Skip to main content
Log in

An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In this paper, we propose an extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services, which achieves the essential requirements of a secure cloud storage service. A secure cloud storage service has to satisfy five security requirements: consistency, ciphertext indistinguishability, trapdoor indistinguishability and resist off-line keyword guessing attacks (including off-line outside keyword guessing attack and off-line inside keyword guessing attack). Moreover, due to the characteristics of extended chaotic maps and session key establishment, which allow two communication parties to agree a common session key and the agreed session key is only known by the data sender and the authorized data receiver. Therefore, in this paper, we integrated the concept of session key establishment and extended chaotic maps into our proposed scheme which aims to resist the off-line keyword guessing attacks not only from the outside cloud attackers but also from an inside malicious cloud server. To the best of our knowledge, none of the recently proposed secure keyword search schemes can resist inside keyword guessing attacks and this work is the first attempt to provide a secure keyword search scheme without inside keyword guessing attacks in cloud storage services.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. Lect. Notes Comput. Sci. 5072, 1249–1259 (2008)

    Article  Google Scholar 

  2. Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. 52(7), 1382–1393 (2005)

  3. Boneh, D., Crescenzom, G.D., Ostrovsky, R., Rersiano, G.: Public key encryption with keyword search. Lect. Notes Comput. Sci. 3027, 506–522 (2004)

    Article  Google Scholar 

  4. Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lect. Notes Comput. Sci. 4165, 75–83 (2006)

    Article  Google Scholar 

  5. Chung, P.S., Liu, C.W., Hwang, M.S.: A study of attribute-based proxy re-encryption scheme in cloud environments. Int. J. Netw. Secur. 16(1), 1–13 (2014)

    Article  Google Scholar 

  6. Han, S., Chang, E.: Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fract. 39(3), 1283–1289 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  7. He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  8. Hsu, S.T., Hwang, M.S., Yang, C.C.: A study of keyword search over encrypted data in cloud storage service. Master Thesis of National Chung Hsing University, Department of Management Information System (2013)

  9. Hsu, S.T., Yang, C.C., Hwang, M.S.: A study of public key encryption with keyword search. Int. J. Netw. Secur. 15(2), 71–79 (2013)

    Google Scholar 

  10. Hu, C., Liu, P.: A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension. In: Advances in Computer Science, Environment, Ecoinformatics, and Education, Communications in Computer and Information Science, pp. 131–136. Wuhan, China (2011)

  11. Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  12. Lee, C.C., Chung, P.S., Hwang, M.S.: A survey on attribute-based encryption schemes of access control in cloud environments. Int. J. Netw. Secur. 15(4), 231–240 (2013)

    Google Scholar 

  13. Lee, C.C., Hsu, C.W.: A secure biometric-based remote user authentication with key agreement protocol using extended chaotic maps. Nonlinear Dyn. 71(1–2), 201–211 (2013)

    Article  MathSciNet  Google Scholar 

  14. Lee, C.C., Li, C.T., Hsu, C.W.: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn. 73(1–2), 125–132 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  15. Li, C.T., Lee, C.W., Shen, J.J.: A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service. In: Proceedings of the 2015 International Conference on Information Networking, IEEE CS, pp. 31–36. Siem Reap, Cambodia (2015)

  16. Li, C.T., Lee, C.C., Weng, C.Y.: An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4), 1133–1143 (2013)

  17. Li, C.T., Shen, J.J., Lee, C.W.: Security and efficiency analysis on a simple keyword search scheme over encrypted data in cloud storage services. Lect. Notes Comput. Sci. 8662, 367–375 (2014)

    Article  Google Scholar 

  18. Li, C.T., Lee, C.C., Weng, C.Y.: A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38(9), 1–11 (2014)

    Article  MATH  Google Scholar 

  19. Lv, C., Ma, M., Li, H., Ma, J., Zhang, Y.: An novel three-party authenticated key exchange protocol using one-time key. J. Netw. Comput. Appl. 36(1), 498–503 (2013)

    Article  Google Scholar 

  20. Mason, J.C., Handscomb, D.C.: Chebyshev Polynomials. Chapman and Hall/CRC Press, London (2003)

    MATH  Google Scholar 

  21. Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 376–379. Sydney, Australia (2009)

  22. Rhee, H.S., Park, J.H., Susilo, W., Kee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)

  23. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258(10), 371–386 (2014)

    Article  Google Scholar 

  24. Yu, Y., Ni, J., Au, M.H., Liu, H., Wang, H., Xu, C.: Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst. Appl. 41(17), 7789–7796 (2014)

    Article  Google Scholar 

  25. Yu, Y., Niu, L., Yang, G., Mu, Y., Susilo, W.: On the security of auditing mechanisms for secure cloud storage. Future Gener. Comput. Syst. 30, 127–132 (2014)

    Article  Google Scholar 

  26. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fract. 37(3), 669–674 (2008)

    Article  MATH  Google Scholar 

  27. Zhao, Y., Chen, X., Ma, H., Tang, Q., Zhu, H.: A new trapdoor-indistinguishable public key encryption with keyword search. J. Wirel. Mobile Netw. Ubiquitous Comput. Dependable Appl. 3(1/2), 72–81 (2012)

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank the anonymous reviewers for their valuable suggestions and comments. In addition, this research was partially supported by the National Science Council, Taiwan, ROC, under Contract No.: MOST 103-2221-E-165-003 and MOST 103-3114-C-165-001-ES.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chun-Ta Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, CT., Lee, CW. & Shen, JJ. An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn 80, 1601–1611 (2015). https://doi.org/10.1007/s11071-015-1965-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-015-1965-9

Keywords

Navigation