Please use this identifier to cite or link to this item:
|標題:||Authenticated Key Exchange and Keyword Search Schemes and Their Applications to Cloud Storage Service|
|關鍵字:||Authenticated Key Exchange|
Keyword search scheme
Cloud storage service
Off-line keyword guessing attack
|引用:|| J. Baek, R. Safavi-Naini and W. Susilo, 'Public key encryption with keyword search revisited,' in ICCSA 2008, LNCS, vol. 5072, pp. 1249–1259, 2008.  J. Baliga, R. W. A. Ayre, K. Hinton, and R. S. Tucker, 'Green cloud computing: Balancing energy in processing, storage, and transport,' in Proceedings of the IEEE, vol. 99, no. 1, pp. 149-167, 2011.  P. Bergamo, P. D'Arco, A. De Santis and L. Kocarev, 'Security of public-key cryptosystems based on Chebyshev polynomials,' IEEE Transaction on Circuits and System, vol. 52, no. 7, pp. 1382–1393, 2005.  D. Boneh, G. D. Crescenzom, R. Ostrovsky and G. Rersiano, 'Public key encryption with keyword search,' in Advance in Cryptology-EUROCRYPT 2004, LNCS, vol. 3027, pp. 506–522, 2004.  J. W. Byun, H. S. Rhee, H. A. Park and D. H. Lee, 'Off-line keyword guessing attacks on recent keyword search schemes over encrypted data,' in Secure Data Management, LNCS, vol. 4165, pp. 75–83, 2006.  P. S. Chung, C. W. Liu and M. S. Hwang, 'A study of attributebased proxy re-encryption scheme in cloud environments' International Journal of Network Security, vol. 16, no.1, pp. 1–13, 2014.  M. S. Farash and M. A. Attari, 'An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps,' Nonlinear Dynamics, vol. 77, no. 1-2, pp. 399-411, 2014.  P. Gong, P. Li and W. Shi, 'A secure chaotic maps-based key agreement protocol without using smart cards,' Nonlinear Dynamics, vol. 70, no. 4, pp. 2401-2406, 2012.  S. Han and E. Chang, 'Chaotic map based key agreement with/out clock synchronization,' Chaos, Solitons and Fractals, vol. 39, no. 3, pp. 1283–1289, 2009.  D. He, Y. Chen and J. Chen, 'Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol,' Nonlinear Dynamics, vol. 69, no. 3, pp. 1149–1157, 2012.  S. T. Hsu, M. S. Hwang and C. C. Yang, 'A study of keyword search over encrypted data in cloud storage service,' Master Thesis of National Chung Hsing University, Department of Management Information System, 2013.  S. T. Hsu, C. C. Yang and M. S. Hwang, 'A study of public key encryption with keyword search,' International Journal of Network Security, vol. 15, no. 2, pp. 71–79, 2013.  C. Hu and P. Liu, 'A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension,' in Advances in Computer Science, Environment, Ecoinformatics, and Education, Communications in Computer and Information Science, pp. 131–136, 2011, Wuhan, China.  J. J. Huang, W. S. Juang, C. I. Fan and H. T. Liaw, 'Robust and privacy protection authentication in cloud computing,' International Journal of Innovative Computing , Information and Control, vol. 9, no. 11, pp. 4247-4261, 2013.  A. Iosup, S. Ostermann, M. N. Yigitbasi, R. Prodan, T. Fahringer, and D. H. J. Epema, 'Performance analysis of cloud computing services for many-tasks scientific computing,' IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 6, pp. 931-945, 2011.  H. Lai, J. Xiao, L. Li, and Y. Yang, 'Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol,' Mathematical Problems in Engineering, Article ID: 454823, 2012.  C. C. Lee, C. L. Chen, C. Y. Wu and S. Y. Huang, 'An extended chaotic maps-based key agreement protocol with user anonymity,' Nonlinear Dynamics, vol. 69, no. 1–2, pp. 79–87, 2012.  C. C. Lee, P. S. Chung and M. S. Hwang, 'A survey on attribute-based encryption schemes of access control in cloud environments,' International Journal of Network Security, vol. 15, no. 4, pp. 231–240, 2013.  C. C. Lee and C. W. Hsu, 'A secure biometric-based remote user authentication with key agreement protocol using extended chaotic maps,' Nonlinear Dynamics, vol. 71, no. 1–2, pp. 201–211, 2013.  C. C. Lee, C. T. Li, S. T. Chiu, Y. M. Lai, 'A New Three-party Authenticated Key Agreement Scheme Based on Chaotic Maps without Password Table,' Nonlinear Dynamics, vol. 79, no. 4, pp. 2485-2495, 2015.  C. C. Lee, C. T. Li and C. W. Hsu, 'A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps,' Nonlinear Dynamics, vol. 73, no. 1–2, pp. 125–132, 2013.  C. T. Li, C. W. Lee and J. J. Shen, 'A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service' in Proceedings of the 2015 International Conference on Information Networking (ICOIN 2015), IEEE CS, pp. 31–36, 2015, Siem Reap, Cambodia.  C. T. Li, C. W. Lee and J. J. Shen, 'An Extended Chaotic Maps Based Keyword Search Scheme over Encrypted Data resist Outside and Inside Keyword Guessing Attacks in Cloud Storage Services,' Nonlinear Dynamics, vol. 80, no. 3, pp. 1601-1611, 2015.  C. T. Li, C. C. Lee and C. Y. Weng, 'A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems,' Journal of Medical Systems, vol. 38, no. 9, pp. 1–11, 2014.  C. T. Li, C. C. Lee and C. Y. Weng, 'An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments,' Nonlinear Dynamics, vol. 74, no. 4, pp. 1133–1143, 2013.  C. T. Li, J. J. Shen, C. W. Lee, 'Security and Efficiency Analysis on A Simple Keyword Search Scheme over Encrypted Data in Cloud Storage Services,' The 4th International Symposium on Cloud and Services Computing (SC2 2014), LNCS, vol. 8662, pp. 367-375, Springer, Switzerland (2014), September 01-03, 2014, Beijing, China.  C. Lv, M. Ma, H. Li, J. Ma and Y. Zhang, 'An novel three-party authenticated key exchange protocol using one-time key,' Journal of Network and Computer Applications, vol. 36, no. 1, pp. 498–503, 2013.  J. C. Mason, D. C. Handscomb, 'Chebyshev Polynomials,' Chapman and Hall/CRC Press, London, 2003.  D. Mishra, S. Mukhopadhyay, A. Chaturvedi, S. Kumari, and M. K. Khan, 'Cryptanalysis and improvement of Yan et al.'s biometric-based authentication scheme for telecare medicine information systems,' Journal of Medical Systems, vol. 38, no. 24, 2014.  H. S. Rhee, J. H. Park, W. Susilo and D. H. Lee, 'Improved searchable public key encryption with designated tester,' in Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 376–379, 2009, Sydney, Australia.  H. S. Rhee, J. H. Park, W. Susilo and D. H. Kee, 'Trapdoor security in a searchable public-key encryption scheme with a designated tester,' Journal of System and Software, vol. 83, no. 5, pp. 763–771, 2010.  L. Veltri, S. Cirani, S. Busanelli, and G. Ferrari, 'A novel batch-based group key management protocol applied to the Internet of Things,' Ad Hoc Networks, vol. 11, no. 8, pp. 2724-2737, 2013.  X. Wang and J. Zhao, 'An improved key agreement protocol based on chaos,' Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 12, pp. 4052-4057, 2010.  L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, A.V. Vasilakos, 'Security and privacy for storage and computation in cloud computing,' Information Sciences, vol. 258, no. 10, pp. 371–386, 2014.  Q. Xie, J. Zhao, and X. Yu, 'Chaotic maps-based three-party password authenticated key agreement protocol,' Nonlinear Dynamics, vol. 74, no. 4, pp. 1021-1027, 2013.  E. J. Yoon and I. S. Jeon, 'An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map,' Diffie-Hellman key agreement protocol based on Chebyshev chaotic map, vol. 16, no. 6, pp. 2383-2389, 2011.  Y. Yu, J. Ni, M. H. Au, H. Liu, H. Wang and C. Xu, 'Improved security of a dynamic remote data possession checking protocol for cloud storage,' Expert Systems with Applications, vol. 41, no. 17, pp. 7789–7796, 2014.  Y. Yu, L. Niu, G. Yang, Y. Mu and W. Susilo, 'On the security of auditing mechanisms for secure cloud storage,' Future Generation Computer System, vol. 30, pp. 127–132, 2014.  L. Zhang, 'Cryptanalysis of the public key encryption based on multiple chaotic systems,' Chaos, Solitons and Fractals, vol. 37, no. 3, pp. 669–674, 2008.  F. Zhao, P. Gong, S. Li, M. Li, and P. Li, 'Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials,' Nonlinear Dynamics, vol. 74, no. 1-2, pp. 419-427, 2013.  Y. Zhao, X. Chen, H. Ma, Q. Tang and H. Zhu, 'A new trapdoor-indistinguishable public key encryption with keyword search,' Journal of Wireless Mobile Networks, Ubiquitious Computing, and Dependable Applications, vol. 3, no. 1/2, pp. 72–81, 2012.|
|摘要:||With the rapid development of cloud computing, cloud storage service becomes an essential part of cloud service. The cloud storage service provides huge cyberspace for clients to upload data, store data, update data and download data. However, there are some security threats when cloud users transmit sensitive data via insecure communication channel. In this thesis, in order to meet secure communications in cloud storage service, data senders and data receivers have to establish a secure common session key with the help of the trusted cloud server before using cloud storage service to transmit sensitive data. Moreover, the agreed session key is only known by the communication parties. After establishing the secure common session key, the data sender and the data receiver can use common session key to encrypt data and decrypt data.
When the data is encrypted, it will become an unrecognizable ciphertext and even the data owner or an authorized user cannot recognize its contents. It causes cloud users cannot search the encrypted data rapidly. Therefore, a number of keyword search schemes over encrypted data are widely studied by scholars. A secure keyword search scheme needs to meet five security requirements, including: consistency, ciphertext indistinguishability, trapdoor indistinguishability, resist outside keyword guessing attacks and resist inside keyword guessing attacks. But, none of the existing keyword search schemes can resist the off-line inside keyword guessing attacks. According to the above-mentioned motivations and requirements, in this thesis, we would try to design a secure transmit environment and secret value based keyword search scheme to resist inside keyword guessing attacks in cloud storage services.|
|Appears in Collections:||資訊管理學系|
Show full item record
TAIR Related Article
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.