Public Key Encryption with Equality Test in a Cloud Environment
With the rapid development and wide application of cloud computing and 5G communication, the number of mobile users is increasing rapidly, meaning that cloud storage services are receiving more and more attention.
Ping Zhang, Jinbo Li, Zhumu Fu
doaj +1 more source
Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability
In 2009, Jeong et al. proposed a new searchable encryption scheme with keyword-recoverability which is secure even if the adversaries have any useful partial information about the keyword. They also proposed an extension scheme for multi-keywords. However, this paper demonstrates that Jeong et al.'s schemes are vulnerable to off-line keyword guessing ...
Eun-Jun YOON, Kee-Young YOO
openaire +2 more sources
Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment [PDF]
Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis.
Blass +7 more
core +2 more sources
A practical attack on the fixed RC4 in the wep mode [PDF]
. In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also known as Jenkins’ correlation or the RC4 glimpse, can be used to attack RC4
A. Maximov +14 more
core +1 more source
Split keyword fuzzy and synonym search over encrypted cloud data [PDF]
A substitute solution for various organizations of data owners to store their data in the cloud using storage as a service(SaaS). The outsourced sensitive data is encrypted before uploading into the cloud to achieve data privacy.
Buyya., R. +6 more
core +1 more source
IGSK: Index Generation on Split Keyword for search over cloud data [PDF]
Storage as a Service (Saas) of cloud computing has become an alternative option for data owners of various organizations to store their data into the cloud. Usually sensitive data is encrypted to achieve data security and then it is outsourced into cloud.
Geetaa, C.M. +5 more
core +1 more source
Efficient Conjunctive Keywords Search over Encrypted E-Mail Data in Public Key Setting
Searchable public key encryption supporting conjunctive keywords search (SPE-CKS) enables data users to retrieve the encrypted data of interest from an untrusted server. Based on SPE-CKS, one can realize a multi-keywords search over the encrypted e-mails.
Yu Zhang, Yin Li, Yifan Wang
doaj +1 more source
SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks [PDF]
A number of searchable encryption schemes have been widely proposed to solve the search problem in ciphertext domain. However, most existing searchable encryption schemes are vulnerable to keyword guessing attacks. During keyword guessing attacks, with the help of the cloud, an adversary will learn what keyword a given trapdoor is searching for, which ...
Hongyuan Chen +3 more
openaire +2 more sources
Novel Multi-Keyword Search on Encrypted Data in the Cloud
Searching on encrypted data has become a very important technique in cloud computing. Such searches enable the data owner to search on the encrypted data stored on the cloud without leaking any information.
Yunyun Wu +4 more
doaj +1 more source
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data [PDF]
Searchable Encryption is an emerging cryptographic technique that enables searching capabilities over the encrypted data on the cloud. In this paper, a novel searchable encryption scheme for the client-server architecture has been presented.
Glackin, C. +4 more
core +1 more source

