2016
DOI: 10.3390/fi8030028
|View full text |Cite
|
Sign up to set email alerts
|

Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup

Abstract: Existing Searchable Encryption (SE) solutions are able to handle simple Boolean search queries, such as single or multi-keyword queries, but cannot handle substring search queries over encrypted data that also involve identifying the position of the substring within the document. These types of queries are relevant in areas such as searching DNA data. In this paper, we propose a tree-based Substring Position Searchable Symmetric Encryption (SSP-SSE) to overcome the existing gap. Our solution efficiently finds … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 31 publications
(73 reference statements)
0
11
0
Order By: Relevance
“…However, the authors did not measure the accuracy of the proposed scheme and the effect that the dummy keywords had on the precision. In [22], authors propose a multi-keyword SE encryption scheme and use homomorphic encryption for the index generation and the trapdoor generation. Although, due to the inefficiency of homomorphic encryption the scheme cannot be deployed onto a real world but they have implemented their scheme using multi-threading.…”
Section: Multi-abstractementioning
confidence: 99%
“…However, the authors did not measure the accuracy of the proposed scheme and the effect that the dummy keywords had on the precision. In [22], authors propose a multi-keyword SE encryption scheme and use homomorphic encryption for the index generation and the trapdoor generation. Although, due to the inefficiency of homomorphic encryption the scheme cannot be deployed onto a real world but they have implemented their scheme using multi-threading.…”
Section: Multi-abstractementioning
confidence: 99%
“…Leontiadis and Li [22] proposed a single-user scheme that achieves optimal storage cost for the cloud. Strizhov et al [23] proposed a substring position search scheme and can support multi-user based on the distributed broadcast encryption scheme and a multiparty key exchange protocol. In order to achieve stronger security such as access pattern hidden, and at the same time solving the substring search problem, Yu et al [24] proposed a single-user scheme that prevents the access pattern leakage by fully homomorphic encryption and burrows wheeler transform.…”
Section: ) Searchable Encryption For Substring Searchmentioning
confidence: 99%
“…The relevance of substring search queries for a variety of realworld applications fostered several research efforts to privately compute such queries. Some of these solutions [10,26,46] achieve bandwidth and computational costs depending only on m and o q , and require only a few communication rounds between the data owner and the untrusted server. Nonetheless, these solutions leak…”
Section: Introductionmentioning
confidence: 99%