOKEN AUTHENTICATION TECHNIQUE USING ARTIFICIAL INTELLIGENCE APPROACH IN NTT MICROSYSTEMS

Personal authentication that correctly identifies valid users in an indispensable security technology for enabling people to enjoy the access to data services with a sense of confidence and assurance. Passwords have been...

Download PDF file
  • EP ID EP650898
  • DOI 10.24297/ijct.v15i14.834
  • Views 109
  • Downloads 0

How To Cite

FAIROUZ SHER ALI, SONG FENG LU (2016). PUBLIC KEY ENCRYPTION WITH CONJUNCTIVE FIELD FREE KEYWORD SEARCH SCHEME. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 15(14), 7423-7434. https://europub.co.uk/articles/-A-650898