Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices

Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption c...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2016-08, Vol.9 (12), p.1717-1725
Hauptverfasser: Suga, Takanori, Nishide, Takashi, Sakurai, Kouichi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1725
container_issue 12
container_start_page 1717
container_title Security and communication networks
container_volume 9
creator Suga, Takanori
Nishide, Takashi
Sakurai, Kouichi
description Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform a wildcard search, partial match search, and so on. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm our scheme can be used in these environments. Availability on portable devices will offer high convenience. Copyright © 2013 John Wiley & Sons, Ltd. Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform wildcard searches. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm that our scheme can be used in these environments.
doi_str_mv 10.1002/sec.876
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1835556417</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1835556417</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4276-bcc64d942957c2f9888878a1a2db23eacd753d7b2bc09dc3edd444fc375a628f3</originalsourceid><addsrcrecordid>eNp1kMtKxDAUhoMoOI7iKxRcKMiMSZo27VLKeAHBhboO6ckpk6E3k47anY_gM_okZhiZheDZnMPPd24_IaeMzhml_MojzDOZ7pEJy-N8Rhnn-7uaiUNy5P2K0pQJKSbEFkvtNAzovj-_Su3RRH5sGhychcijdrDUZY0RtuDGfrBdG-nWRHbwkW36GhtsB72T8aNHZzdaFJSmK21oNfhmAf0xOah07fHkN0_Jy83iubibPTze3hfXDzMQXKazEiAVJhc8TyTwKs9CyEwzzU3JY9RgZBIbWfISaG4gRmOEEBXEMtEpz6p4Si62c3vXva7RD6qxHrCudYvd2iuWxUmSpILJgJ79QVfd2rXhukBRkcmEhWVTcr6lwHXeO6xUH37UblSMqo3lKliuguWBvNyS7-Hv8T9MPS2KDf0DDAiEYw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1804875175</pqid></control><display><type>article</type><title>Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Suga, Takanori ; Nishide, Takashi ; Sakurai, Kouichi</creator><creatorcontrib>Suga, Takanori ; Nishide, Takashi ; Sakurai, Kouichi</creatorcontrib><description>Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform a wildcard search, partial match search, and so on. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm our scheme can be used in these environments. Availability on portable devices will offer high convenience. Copyright © 2013 John Wiley &amp; Sons, Ltd. Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform wildcard searches. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm that our scheme can be used in these environments.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.876</identifier><language>eng</language><publisher>London: Hindawi Limited</publisher><subject>Availability ; Bloom filter ; Communication networks ; Encryption ; Feasibility ; partial‐matching search ; searchable encryption ; Searching ; Smartphones ; symmetric encryption ; Symmetry ; Tablet computers ; wildcard search</subject><ispartof>Security and communication networks, 2016-08, Vol.9 (12), p.1717-1725</ispartof><rights>Copyright © 2013 John Wiley &amp; Sons, Ltd.</rights><rights>Copyright © 2016 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c4276-bcc64d942957c2f9888878a1a2db23eacd753d7b2bc09dc3edd444fc375a628f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Suga, Takanori</creatorcontrib><creatorcontrib>Nishide, Takashi</creatorcontrib><creatorcontrib>Sakurai, Kouichi</creatorcontrib><title>Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices</title><title>Security and communication networks</title><description>Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform a wildcard search, partial match search, and so on. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm our scheme can be used in these environments. Availability on portable devices will offer high convenience. Copyright © 2013 John Wiley &amp; Sons, Ltd. Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform wildcard searches. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm that our scheme can be used in these environments.</description><subject>Availability</subject><subject>Bloom filter</subject><subject>Communication networks</subject><subject>Encryption</subject><subject>Feasibility</subject><subject>partial‐matching search</subject><subject>searchable encryption</subject><subject>Searching</subject><subject>Smartphones</subject><subject>symmetric encryption</subject><subject>Symmetry</subject><subject>Tablet computers</subject><subject>wildcard search</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kMtKxDAUhoMoOI7iKxRcKMiMSZo27VLKeAHBhboO6ckpk6E3k47anY_gM_okZhiZheDZnMPPd24_IaeMzhml_MojzDOZ7pEJy-N8Rhnn-7uaiUNy5P2K0pQJKSbEFkvtNAzovj-_Su3RRH5sGhychcijdrDUZY0RtuDGfrBdG-nWRHbwkW36GhtsB72T8aNHZzdaFJSmK21oNfhmAf0xOah07fHkN0_Jy83iubibPTze3hfXDzMQXKazEiAVJhc8TyTwKs9CyEwzzU3JY9RgZBIbWfISaG4gRmOEEBXEMtEpz6p4Si62c3vXva7RD6qxHrCudYvd2iuWxUmSpILJgJ79QVfd2rXhukBRkcmEhWVTcr6lwHXeO6xUH37UblSMqo3lKliuguWBvNyS7-Hv8T9MPS2KDf0DDAiEYw</recordid><startdate>201608</startdate><enddate>201608</enddate><creator>Suga, Takanori</creator><creator>Nishide, Takashi</creator><creator>Sakurai, Kouichi</creator><general>Hindawi Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>201608</creationdate><title>Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices</title><author>Suga, Takanori ; Nishide, Takashi ; Sakurai, Kouichi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4276-bcc64d942957c2f9888878a1a2db23eacd753d7b2bc09dc3edd444fc375a628f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Availability</topic><topic>Bloom filter</topic><topic>Communication networks</topic><topic>Encryption</topic><topic>Feasibility</topic><topic>partial‐matching search</topic><topic>searchable encryption</topic><topic>Searching</topic><topic>Smartphones</topic><topic>symmetric encryption</topic><topic>Symmetry</topic><topic>Tablet computers</topic><topic>wildcard search</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Suga, Takanori</creatorcontrib><creatorcontrib>Nishide, Takashi</creatorcontrib><creatorcontrib>Sakurai, Kouichi</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Suga, Takanori</au><au>Nishide, Takashi</au><au>Sakurai, Kouichi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices</atitle><jtitle>Security and communication networks</jtitle><date>2016-08</date><risdate>2016</risdate><volume>9</volume><issue>12</issue><spage>1717</spage><epage>1725</epage><pages>1717-1725</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform a wildcard search, partial match search, and so on. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm our scheme can be used in these environments. Availability on portable devices will offer high convenience. Copyright © 2013 John Wiley &amp; Sons, Ltd. Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform wildcard searches. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm that our scheme can be used in these environments.</abstract><cop>London</cop><pub>Hindawi Limited</pub><doi>10.1002/sec.876</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2016-08, Vol.9 (12), p.1717-1725
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_miscellaneous_1835556417
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection
subjects Availability
Bloom filter
Communication networks
Encryption
Feasibility
partial‐matching search
searchable encryption
Searching
Smartphones
symmetric encryption
Symmetry
Tablet computers
wildcard search
title Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T03%3A34%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Character%E2%80%90based%20symmetric%20searchable%20encryption%20and%20its%20implementation%20and%20experiment%20on%20mobile%20devices&rft.jtitle=Security%20and%20communication%20networks&rft.au=Suga,%20Takanori&rft.date=2016-08&rft.volume=9&rft.issue=12&rft.spage=1717&rft.epage=1725&rft.pages=1717-1725&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.876&rft_dat=%3Cproquest_cross%3E1835556417%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1804875175&rft_id=info:pmid/&rfr_iscdi=true