Abstract
In this paper, we propose an extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services, which achieves the essential requirements of a secure cloud storage service. A secure cloud storage service has to satisfy five security requirements: consistency, ciphertext indistinguishability, trapdoor indistinguishability and resist off-line keyword guessing attacks (including off-line outside keyword guessing attack and off-line inside keyword guessing attack). Moreover, due to the characteristics of extended chaotic maps and session key establishment, which allow two communication parties to agree a common session key and the agreed session key is only known by the data sender and the authorized data receiver. Therefore, in this paper, we integrated the concept of session key establishment and extended chaotic maps into our proposed scheme which aims to resist the off-line keyword guessing attacks not only from the outside cloud attackers but also from an inside malicious cloud server. To the best of our knowledge, none of the recently proposed secure keyword search schemes can resist inside keyword guessing attacks and this work is the first attempt to provide a secure keyword search scheme without inside keyword guessing attacks in cloud storage services.
Similar content being viewed by others
References
Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. Lect. Notes Comput. Sci. 5072, 1249–1259 (2008)
Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. 52(7), 1382–1393 (2005)
Boneh, D., Crescenzom, G.D., Ostrovsky, R., Rersiano, G.: Public key encryption with keyword search. Lect. Notes Comput. Sci. 3027, 506–522 (2004)
Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lect. Notes Comput. Sci. 4165, 75–83 (2006)
Chung, P.S., Liu, C.W., Hwang, M.S.: A study of attribute-based proxy re-encryption scheme in cloud environments. Int. J. Netw. Secur. 16(1), 1–13 (2014)
Han, S., Chang, E.: Chaotic map based key agreement with/out clock synchronization. Chaos Solitons Fract. 39(3), 1283–1289 (2009)
He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)
Hsu, S.T., Hwang, M.S., Yang, C.C.: A study of keyword search over encrypted data in cloud storage service. Master Thesis of National Chung Hsing University, Department of Management Information System (2013)
Hsu, S.T., Yang, C.C., Hwang, M.S.: A study of public key encryption with keyword search. Int. J. Netw. Secur. 15(2), 71–79 (2013)
Hu, C., Liu, P.: A secure searchable public key encryption scheme with a designated tester against keyword guessing attacks and its extension. In: Advances in Computer Science, Environment, Ecoinformatics, and Education, Communications in Computer and Information Science, pp. 131–136. Wuhan, China (2011)
Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)
Lee, C.C., Chung, P.S., Hwang, M.S.: A survey on attribute-based encryption schemes of access control in cloud environments. Int. J. Netw. Secur. 15(4), 231–240 (2013)
Lee, C.C., Hsu, C.W.: A secure biometric-based remote user authentication with key agreement protocol using extended chaotic maps. Nonlinear Dyn. 71(1–2), 201–211 (2013)
Lee, C.C., Li, C.T., Hsu, C.W.: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn. 73(1–2), 125–132 (2013)
Li, C.T., Lee, C.W., Shen, J.J.: A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service. In: Proceedings of the 2015 International Conference on Information Networking, IEEE CS, pp. 31–36. Siem Reap, Cambodia (2015)
Li, C.T., Lee, C.C., Weng, C.Y.: An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4), 1133–1143 (2013)
Li, C.T., Shen, J.J., Lee, C.W.: Security and efficiency analysis on a simple keyword search scheme over encrypted data in cloud storage services. Lect. Notes Comput. Sci. 8662, 367–375 (2014)
Li, C.T., Lee, C.C., Weng, C.Y.: A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38(9), 1–11 (2014)
Lv, C., Ma, M., Li, H., Ma, J., Zhang, Y.: An novel three-party authenticated key exchange protocol using one-time key. J. Netw. Comput. Appl. 36(1), 498–503 (2013)
Mason, J.C., Handscomb, D.C.: Chebyshev Polynomials. Chapman and Hall/CRC Press, London (2003)
Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 376–379. Sydney, Australia (2009)
Rhee, H.S., Park, J.H., Susilo, W., Kee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763–771 (2010)
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258(10), 371–386 (2014)
Yu, Y., Ni, J., Au, M.H., Liu, H., Wang, H., Xu, C.: Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst. Appl. 41(17), 7789–7796 (2014)
Yu, Y., Niu, L., Yang, G., Mu, Y., Susilo, W.: On the security of auditing mechanisms for secure cloud storage. Future Gener. Comput. Syst. 30, 127–132 (2014)
Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fract. 37(3), 669–674 (2008)
Zhao, Y., Chen, X., Ma, H., Tang, Q., Zhu, H.: A new trapdoor-indistinguishable public key encryption with keyword search. J. Wirel. Mobile Netw. Ubiquitous Comput. Dependable Appl. 3(1/2), 72–81 (2012)
Acknowledgments
The authors would like to thank the anonymous reviewers for their valuable suggestions and comments. In addition, this research was partially supported by the National Science Council, Taiwan, ROC, under Contract No.: MOST 103-2221-E-165-003 and MOST 103-3114-C-165-001-ES.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, CT., Lee, CW. & Shen, JJ. An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn 80, 1601–1611 (2015). https://doi.org/10.1007/s11071-015-1965-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-015-1965-9