Research Article

Privacy Preserving Multi-Proxy Based Encrypted Keyword Search

Volume: 11 Number: 4 December 31, 2022
EN

Privacy Preserving Multi-Proxy Based Encrypted Keyword Search

Abstract

This paper presents a multi-proxy (2 proxies) based encrypted keyword search scheme that enjoys the following properties: This scheme provides data confidentially that encrypted data does not leak any keywords and documents to the attackers (data server and a proxy). Moreover, the proposed scheme provides trapdoor privacy. In other words, the attackers do not learn any information about searched keywords. Furthermore, even if a proxy is controlled by an attacker, the attacker does not learn any information about the queries (keywords that the user searches over the database) and database results. Different from other studies, this scheme provides lightweight user-side query and data processing. In other words, most of the job (query processing) is done by the proxies on behalf of the user. Finally, the proposed scheme relaxes the trust assumption that eliminates a single point of failure by introducing multi-proxy architecture.

Keywords

References

  1. P. R. Clearinghouse. Chronology of data breaches. [Online]. Available: http://www.privacyrights.org/data-breach. July 19, 2022.
  2. N. V. D. C. statistics. [Online]. Available: http://web.nvd.nist. gov/view/vuln/statistics,July19,2022.
  3. C. Gentry, “Fully homomorphic encryption using ideal lattices,” in STOC, vol. 9, 2009, pp. 169–178.
  4. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order preserving encryption for numeric data,” in Proc. of ACM SIGMOD, June 2004.
  5. A.Boldyreva, N.Chenette, and A.ON ́eill, “Orderpreserving symmetric encryption revisited: improved security analysis and alternative solutions,” in Proc. of CRYPTO, 2011.
  6. A. Boldyreva, N. Chenette, Y. Lee, and A. ON ́eil, “Order preserving symmetric encryption,” in Proc. of EUROCRYPT, April 2009.
  7. R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrish- nan, “CryptDB: Protecting confidentiality with encrypted query processing,” in Proc. of SOSP, 2011.
  8. R. A. Popa, F. H. Li, and N. Zeldovich, “An ideal-security protocol for order-preserving encoding,” in Proc. of Security and Privacy, 2013.

Details

Primary Language

English

Subjects

Computer Software

Journal Section

Research Article

Publication Date

December 31, 2022

Submission Date

July 23, 2022

Acceptance Date

December 5, 2022

Published in Issue

Year 2022 Volume: 11 Number: 4

APA
Öksüz, Ö. (2022). Privacy Preserving Multi-Proxy Based Encrypted Keyword Search. International Journal of Information Security Science, 11(4), 14-27. https://izlik.org/JA32CY27ZE
AMA
1.Öksüz Ö. Privacy Preserving Multi-Proxy Based Encrypted Keyword Search. IJISS. 2022;11(4):14-27. https://izlik.org/JA32CY27ZE
Chicago
Öksüz, Özgür. 2022. “Privacy Preserving Multi-Proxy Based Encrypted Keyword Search”. International Journal of Information Security Science 11 (4): 14-27. https://izlik.org/JA32CY27ZE.
EndNote
Öksüz Ö (December 1, 2022) Privacy Preserving Multi-Proxy Based Encrypted Keyword Search. International Journal of Information Security Science 11 4 14–27.
IEEE
[1]Ö. Öksüz, “Privacy Preserving Multi-Proxy Based Encrypted Keyword Search”, IJISS, vol. 11, no. 4, pp. 14–27, Dec. 2022, [Online]. Available: https://izlik.org/JA32CY27ZE
ISNAD
Öksüz, Özgür. “Privacy Preserving Multi-Proxy Based Encrypted Keyword Search”. International Journal of Information Security Science 11/4 (December 1, 2022): 14-27. https://izlik.org/JA32CY27ZE.
JAMA
1.Öksüz Ö. Privacy Preserving Multi-Proxy Based Encrypted Keyword Search. IJISS. 2022;11:14–27.
MLA
Öksüz, Özgür. “Privacy Preserving Multi-Proxy Based Encrypted Keyword Search”. International Journal of Information Security Science, vol. 11, no. 4, Dec. 2022, pp. 14-27, https://izlik.org/JA32CY27ZE.
Vancouver
1.Özgür Öksüz. Privacy Preserving Multi-Proxy Based Encrypted Keyword Search. IJISS [Internet]. 2022 Dec. 1;11(4):14-27. Available from: https://izlik.org/JA32CY27ZE