用户名: 密码: 验证码:
An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services
详细信息    查看全文
  • 作者:Chun-Ta Li (1)
    Chin-Wen Lee (2)
    Jau-Ji Shen (2)

    1. Department of Information Management
    ; Tainan University of Technology ; 529 Zhongzheng Road ; Tainan City ; 71002 ; Taiwan ; ROC
    2. Department of Management Information Systems
    ; National Chung Hsing University ; 250 Guoguang Road ; Taichung City ; 40227 ; Taiwan ; ROC
  • 关键词:Cloud storage services ; Extended chaotic maps ; Off ; line keyword guessing attacks ; Keyword search
  • 刊名:Nonlinear Dynamics
  • 出版年:2015
  • 出版时间:May 2015
  • 年:2015
  • 卷:80
  • 期:3
  • 页码:1601-1611
  • 全文大小:724 KB
  • 参考文献:1. Baek, J, Safavi-Naini, R, Susilo, W (2008) Public key encryption with keyword search revisited. Lect. Notes Comput. Sci. 5072: pp. 1249-1259 CrossRef
    2. Bergamo, P., D鈥橝rco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. 52(7), 1382鈥?393 (2005)
    3. Boneh, D, Crescenzom, GD, Ostrovsky, R, Rersiano, G (2004) Public key encryption with keyword search. Lect. Notes Comput. Sci. 3027: pp. 506-522 CrossRef
    4. Byun, JW, Rhee, HS, Park, HA, Lee, DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lect. Notes Comput. Sci. 4165: pp. 75-83 CrossRef
    5. Chung, PS, Liu, CW, Hwang, MS (2014) A study of attribute-based proxy re-encryption scheme in cloud environments. Int. J. Netw. Secur. 16: pp. 1-13 CrossRef
    6. Han, S, Chang, E (2009) Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fract. 39: pp. 1283-1289 CrossRef
    7. He, D, Chen, Y, Chen, J (2012) Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69: pp. 1149-1157 CrossRef
    8. Hsu, S.T., Hwang, M.S., Yang, C.C.: A study of keyword search over encrypted data in cloud storage service. Master Thesis of National Chung Hsing University, Department of Management Information System (2013)
    9. Hsu, ST, Yang, CC, Hwang, MS (2013) A study of public key encryption with keyword search. Int. J. Netw. Secur. 15: pp. 71-79
    10. Hu, C., Liu, P.: A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension. In: Advances in Computer Science, Environment, Ecoinformatics, and Education, Communications in Computer and Information Science, pp. 131鈥?36. Wuhan, China (2011)
    11. Lee, CC, Chen, CL, Wu, CY, Huang, SY (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69: pp. 79-87 CrossRef
    12. Lee, CC, Chung, PS, Hwang, MS (2013) A survey on attribute-based encryption schemes of access control in cloud environments. Int. J. Netw. Secur. 15: pp. 231-240
    13. Lee, CC, Hsu, CW (2013) A secure biometric-based remote user authentication with key agreement protocol using extended chaotic maps. Nonlinear Dyn. 71: pp. 201-211 CrossRef
    14. Lee, CC, Li, CT, Hsu, CW (2013) A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn. 73: pp. 125-132 CrossRef
    15. Li, C.T., Lee, C.W., Shen, J.J.: A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service. In: Proceedings of the 2015 International Conference on Information Networking, IEEE CS, pp. 31鈥?6. Siem Reap, Cambodia (2015)
    16. Li, C.T., Lee, C.C., Weng, C.Y.: An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4), 1133鈥?143 (2013)
    17. Li, CT, Shen, JJ, Lee, CW (2014) Security and efficiency analysis on a simple keyword search scheme over encrypted data in cloud storage services. Lect. Notes Comput. Sci. 8662: pp. 367-375 CrossRef
    18. Li, CT, Lee, CC, Weng, CY (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38: pp. 1-11 CrossRef
    19. Lv, C, Ma, M, Li, H, Ma, J, Zhang, Y (2013) An novel three-party authenticated key exchange protocol using one-time key. J. Netw. Comput. Appl. 36: pp. 498-503 CrossRef
    20. Mason, JC, Handscomb, DC (2003) Chebyshev Polynomials. Chapman and Hall/CRC Press, London
    21. Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 376鈥?79. Sydney, Australia (2009)
    22. Rhee, H.S., Park, J.H., Susilo, W., Kee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763鈥?71 (2010)
    23. Wei, L, Zhu, H, Cao, Z, Dong, X, Jia, W, Chen, Y, Vasilakos, AV (2014) Security and privacy for storage and computation in cloud computing. Inf. Sci. 258: pp. 371-386 CrossRef
    24. Yu, Y, Ni, J, Au, MH, Liu, H, Wang, H, Xu, C (2014) Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst. Appl. 41: pp. 7789-7796 CrossRef
    25. Yu, Y, Niu, L, Yang, G, Mu, Y, Susilo, W (2014) On the security of auditing mechanisms for secure cloud storage. Future Gener. Comput. Syst. 30: pp. 127-132 CrossRef
    26. Zhang, L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fract. 37: pp. 669-674 CrossRef
    27. Zhao, Y, Chen, X, Ma, H, Tang, Q, Zhu, H (2012) A new trapdoor-indistinguishable public key encryption with keyword search. J. Wirel. Mobile Netw. Ubiquitous Comput. Dependable Appl. 3: pp. 72-81
  • 刊物类别:Engineering
  • 刊物主题:Vibration, Dynamical Systems and Control
    Mechanics
    Mechanical Engineering
    Automotive and Aerospace Engineering and Traffic
  • 出版者:Springer Netherlands
  • ISSN:1573-269X
文摘
In this paper, we propose an extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services, which achieves the essential requirements of a secure cloud storage service. A secure cloud storage service has to satisfy five security requirements: consistency, ciphertext indistinguishability, trapdoor indistinguishability and resist off-line keyword guessing attacks (including off-line outside keyword guessing attack and off-line inside keyword guessing attack). Moreover, due to the characteristics of extended chaotic maps and session key establishment, which allow two communication parties to agree a common session key and the agreed session key is only known by the data sender and the authorized data receiver. Therefore, in this paper, we integrated the concept of session key establishment and extended chaotic maps into our proposed scheme which aims to resist the off-line keyword guessing attacks not only from the outside cloud attackers but also from an inside malicious cloud server. To the best of our knowledge, none of the recently proposed secure keyword search schemes can resist inside keyword guessing attacks and this work is the first attempt to provide a secure keyword search scheme without inside keyword guessing attacks in cloud storage services.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700