Cargando…
A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods
Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ran...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3956551/ https://www.ncbi.nlm.nih.gov/pubmed/24719565 http://dx.doi.org/10.1155/2014/153791 |
_version_ | 1782307683454418944 |
---|---|
author | Luo, Guangchun Peng, Ningduo Qin, Ke Chen, Aiguo |
author_facet | Luo, Guangchun Peng, Ningduo Qin, Ke Chen, Aiguo |
author_sort | Luo, Guangchun |
collection | PubMed |
description | Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. We prove that asymmetric searchable structure could be converted to symmetric structure, and functions could be modeled separately apart from the core searchable structure. Based on this observation, we propose a layered searchable encryption (LSE) scheme, which provides compatibility, flexibility, and security for various settings and functionalities. In this scheme, the outputs of the core searchable component based on either symmetric or asymmetric setting are converted to some uniform mappings, which are then transmitted to loosely coupled functional components to further filter the results. In such a way, all functional components could directly support both symmetric and asymmetric settings. Based on LSE, we propose two representative and novel constructions for ranked keyword query (previously only available in symmetric scheme) and range query (previously only available in asymmetric scheme). |
format | Online Article Text |
id | pubmed-3956551 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-39565512014-04-09 A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods Luo, Guangchun Peng, Ningduo Qin, Ke Chen, Aiguo ScientificWorldJournal Research Article Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. We prove that asymmetric searchable structure could be converted to symmetric structure, and functions could be modeled separately apart from the core searchable structure. Based on this observation, we propose a layered searchable encryption (LSE) scheme, which provides compatibility, flexibility, and security for various settings and functionalities. In this scheme, the outputs of the core searchable component based on either symmetric or asymmetric setting are converted to some uniform mappings, which are then transmitted to loosely coupled functional components to further filter the results. In such a way, all functional components could directly support both symmetric and asymmetric settings. Based on LSE, we propose two representative and novel constructions for ranked keyword query (previously only available in symmetric scheme) and range query (previously only available in asymmetric scheme). Hindawi Publishing Corporation 2014-02-25 /pmc/articles/PMC3956551/ /pubmed/24719565 http://dx.doi.org/10.1155/2014/153791 Text en Copyright © 2014 Guangchun Luo et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Luo, Guangchun Peng, Ningduo Qin, Ke Chen, Aiguo A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods |
title | A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods |
title_full | A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods |
title_fullStr | A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods |
title_full_unstemmed | A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods |
title_short | A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods |
title_sort | layered searchable encryption scheme with functional components independent of encryption methods |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3956551/ https://www.ncbi.nlm.nih.gov/pubmed/24719565 http://dx.doi.org/10.1155/2014/153791 |
work_keys_str_mv | AT luoguangchun alayeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT pengningduo alayeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT qinke alayeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT chenaiguo alayeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT luoguangchun layeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT pengningduo layeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT qinke layeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods AT chenaiguo layeredsearchableencryptionschemewithfunctionalcomponentsindependentofencryptionmethods |