Ensuring correctness of range searches on encrypted cloud data

Fu Kuo Tseng*, Yung Hsiang Liu, Rong-Jaye Chen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

We target at one newly introduced security concern which is not fully addressed when moving (encrypted) data to the cloud, namely, the security of the search results from the cloud. The cloud storage provider (CSP) might be compromised or simply act maliciously for their own good, which yields incorrect search results. In this paper, we exploit hidden vector encryption to tackle this important security problem. Our construction enables CSPs to provide a proof of the search results to be verified later by the cloud storage users. In particular, this proposed scheme handles equality and range searches on encrypted data. Users can verified the correctness of the search results without decrypting for the corresponding file contents. Any tampering with the search results by CSPs will be caught, while any incorrect charge against CSPs for tampering search results can be rectified. Finally, we present extensive security and performance analysis to show the security and practicality of our scheme.

Original languageEnglish
Title of host publicationCloudCom 2012 - Proceedings
Subtitle of host publication2012 4th IEEE International Conference on Cloud Computing Technology and Science
Pages570-573
Number of pages4
DOIs
StatePublished - 2012
Event2012 4th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2012 - Taipei, Taiwan
Duration: 3 Dec 20126 Dec 2012

Publication series

NameCloudCom 2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing Technology and Science

Conference

Conference2012 4th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2012
Country/TerritoryTaiwan
CityTaipei
Period3/12/126/12/12

Keywords

  • cloud computing
  • cloud storage
  • correctness of search result
  • hidden vector encryption
  • range search

Fingerprint

Dive into the research topics of 'Ensuring correctness of range searches on encrypted cloud data'. Together they form a unique fingerprint.

Cite this