Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format

Peng Jiang, Jianting Ning*, Kaitai Liang, Changyu Dong, Jiageng Chen, Zhenfu Cao

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

15 Citations (Scopus)

Abstract

Big data analytics has been regarded as a promising technology to yield better insights into future development by government and industry. Data collection and aggregation are necessary pre-steps to enable data analysis. However, data may be dispersed across multiple places and in different formats. Even worse, data can be encrypted under various encryption mechanisms when data owners try to secure the confidentiality of the data. This makes data aggregation extremely challenging, if not impossible, especially when the encryption keys cannot be shared for various reasons. In this paper, we take the first step in addressing this problem. More specifically, we propose a new notion of cross-domain encryption switching service that securely bridges two well-studied encryption mechanisms, namely traditional public key encryption and identity-based encryption. As of independent interest, our notion supports keyword search over encrypted data, i.e., after encryption switching one may search over the (outsourced) data without loss of data and query secrecy. We provide a provably-secure instantiation satisfying the notion, and further present the efficiency analysis to show the scalability. Our proposed scheme may be applicable in multi-domain cloud storage system.

Original languageEnglish
Pages (from-to)1357-1369
Number of pages13
JournalIEEE Transactions on Services Computing
Volume14
Issue number5
DOIs
Publication statusPublished - 2021

Keywords

  • Cross-domain encryption switching service
  • data secrecy
  • keyword search service
  • search privacy

Fingerprint

Dive into the research topics of 'Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format'. Together they form a unique fingerprint.

Cite this