? 数据库系统中抗内部攻击的关键字搜索机制
Journal of Computer Science and Technology
Quick Search in JCST
 Advanced Search 
      Home | PrePrint | SiteMap | Contact Us | Help
 
Indexed by   SCIE, EI ...
Bimonthly    Since 1986
Journal of Computer Science and Technology 2017, Vol. 32 Issue (3) :599-617    DOI: 10.1007/s11390-017-1745-8
Theory and Algorithms << Previous Articles | Next Articles >>
数据库系统中抗内部攻击的关键字搜索机制
Peng Jiang1,2, Yi Mu2, Senior Member, IEEE, Fuchun Guo2, Qiao-Yan Wen1
1. State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications Beijing 100876, China;
2. Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong, Wollongong, NSW 2522, Australia
Private Keyword-Search for Database Systems Against Insider Attacks
Peng Jiang1,2, Yi Mu2, Senior Member, IEEE, Fuchun Guo2, Qiao-Yan Wen1
1. State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications Beijing 100876, China;
2. Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong, Wollongong, NSW 2522, Australia

摘要
参考文献
相关文章
Download: [PDF 999KB]  
摘要 关键字搜索加密在不需要解密的情况下,提供了一种数据检索的有效方法。关键字搜索加密主要包括两种技术,对称关键词搜索加密(SSE)和公钥关键词搜索加密(PEKS)。PEKS方案的提出,克服了SSE中复杂的密钥管理问题。然而,就安全性而言,PEKS只能抵抗较弱的外部攻击,却无法抵抗来自服务器(内部攻击者)的关键字猜测攻击。如何抵抗内部攻击仍然是一个具有挑战性的问题。本文首次提出了可抵抗内部攻击的关键字搜索加密(SEK-IA)框架,并重新定义其安全模型。在该框架下,本文设计了一个具有常数级陷门长度的SEK-IA方案并给出形式化的安全性证明。性能测试表明,在该方案中,接收者和服务器之间的通信代价是常数级的,与待搜索的发送者数量无关,而且接收者只花费最小的计算代价,以一个陷门可以搜索多个发送者的数据。
关键词公钥关键词搜索加密   关键字隐私   内部攻击   关键字密文检索     
Abstract: The notion of searchable encrypted keywords introduced an elegant approach to retrieve encrypted data without the need of decryption. Since the introduction of this notion, there are two main searchable encrypted keywords techniques, symmetric searchable encryption (SSE) and public key encryption with keyword search (PEKS). Due to the complicated key management problem in SSE, a number of concrete PEKS constructions have been proposed to overcome it. However, the security of these PEKS schemes was only weakly defined in presence of outsider attacks; therefore they suffer from keyword guessing attacks from the database server as an insider. How to resist insider attacks remains a challenging problem. We propose the first searchable encrypted keywords against insider attacks (SEK-IA) framework to address this problem. The security model of SEK-IA under public key environment is rebuilt. We give a concrete SEK-IA construction featured with a constant-size trapdoor and the proposed scheme is formally proved to be secure against insider attacks. The performance evaluations show that the communication cost between the receiver and the server in our SEK-IA scheme remains constant, independent of the sender identity set size, and the receiver needs the minimized computational cost to generate a trapdoor to search the data from multiple senders.
Keywordspublic key encryption with keyword search   keyword privacy   insider attack   searchable encrypted keyword     
本文基金:

This work is supported by the National Natural Science Foundation of China under Grant Nos. 61300181 and 61502044, and the Fundamental Research Funds for the Central Universities of China under Grant No. 2015RC23.

About author: Peng Jiang received her B.S. degree in mathematics from Southeast University, Nanjing, in 2010. She is currently a Ph.D. candidate in the Department of State Key Laboratory of Networking and Switch Technology, Beijing University of Posts and Telecommunications, Beijing. She is also a visiting Ph.D. student at the School of Computing and Information Technology, University of Wollongong, Wollongong. Her research interests include information security and privacy concerns.
引用本文:   
Peng Jiang, Yi Mu, Fuchun Guo, Qiao-Yan Wen.数据库系统中抗内部攻击的关键字搜索机制[J]  Journal of Computer Science and Technology , 2017,V32(3): 599-617
Peng Jiang, Yi Mu, Fuchun Guo, Qiao-Yan Wen.Private Keyword-Search for Database Systems Against Insider Attacks[J]  Journal of Computer Science and Technology, 2017,V32(3): 599-617
链接本文:  
http://jcst.ict.ac.cn:8080/jcst/CN/10.1007/s11390-017-1745-8
Copyright 2010 by Journal of Computer Science and Technology