TY - GEN
T1 - Ensuring correctness of range searches on encrypted cloud data
AU - Tseng, Fu Kuo
AU - Liu, Yung Hsiang
AU - Chen, Rong-Jaye
PY - 2012
Y1 - 2012
N2 - We target at one newly introduced security concern which is not fully addressed when moving (encrypted) data to the cloud, namely, the security of the search results from the cloud. The cloud storage provider (CSP) might be compromised or simply act maliciously for their own good, which yields incorrect search results. In this paper, we exploit hidden vector encryption to tackle this important security problem. Our construction enables CSPs to provide a proof of the search results to be verified later by the cloud storage users. In particular, this proposed scheme handles equality and range searches on encrypted data. Users can verified the correctness of the search results without decrypting for the corresponding file contents. Any tampering with the search results by CSPs will be caught, while any incorrect charge against CSPs for tampering search results can be rectified. Finally, we present extensive security and performance analysis to show the security and practicality of our scheme.
AB - We target at one newly introduced security concern which is not fully addressed when moving (encrypted) data to the cloud, namely, the security of the search results from the cloud. The cloud storage provider (CSP) might be compromised or simply act maliciously for their own good, which yields incorrect search results. In this paper, we exploit hidden vector encryption to tackle this important security problem. Our construction enables CSPs to provide a proof of the search results to be verified later by the cloud storage users. In particular, this proposed scheme handles equality and range searches on encrypted data. Users can verified the correctness of the search results without decrypting for the corresponding file contents. Any tampering with the search results by CSPs will be caught, while any incorrect charge against CSPs for tampering search results can be rectified. Finally, we present extensive security and performance analysis to show the security and practicality of our scheme.
KW - cloud computing
KW - cloud storage
KW - correctness of search result
KW - hidden vector encryption
KW - range search
UR - http://www.scopus.com/inward/record.url?scp=84874227173&partnerID=8YFLogxK
U2 - 10.1109/CloudCom.2012.6427558
DO - 10.1109/CloudCom.2012.6427558
M3 - Conference contribution
AN - SCOPUS:84874227173
SN - 9781467345095
T3 - CloudCom 2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing Technology and Science
SP - 570
EP - 573
BT - CloudCom 2012 - Proceedings
T2 - 2012 4th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2012
Y2 - 3 December 2012 through 6 December 2012
ER -