Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries
Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud servers separates it from physical control, resulting in data privacy disclosure. Although encryption enhances data confidentiality, it also...
Saved in:
| Published in | Mobile networks and applications Vol. 27; no. 1; pp. 417 - 430 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Springer US
01.02.2022
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1383-469X 1572-8153 |
| DOI | 10.1007/s11036-021-01836-z |
Cover
| Abstract | Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud servers separates it from physical control, resulting in data privacy disclosure. Although encryption enhances data confidentiality, it also complicates the execution of encrypted database operations. In this paper, we propose a multi-user shared searchable encryption scheme that supports multi-user selective authorization and secure access to encrypted databases. First, we apply the Diffie-Hellman protocol to a trapdoor generate algorithm to facilitate fine-grained search control without incremental conversions. Second, we utilize a private key to generate an encrypted index by bilinear mapping, which makes it impossible for an adversary to obtain trapdoor keywords by traversing the keyword space and to carry out keyword guessing attacks. Third, we use double-layered encryption to encrypt a symmetric decryption key. Only the proxies whose attributes are matched with the access control list can obtain the key of decrypted data. Through theoretical security analysis and experimental verifications, we show that our scheme can provide secure and efficacious ciphertext retrieval without the support of a secure channel. |
|---|---|
| AbstractList | Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud servers separates it from physical control, resulting in data privacy disclosure. Although encryption enhances data confidentiality, it also complicates the execution of encrypted database operations. In this paper, we propose a multi-user shared searchable encryption scheme that supports multi-user selective authorization and secure access to encrypted databases. First, we apply the Diffie-Hellman protocol to a trapdoor generate algorithm to facilitate fine-grained search control without incremental conversions. Second, we utilize a private key to generate an encrypted index by bilinear mapping, which makes it impossible for an adversary to obtain trapdoor keywords by traversing the keyword space and to carry out keyword guessing attacks. Third, we use double-layered encryption to encrypt a symmetric decryption key. Only the proxies whose attributes are matched with the access control list can obtain the key of decrypted data. Through theoretical security analysis and experimental verifications, we show that our scheme can provide secure and efficacious ciphertext retrieval without the support of a secure channel. |
| Author | Du, Ruizhong Jia, Chunfu Li, Mingyue |
| Author_xml | – sequence: 1 givenname: Mingyue surname: Li fullname: Li, Mingyue organization: College of Cyber Science, Nankai University, Tianjin Key Laboratory of Network and Data Security Technology, Nankai University – sequence: 2 givenname: Ruizhong surname: Du fullname: Du, Ruizhong email: drzh@hbu.edu.cn organization: School of Cyber Security and Computer, Hebei University – sequence: 3 givenname: Chunfu surname: Jia fullname: Jia, Chunfu organization: College of Cyber Science, Nankai University, Tianjin Key Laboratory of Network and Data Security Technology, Nankai University |
| BookMark | eNp9kF1LwzAUhoNMcJv-Aa8CXlfz0aTppYz5ARUZm-BdSNNT17E1NWkZ2683OsE7r865eJ_3HJ4JGrWuBYSuKbmlhGR3gVLCZUIYTQhVcTueoTEVGUsUFXwUd654ksr8_QJNQtgQQoRQ6RgVK7c3vgr4Zdj2TTIE8HgJxtu1KbeA5631h65vXIuXdg07wPumX-Pl0HXO97h2Mb0o8GIA30C4ROe12Qa4-p1T9PYwX82ekuL18Xl2XySWZaRPOMkZl2lVUiptfK9SpiZS8UzlwlpVlaRmWQ4SQEBpqkxwgDSTjFJR18RUfIpuTr2dd58DhF5v3ODbeFIzmTLJeB6hKWKnlPUuBA-17nyzM_6gKdHf1vTJmo7W9I81fYwQP0EhhtsP8H_V_1Bf6OVxyA |
| Cites_doi | 10.1145/2882903.2882932 10.1007/978-3-540-24852-1-3 10.1007/978-3-030-29962-0_15 10.1109/TIFS.2018.2866321 10.1109/TCC.2017.2684811 10.1109/TIFS.2017.2721359 10.1007/978-3-319-98989-1_11 10.1109/TNET.2015.2457493 10.1016/j.future.2019.05.038 10.1109/TPDS.2013.45 10.1109/SECPRI.2000.848445 10.5220/0006666100570067 10.1109/ACCESS.2018.2840119 10.1007/978-3-642-27576-0_13 10.1109/TPDS.2019.2940945 10.1109/TDSC.2020.2974220 10.1109/TPDS.2015.2401003 10.1109/ICWS.2016.62 10.1109/TII.2018.2834351 10.1109/INFOCOM.2019.8737588 10.1007/3-540-44647-8_13 10.1007/978-3-319-56617-7_4 10.14722/ndss.2020.24423 10.1145/2588555.2588572 10.1145/1180405.1180417 10.1155/2018/7383514 |
| ContentType | Journal Article |
| Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
| Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
| DBID | AAYXX CITATION 3V. 7SC 7SP 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PRINS Q9U |
| DOI | 10.1007/s11036-021-01836-z |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts Electronics & Communications Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium [ProQuest] Technology collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global (OCUL) Computing Database Advanced Technologies & Aerospace Collection ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Pharma Collection ProQuest Central China ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) Business Premium Collection (Alumni) |
| DatabaseTitleList | ABI/INFORM Global (Corporate) |
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1572-8153 |
| EndPage | 430 |
| ExternalDocumentID | 10_1007_s11036_021_01836_z |
| GrantInformation_xml | – fundername: Natural Science Foundation of TianJin grantid: 17JCZDJC30500 – fundername: National Key R&D Program of China grantid: 2018YFA0704703 – fundername: National Natural Science Foundation of China grantid: 61972215; 61702399; 61972073 funderid: https://doi.org/10.13039/501100001809 |
| GroupedDBID | -59 -5G -BR -EM -Y2 -~C -~X .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 29~ 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 85S 8AO 8FE 8FG 8FL 8FW 8TC 8UJ 8US 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYOK AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACM ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADL ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFEXP AFFNX AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCEE ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DWQXO EBLON EBS EDO EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GROUPED_ABI_INFORM_RESEARCH GXS H13 HCIFZ HF~ HG5 HG6 HGAVV HMJXF HQYDN HRMNR HVGLF HZ~ I-F I07 I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Y I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M4Y MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCO SCV SDH SDM SHX SISQX SJN SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TN5 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 W7O WK8 YLTOR Z45 Z7R Z7X Z7Z Z81 Z83 Z88 Z8M Z8R Z8T Z8W Z92 ZMTXR _50 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AETEA AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PUEGO 7SC 7SP 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c270t-3092364db116c153d8af06837895cc8db0f279e6ee5ebad753ee4762115ff0ad3 |
| IEDL.DBID | U2A |
| ISSN | 1383-469X |
| IngestDate | Sat Aug 23 13:03:32 EDT 2025 Wed Oct 01 02:45:40 EDT 2025 Fri Feb 21 02:47:39 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Structured query language (SQL) Data privacy Multi-user shared Searchable encryption |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c270t-3092364db116c153d8af06837895cc8db0f279e6ee5ebad753ee4762115ff0ad3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2642623975 |
| PQPubID | 26070 |
| PageCount | 14 |
| ParticipantIDs | proquest_journals_2642623975 crossref_primary_10_1007_s11036_021_01836_z springer_journals_10_1007_s11036_021_01836_z |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20220200 2022-02-00 20220201 |
| PublicationDateYYYYMMDD | 2022-02-01 |
| PublicationDate_xml | – month: 2 year: 2022 text: 20220200 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationSubtitle | The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing |
| PublicationTitle | Mobile networks and applications |
| PublicationTitleAbbrev | Mobile Netw Appl |
| PublicationYear | 2022 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parall Distkbuted Syst. (27)951–963. https://doi.org/10.1109/TPDS.2015.2401003 Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption improved definitions and efficient constructions Wong WK, Kao B, Cheung DW-L, Li R, Yiu S-M (2014) Secure query processing with data interoperability in a cloud database environment. In: The 2014 ACM SIGMOD conference, pp 1395–1406. https://doi.org/10.1145/2588555.2588572 Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parall Distkbuted Syst. (25)222–233. https://doi.org/10.1109/TPDS.2013.45 GuptaMBBAn efficient KP design framework of attribute-based searchable encryption for user level revocation in cloudConcurr Comput Pract Exp20203218117 Xu L, Yuan X, Wang C, Wang Q, Xu C (2019) Hardening database padding for searchable encryption. In: The 2019 IEEE conference on computer communications, pp 2503–2511. https://doi.org/10.1109/INFOCOM.2019.8737588 JiangSZhuXGuoLLiuJPublicly verifiable boolean query over outsourced encrypted dataIEEE Transa Cloud Comput201973799813 Demertzis I, Chamani J G, Papadopoulos D, Papamanthou C (2020) Dynamic searchable encryption with small client storage. In: The 27th annual network and distributed system security symposium, pp 1–18 Olumofin I, Goldberg I (2012) Revisiting the computational practicality of private information retrieval. In: The 16th international conference on financial cryptography and data security, pp 158–172 YuanXYuanXZhangYLiBWangCEnabling encrypted boolean queries in geographically distributed databasesIEEE Trans Parall Distrib Syst2020313634646 Ronald R L, Len A, Michael D L (1978) On data banks and privacy homomorphisms. Foundations of Secure Computation (4)169–180 JiangSZhuXGuoLLiuJPublicly verifiable boolean query over outsourced encrypted dataIEEE Trans Cloud Comput201973799813 WangDChengHWangPHuangXJianGZipf’s law in passwordsIEEE Trans Inf Forensics Sec2017121127762791 Raluca AP, Catherine MSR, Nickolai Z (2011) Cryptdb: Protecting confidentiality with encrypted query processing. In: The 23rd ACM Symposium on operating systems principles, pp 85–100 Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: The 21st annual international cryptology conference, pp 213–229 LiRLiuAXWangALBruhadeshwarBFast and scalable range query processing with strong privacy protection for cloud computingIEEE/ACM Trans Netw20162423052318https://doi.org/10.1109/TNET.2015.2457493 Chen Y, Xie X, Wang P, Tso R (2019) Witness-based searchable encryption with optimal overhead for cloud-edge computing. Future Generation Computer System (100)715–723. https://doi.org/10.1016/j.future.2019.05.038 Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: The 21st IEEE Symp on security and privacy, pp 44–55. https://doi.org/10.1109/SECPRI.2000.848445 Zhang Z, Wang J, Wang Y, Su Y, Chen X (2019) Towards efficient verifiable forward secure searchable symmetric encryption. In: The 24rd European symposium on research in computer security, pp 304–321 Kamara S, Moataz T (2017) Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: the 36th Annual international conference on the theory and applications of cryptographic techniques, pp 94–124 NingJXuJLiangKZhangFChangEPassive attacks against searchable encryptionIEEE Trans Inf Forens Secur2019143789802 Wang C, Wang D, Tu Y, Xu G, Wang H (2020) Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2020.2974220 Golle P, Staddon J, Waters BR (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 31–45. https://doi.org/10.1007/978-3-540-24852-1-3 Karras P, Nikitin A, Saad M, Bhatt R, Antyukhov D, Idreos S (2016) Adaptive indexing over encrypted numeric data. In: The 2016 International conference on management of data, pp 171–183 Liu G, Yang G, Wang H, Xiang Y, Dai H (2018) A novel secure scheme for supporting complex sql queries over encrypted databases in cloud computing. Secur Commun Netw. 7383514:1–7383514:15. https://doi.org/10.1155/2018/7383514 WangDLiWWangPMeasuring two-factor authentication schemes for real-time data access in industrial wireless sensor networksIEEE Trans Industrial Inf201814940814092 Azraoui M, Önen M., Molva R (2018) Framework for searchable encryption with sql databases. In: The 8th International conference on cloud computing and services science, pp 57–67. https://doi.org/10.5220/0006666100570067 Zhang R, Xue R, Yu T, Liu L (2016) Pvsae: A public verifiable searchable encryption service framework for outsourced encrypted data. In: The 2016 IEEE international conference on web services, pp 428–435. https://doi.org/10.1109/ICWS.2016.62 Yu Z, Gao C, Jing Z, Gupta B B, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access (6):31918–31923 Patel S, Persiano G, Yeo K (2018) Symmetric searchable encryption with sharing and unsharing. In: The 23rd European symposium on research in computer security, pp 207– 227 Goh E-J (2003) Secure indexes, IACR ePrint Cryptography Archive Dua D, Graff C (2020) UCI machine learning repository. http://archive.ics.uci.edu/ml D Wang (1836_CR30) 2018; 14 J Ning (1836_CR22) 2019; 14 1836_CR2 S Jiang (1836_CR29) 2019; 7 1836_CR3 1836_CR1 D Wang (1836_CR32) 2017; 12 1836_CR6 1836_CR15 1836_CR7 1836_CR16 1836_CR4 1836_CR17 1836_CR5 1836_CR19 1836_CR8 1836_CR9 1836_CR31 1836_CR10 X Yuan (1836_CR26) 2020; 31 1836_CR11 1836_CR12 1836_CR13 1836_CR14 MBB Gupta (1836_CR25) 2020; 32 R Li (1836_CR18) 2016; 24 1836_CR27 1836_CR28 S Jiang (1836_CR24) 2019; 7 1836_CR20 1836_CR21 1836_CR23 |
| References_xml | – reference: Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: The 21st IEEE Symp on security and privacy, pp 44–55. https://doi.org/10.1109/SECPRI.2000.848445 – reference: Dua D, Graff C (2020) UCI machine learning repository. http://archive.ics.uci.edu/ml – reference: Golle P, Staddon J, Waters BR (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 31–45. https://doi.org/10.1007/978-3-540-24852-1-3 – reference: JiangSZhuXGuoLLiuJPublicly verifiable boolean query over outsourced encrypted dataIEEE Trans Cloud Comput201973799813 – reference: Wong WK, Kao B, Cheung DW-L, Li R, Yiu S-M (2014) Secure query processing with data interoperability in a cloud database environment. In: The 2014 ACM SIGMOD conference, pp 1395–1406. https://doi.org/10.1145/2588555.2588572 – reference: Ronald R L, Len A, Michael D L (1978) On data banks and privacy homomorphisms. Foundations of Secure Computation (4)169–180 – reference: Patel S, Persiano G, Yeo K (2018) Symmetric searchable encryption with sharing and unsharing. In: The 23rd European symposium on research in computer security, pp 207– 227 – reference: GuptaMBBAn efficient KP design framework of attribute-based searchable encryption for user level revocation in cloudConcurr Comput Pract Exp20203218117 – reference: Raluca AP, Catherine MSR, Nickolai Z (2011) Cryptdb: Protecting confidentiality with encrypted query processing. In: The 23rd ACM Symposium on operating systems principles, pp 85–100 – reference: NingJXuJLiangKZhangFChangEPassive attacks against searchable encryptionIEEE Trans Inf Forens Secur2019143789802 – reference: Chen Y, Xie X, Wang P, Tso R (2019) Witness-based searchable encryption with optimal overhead for cloud-edge computing. Future Generation Computer System (100)715–723. https://doi.org/10.1016/j.future.2019.05.038 – reference: JiangSZhuXGuoLLiuJPublicly verifiable boolean query over outsourced encrypted dataIEEE Transa Cloud Comput201973799813 – reference: Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parall Distkbuted Syst. (27)951–963. https://doi.org/10.1109/TPDS.2015.2401003 – reference: Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption improved definitions and efficient constructions – reference: Yu Z, Gao C, Jing Z, Gupta B B, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access (6):31918–31923 – reference: Kamara S, Moataz T (2017) Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: the 36th Annual international conference on the theory and applications of cryptographic techniques, pp 94–124 – reference: Zhang Z, Wang J, Wang Y, Su Y, Chen X (2019) Towards efficient verifiable forward secure searchable symmetric encryption. In: The 24rd European symposium on research in computer security, pp 304–321 – reference: Wang C, Wang D, Tu Y, Xu G, Wang H (2020) Understanding node capture attacks in user authentication schemes for wireless sensor networks. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2020.2974220 – reference: Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parall Distkbuted Syst. (25)222–233. https://doi.org/10.1109/TPDS.2013.45 – reference: Azraoui M, Önen M., Molva R (2018) Framework for searchable encryption with sql databases. In: The 8th International conference on cloud computing and services science, pp 57–67. https://doi.org/10.5220/0006666100570067 – reference: Goh E-J (2003) Secure indexes, IACR ePrint Cryptography Archive – reference: LiRLiuAXWangALBruhadeshwarBFast and scalable range query processing with strong privacy protection for cloud computingIEEE/ACM Trans Netw20162423052318https://doi.org/10.1109/TNET.2015.2457493 – reference: Karras P, Nikitin A, Saad M, Bhatt R, Antyukhov D, Idreos S (2016) Adaptive indexing over encrypted numeric data. In: The 2016 International conference on management of data, pp 171–183 – reference: Demertzis I, Chamani J G, Papadopoulos D, Papamanthou C (2020) Dynamic searchable encryption with small client storage. In: The 27th annual network and distributed system security symposium, pp 1–18 – reference: YuanXYuanXZhangYLiBWangCEnabling encrypted boolean queries in geographically distributed databasesIEEE Trans Parall Distrib Syst2020313634646 – reference: Olumofin I, Goldberg I (2012) Revisiting the computational practicality of private information retrieval. In: The 16th international conference on financial cryptography and data security, pp 158–172 – reference: WangDLiWWangPMeasuring two-factor authentication schemes for real-time data access in industrial wireless sensor networksIEEE Trans Industrial Inf201814940814092 – reference: Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: The 21st annual international cryptology conference, pp 213–229 – reference: Liu G, Yang G, Wang H, Xiang Y, Dai H (2018) A novel secure scheme for supporting complex sql queries over encrypted databases in cloud computing. Secur Commun Netw. 7383514:1–7383514:15. https://doi.org/10.1155/2018/7383514 – reference: Zhang R, Xue R, Yu T, Liu L (2016) Pvsae: A public verifiable searchable encryption service framework for outsourced encrypted data. In: The 2016 IEEE international conference on web services, pp 428–435. https://doi.org/10.1109/ICWS.2016.62 – reference: Xu L, Yuan X, Wang C, Wang Q, Xu C (2019) Hardening database padding for searchable encryption. In: The 2019 IEEE conference on computer communications, pp 2503–2511. https://doi.org/10.1109/INFOCOM.2019.8737588 – reference: WangDChengHWangPHuangXJianGZipf’s law in passwordsIEEE Trans Inf Forensics Sec2017121127762791 – ident: 1836_CR19 doi: 10.1145/2882903.2882932 – ident: 1836_CR7 doi: 10.1007/978-3-540-24852-1-3 – ident: 1836_CR13 doi: 10.1007/978-3-030-29962-0_15 – volume: 14 start-page: 789 issue: 3 year: 2019 ident: 1836_CR22 publication-title: IEEE Trans Inf Forens Secur doi: 10.1109/TIFS.2018.2866321 – volume: 7 start-page: 799 issue: 3 year: 2019 ident: 1836_CR29 publication-title: IEEE Trans Cloud Comput doi: 10.1109/TCC.2017.2684811 – volume: 32 start-page: 1 issue: 18 year: 2020 ident: 1836_CR25 publication-title: Concurr Comput Pract Exp – volume: 12 start-page: 2776 issue: 11 year: 2017 ident: 1836_CR32 publication-title: IEEE Trans Inf Forensics Sec doi: 10.1109/TIFS.2017.2721359 – ident: 1836_CR14 – ident: 1836_CR12 doi: 10.1007/978-3-319-98989-1_11 – volume: 24 start-page: 2305 year: 2016 ident: 1836_CR18 publication-title: IEEE/ACM Trans Netw doi: 10.1109/TNET.2015.2457493 – ident: 1836_CR2 doi: 10.1016/j.future.2019.05.038 – ident: 1836_CR8 doi: 10.1109/TPDS.2013.45 – ident: 1836_CR5 doi: 10.1109/SECPRI.2000.848445 – ident: 1836_CR20 doi: 10.5220/0006666100570067 – ident: 1836_CR21 doi: 10.1109/ACCESS.2018.2840119 – ident: 1836_CR15 doi: 10.1007/978-3-642-27576-0_13 – ident: 1836_CR28 – volume: 31 start-page: 634 issue: 3 year: 2020 ident: 1836_CR26 publication-title: IEEE Trans Parall Distrib Syst doi: 10.1109/TPDS.2019.2940945 – ident: 1836_CR31 doi: 10.1109/TDSC.2020.2974220 – ident: 1836_CR6 – ident: 1836_CR10 doi: 10.1109/TPDS.2015.2401003 – ident: 1836_CR11 doi: 10.1109/ICWS.2016.62 – volume: 14 start-page: 4081 issue: 9 year: 2018 ident: 1836_CR30 publication-title: IEEE Trans Industrial Inf doi: 10.1109/TII.2018.2834351 – ident: 1836_CR1 doi: 10.1109/INFOCOM.2019.8737588 – ident: 1836_CR27 doi: 10.1007/3-540-44647-8_13 – ident: 1836_CR23 doi: 10.1007/978-3-319-56617-7_4 – volume: 7 start-page: 799 issue: 3 year: 2019 ident: 1836_CR24 publication-title: IEEE Transa Cloud Comput doi: 10.1109/TCC.2017.2684811 – ident: 1836_CR9 doi: 10.14722/ndss.2020.24423 – ident: 1836_CR16 doi: 10.1145/2588555.2588572 – ident: 1836_CR4 doi: 10.1145/1180405.1180417 – ident: 1836_CR3 – ident: 1836_CR17 doi: 10.1155/2018/7383514 |
| SSID | ssj0005584 |
| Score | 2.318628 |
| Snippet | Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 417 |
| SubjectTerms | Access control Algorithms Cloud computing Communications Engineering Computer Communication Networks Cryptography Electrical Engineering Encryption Engineering IT in Business Networks Privacy |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV09T8MwED2VdoEB8SkKBXlgA4vUjZ1kQAhQqwqVitIidYsc29lISz8G-uvxOYkCSDBHsqI7--75fPcewCXjLEjwduJzrakvpKARkym1YDTQWirBndbh81D03_ynKZ_WYFjOwmBbZRkTXaDWM4U18hubuJlN1VHA7-YfFFWj8HW1lNCQhbSCvnUUY1vQYMiMVYfGQ3f48lo1ffAwl7kNO_bHomkxRpMP07WRnBdbFjy7zwXd_ExVFf789WTqMlFvD3YLCEnuc5_vQ81kB7DzjVjwEAYT1w27JG6-lmIlguSNxTgpRbqZWny6WEHG1mnvhmA5lqDCp0XjxOJYMh4NyGiNLMjLI3jrdSePfVroJlDFAm9FO16EtPA6abeFshFNhzL1BDLHR1ypUCdeyoLICGO4SaS2FxZjfBsULThMU0_qzjHUs1lmToDIkBmkhOeR17FpjMkQGeuVpwIT8TRMm3BVmiie5_QYcUWEjAaNrUFjZ9B404RWacW4OCrLuHJsE65Ly1af_17t9P_VzmCb4aiC67BuQX21WJtzCyBWyUWxK74A3lTAvw priority: 102 providerName: ProQuest |
| Title | Towards Multi-user Searchable Encryption Scheme with Support for SQL Queries |
| URI | https://link.springer.com/article/10.1007/s11036-021-01836-z https://www.proquest.com/docview/2642623975 |
| Volume | 27 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1572-8153 dateEnd: 20241102 omitProxy: false ssIdentifier: ssj0005584 issn: 1383-469X databaseCode: ADMLS dateStart: 20080101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1572-8153 dateEnd: 20241102 omitProxy: true ssIdentifier: ssj0005584 issn: 1383-469X databaseCode: BENPR dateStart: 19990101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1572-8153 dateEnd: 20241102 omitProxy: true ssIdentifier: ssj0005584 issn: 1383-469X databaseCode: 8FG dateStart: 19990101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1572-8153 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0005584 issn: 1383-469X databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1572-8153 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0005584 issn: 1383-469X databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED3RdoEB8SkKpfLABpZSJ87HWFDaCkpFaSuVKXJiZyOgph3or-fsJAogGJgyJHKk5_Pds333DuCKcebFenficCmp4wqXBkykFMmoJ6VIXG56HT5O3NHCuV_yZVkUllfZ7tWVpPHUdbFbT4vn6pQCC-3QpdsGtLiW80IrXrB-ndjB_aKVrW_jz4NlWSrz-xjfw1HNMX9ci5poMziA_ZImkn4xr4ewo7Ij2PsiHngM47nJeM2JqaGl-rSBFMnDuhqKhFmy-jD-gMxwYl4V0UeuRHfxRMZNkKuS2XRMphutdJyfwGIQzu9GtOyNQBPmWWtqW4GWfpdxr-cm6LWkL1LL1erwAU8SX8ZWyrxAuUpxFQuJmxKlHHR8SADT1BLSPoVm9papMyDCZ0rLvvPAsjFUMeFrVfrESjwV8NRP23BdQRS9FxIYUS12rAGNENDIABpt29CpUIzK5ZBHyLoY8qzA4224qZCtX_892vn_Pr-AXabLE0xWdQea69VGXSJpWMddaPiDYRda_eHLQ4jP23Dy9Nw1lvMJN727qQ |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NT9tAEB2FcIAeUEtBBCjdAz2VFc7a649DVBUISkqI-AhSbma9u76RUBKE4Mfx25hZ23Kp1N5ytrSSn2dn3q5n3gPYF1JEGZ1OAmkMD0IV8kSonCMZjYxROpTO6_B8GPZugl9jOW7AazULQ22VVU50idpMNd2RH2LhFliqk0j-uP_NyTWK_q5WFhqqtFYwHScxVg52nNnnJzzCzTr9E_ze34Q47Y6Oe7x0GeBaRN6c-15CIuoma7dDjfvfxCr3QtJZT6TWscm8XESJDa2VNlMG6b21AaYQpFJ57inj47pLsBz4-HZNWD7qDi-u6iYTGRe2urGPQCTjcmynGN5rkxgwtUh4uK9C_vK-NNZ8969ftK7ynX6EtZKysp9FjH2Chp2sw4c_hAw_w2Dkum9nzM3zcrr5YEUjM01mse5EPzy73MSuMUjuLKPrX0aOosj-GfJmdn05YJePpLo824CbhSC4Cc3JdGK3gKlYWJKgl4nnY9kUKiaFfO3pyCYyj_MWfK8gSu8LOY60Fl4mQFMENHWApi8t2K1QTMutOUvrQGrBQYVs_fjfq23_f7WvsNIbnQ_SQX94tgOrgsYkXHf3LjTnD4_2C5KXebZXRgiD20UH5RtChv2F |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB2xSAgOiFWU1Qc4gUXqxlkOCCHasrQgKkDqLSS2cyMsLULtp_F1zDiJAkhw4xzJh5fxzLP95g3ArpDCT-h04kqtuevFHg9FnHIko77WsfKknXV4de2d37uXfdmfgI-yF4ZklWVOtIlaPym6Iz_Ewi2wVIe-PEwLWcRNs338_MJpghS9tJbjNPIQ6ZjROx7fBkcXTfzXe0K0W3en57yYMMCV8J0hbzghGajrpF73FO59HcSp45HHeiiVCnTipMIPjWeMNEmskdob42L6QBqVpk6sG7juJEz75OJOXerts0peIoN8oG7QQAjCftGwk7ft1ckGmMQRDu4oj4-_F8WK6f54nLU1r70A8wVZZSd5dC3ChMmWYO6LheEydO-s7nbAbCcvpzsPlkuYqSeLtTL1OrJZid1ieDwaRhe_jGaJIu9nyJjZba_Lem_ktzxYgft_wW8VprKnzKwBiwNhyHxehk4DC6aIA_LGV47yTSjTIK3BfglR9JwbcUSV5TIBGiGgkQU0Gtdgs0QxKjblIKpCqAYHJbLV599XW_97tR2YwVCMuhfXnQ2YFdQfYWXdmzA1fH0zW8hahsm2DQ8GD_8dj59Frvsf |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Towards+Multi-user+Searchable+Encryption+Scheme+with+Support+for+SQL+Queries&rft.jtitle=Mobile+networks+and+applications&rft.au=Li%2C+Mingyue&rft.au=Du%2C+Ruizhong&rft.au=Jia%2C+Chunfu&rft.date=2022-02-01&rft.issn=1383-469X&rft.eissn=1572-8153&rft.volume=27&rft.issue=1&rft.spage=417&rft.epage=430&rft_id=info:doi/10.1007%2Fs11036-021-01836-z&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s11036_021_01836_z |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1383-469X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1383-469X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1383-469X&client=summon |