PUBLIC KEY ENCRYPTION WITH CONJUNCTIVE FIELD FREE KEYWORD SEARCH SCHEME
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 14
Abstract
Searchable encryption allows a remote server to search over encrypted documents without knowing the sensitive data contents. Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keyword Searches (CKS) schemes improve system usability by retrieving the matched documents. In this type of search, the user has to repeatedly perform the search protocol for many times. Most of existent (CKS) schemes use conjunctive keyword searches with fixed position keyword fields, this type of search is not useful for many applications, such as unstructured text. In our paper, we propose a new public key encryption scheme based on bilinear pairings, the scheme supports conjunctive keyword search queries on encrypted data without needing to specify the positions of the keywords where the keywords can be in any arbitrary order. Instead of giving the server one trapdoor for each keyword in the conjunction set, we use a bilinear map per a set of combined keywords to make them regarded as one keyword. In another meaning, the proposed method will retrieve the data in one round of communication between the user and server. Furthermore, the search process could not reveal any information about the number of keywords in the query expression. Through analysis section we determine how such scheme could be used to guarantee fast and secure access to the database.
Authors and Affiliations
FAIROUZ SHER ALI, SONG FENG LU
A Comparative Study of Software Firewall on Windows and Linux Platform
Nowadays, the communication through World Wide Web (WWW) is growing rapidly. All the gadgets, computer and handheld devices are connected via wire or wireless media and communicated to each others. Thus, network security...
Activity Types Selection in Kindergarten Outdoor Education
Preschool education develops from focus on physical cultivation in traditional agricultural society to professional education in professional institutions such as kindergartens. In recent years, it emphasizes multiple de...
Role-Attribute-Based Encryption (RABE) Access Control for Healthcare Cloud Systems
In the medical industry, it is critical to ensure the confidentiality of patients’ personal health records when storing and managing them. Before cloud computing surfaced, heath providers used local servers and hard dr...
Can Ali Pass the Program? An Empirical Study of a Blind ICT Student challenges at Arab Open University
We live in visually oriented society, in which the computer is becoming as commonplace and integral part of every student’s educational experience. It plays essential role in transforming the way in which postsecondary...
Proposing Parameters for Evaluating Sustainability of mHealth Systems in Developing Countries
The exponential rise in global healthcare challenges; the rise in morbidity and mortality, especially in developing countries have compelled stakeholders to explore alternative ways of overcoming the crisis. Guided by th...