Security models for delegated keyword searching within encrypted contentsReportar como inadecuado




Security models for delegated keyword searching within encrypted contents - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

Journal of Internet Services and Applications

, Volume 3, Issue 2, pp 233–241

First Online: 28 July 2012Received: 23 April 2011Accepted: 11 June 2012

Abstract

Within modern internet infrastructure including networks that are ubiquitous, there is often a need for delegatable communication between nodes without compromising the confidentiality of information. In practice, this should be enforced while allowing some basic functionality for intermediate delegated nodes such as searching through encrypted content. This can be achieved using a Public key encryption with keyword search PEKS scheme, first proposed by Boneh et al., which enables to search publicly encrypted messages for keywords without revealing any information about the message. The issue of PEKS schemes being vulnerable to keyword guessing attacks KGAs was first shown by Byun et al., and two of the most recent PEKS schemes, i.e., due to Rhee et al. in ASIACCS, pp 376–379, 2009; IEICE Electron Express 65:237–243, 2009 and J Syst Softw 835:763–771, 2010, respectively, are designed with this security in mind. In this paper, we treat this KGA problem in detail and define new security models to capture KGAs against PEKS and designated PEKS schemes. These models are more security sufficient than the model considered by Rhee et al. J Syst Softw 835:763–771, 2010; indeed the latter model does not afford sufficient adversarial capability in the sense that it is much weaker than the adversarial capability considered in the original IND-CKA model of Boneh et al. Our new models allow to capture KGAs on three recent designated PEKS schemes that cannot be captured in the weaker model of Rhee et al.

KeywordsModern internet Security Delegation Public-key encryption with keyword search Adversarial model Guessing attack Research funded by the Ministry of Science, Technology and amp; Innovation under grant no. MOSTI-BGM-R and amp;D-500-2-8, and by the Penang ICT Grant under grant no. MMU-RMC-PenangICT-2011-003.

R.C.-W. Phan carried out this part of the work while visiting Multimedia University.

Download fulltext PDF



Autor: Wei-Chuen Yau - Raphael C. -W. Phan - Swee-Huay Heng - Bok-Min Goi

Fuente: https://link.springer.com/







Documentos relacionados