Homomorphic Exclusive-or Operation Enhance Secure Searching on Cloud Storage

Homomorphic Exclusive-or Operation Enhance Secure Searching on Cloud Storage
Title:
Homomorphic Exclusive-or Operation Enhance Secure Searching on Cloud Storage
Other Titles:
Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on
Keywords:
Publication Date:
15 December 2014
Citation:
S. Q. Ren, B. H. M. Tany, S. Sundaram, T. Wang and K. M. M. Aung, "Homomorphic Exclusive-Or Operation Enhance Secure Searching on Cloud Storage," Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on, Singapore, 2014, pp. 989-994.
Abstract:
Enterprise cloud tenants would store their outsourced cloud data in encrypted form for data privacy and security. However, flexible data access functions such as data searching is usually sacrificed as a result. Thus, enterprise tenants demand secure data retrieval and computation solution from the cloud provider, which will allow them to utilize cloud services without the risks of leaking private data to outsiders and even service providers. In this paper, we propose an exclusive-or (XOR) homomorphism encryption scheme to support secure keyword searching on encrypted data. First, this scheme specifies a new data protection method by encrypting the data and randomizing it by performing XOR operation with a random bit-string. Second, this scheme can effectively protect data-in-transit against passive attack such as ciphertext analysis due to the randomization. Third, this scheme is lightweight and only requires a symmetric encryption scheme and bitwise operations, which requires processing time in the order of milliseconds.
License type:
PublisherCopyrights
Funding Info:
Description:
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.
ISBN:

Files uploaded: