2021
DOI: 10.1109/tcc.2017.2709318
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data

Abstract: Secure search techniques over encrypted cloud data allow an authorized user to query data files of interest by submitting encrypted query keywords to the cloud server in a privacy-preserving manner. However, in practice, the returned query results may be incorrect or incomplete in the dishonest cloud environment. For example, the cloud server may intentionally omit some qualified results to save computational resources and communication overhead. Thus, a well-functioning secure query system should provide a qu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 39 publications
0
13
0
Order By: Relevance
“…257 Hence, various researchers [27][28][29]43,50,55,70,75,[257][258][259] have incorporated the concept of result verification to searchable encryption. As an example, there may be a scenario where, during peak hours, the cloud server forwards incomplete or forged results to the end users.…”
Section: Support For Results Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…257 Hence, various researchers [27][28][29]43,50,55,70,75,[257][258][259] have incorporated the concept of result verification to searchable encryption. As an example, there may be a scenario where, during peak hours, the cloud server forwards incomplete or forged results to the end users.…”
Section: Support For Results Verificationmentioning
confidence: 99%
“…There is also a possibility that the cloud server may claim that there is no matching document corresponding to a search query, whereas, actually, documents with the search keywords exist. 257 Hence, various researchers [27][28][29]43,50,55,70,75,[257][258][259] have incorporated the concept of result verification to searchable encryption. 260 Result verification includes correctness, ie, the results retrieved corresponding to the query actually exist in the database and are unmodified; completeness, ie, all the relevant documents are retrieved, which means none of the qualified documents are omitted; and freshness, ie, the latest copy/version of the documents is returned to the end user.…”
Section: Support For Results Verificationmentioning
confidence: 99%
“…Recently, the dynamic SE schemes are further investigated in [8][9][10] to achieve better efficiency and security. To allow for the correctness and completeness verification of search results, the verifiable SE was introduced by Kurosawa and Ohtaki [11] against the unreliable server [12], which may return incorrect and incomplete search results to the data user. By using the emerging blockchain technique, decentralized SE schemes are designed in [13,14], which can ensure that the data user can always receive the correct and complete search results.…”
Section: Searchable Encryptionmentioning
confidence: 99%
“…SearchNode(I(w), ST u ( w), r) = e(g, g) sq r (0)H( w) = e(g, g) syH( w) = e(g y , g) sH( w) = e(g 1 , g) sH( w) = I (12)…”
Section: Searchmentioning
confidence: 99%
“…Various privacy enhancing technologies have been developed toward addressing the aforementioned privacy vs. data utilization dilemma. For instance, the client can use special encryption techniques such as SQL-aware encryption (e.g., [1], [2]) or searchable encryption with various security, efficiency and query functionality trade-offs (e.g., [3], [4], [5], [6], [7], [8], [9], [10]) to achieve the data confidentiality and usability on the cloud. However, even such encryption techniques might not be sufficient for privacycritical database applications (e.g., healthcare) since sensi- tive information may be revealed through access patterns when the client execute encrypted queries on the encrypted database.…”
Section: Introductionmentioning
confidence: 99%