News Column

"Providing Searching over Encrypted Keywords in a Database" in Patent Application Approval Process

May 22, 2014



By a News Reporter-Staff News Editor at Politics & Government Week -- A patent application by the inventors Kaushik, Kulvaibhav (Jaipur, IN); Varadharajan, Vijayaraghavan (Salem, IN); Nallusamy, Rajarathnam (Chitrappatty, IN), filed on October 18, 2013, was made available online on May 8, 2014, according to news reporting originating from Washington, D.C., by VerticalNews correspondents.

This patent application is assigned to Infosys Limited.

The following quote was obtained by the news editors from the background information supplied by the inventors: "The advent of storage as a service being provided by the cloud providers and facilitating efficient analytics over it, has opened an entire new area of research over methods for secure data storage and efficient search and retrieval. Numerous works have been done over it with Boneh et al's method for trapdoor generation and corresponding search pioneering in the area. Boneh's method was based on double hashing of the keyword for trapdoor generation. The Park et al's scheme improvised the trapdoor generation by providing a generation mechanism comprising of usage of a single hash function over the keyword. But all these schemes suffer from offline key word guessing attacks. The trapdoors are generated statically i.e. same trapdoor generated every time for a particular key word making it vulnerable to brute force attack over the limited range of dictionary words by a misfeasor, masquerader or clandestine user.

"The radical work for architectural design framework was proposed in the cryptographic cloud storage scheme. In the existing schemes, to search for any keyword the data user supplies the keyword to the data managing authority to get a corresponding trapdoor which is searched at the cloud database. Since keywords form a very limited range of dictionary words, the present schemes are liable to offline keyword guessing attack, i.e. the user can sniff a trapdoor from the network and then by applying brute force attack over it, they can guess the corresponding keyword.

"The existing processes have limitations such as searchable encryption uses same trapdoor (unique static), for same keyword to be searched for i.e. there is a one to one mapping between the keyword and trapdoor. The existing methods are vulnerable to online and offline dictionary attacks. All existing schemes are based on single trapdoor search.

"Thus, there is a need to overcome the problems of the existing technologies. Therefore, the present inventors have developed a computer-implemented method, system and computer-readable medium for providing a searching over encrypted keywords in a database, which would provide secure search by generating one time trapdoor i.e. trapdoor is changed dynamically every time for the same keyword."

In addition to the background information obtained for this patent application, VerticalNews journalists also obtained the inventors' summary information for this patent application: "According to one aspect of the invention there is provided a computer implemented method executed by one or more computing devices for providing a searching over encrypted keywords in a database. The method comprises the steps of generating at least one keyword, generating a plurality of different encrypted keywords corresponding to said keyword, storing said at least one encrypted keyword in said database; generating a plurality of different trapdoors for said keyword, verifying said plurality of different trapdoors with said plurality of different encrypted keywords corresponding to said keyword and determining said keyword if said plurality of different trapdoors match with one said encrypted keyword corresponding to said keyword else determining said keyword is not found.

"According to another aspect of the invention there is provided a system for providing a searching over encrypted keywords in a database. The system comprises a memory and a processor operatively coupled to the memory. The processor configured to perform the steps of generating at least one keyword, generating a plurality of different encrypted keywords corresponding to said keyword, storing said at least one encrypted keyword in said database; generating a plurality of different trapdoors for said keyword, verifying said plurality of different trapdoors with said plurality of different encrypted keywords corresponding to said keyword and determining said keyword if said plurality of different trapdoors match with one said encrypted keyword corresponding to said keyword else determining said keyword is not found.

"According to another aspect of the invention there is provided a computer-readable code stored on a non-transitory computer-readable medium that, when executed by a computing device, performs a method for providing a searching over encrypted keywords in a database. The method comprises the steps of generating at least one keyword, generating a plurality of different encrypted keywords corresponding to said keyword, storing said at least one encrypted keyword in said database; generating a plurality of different trapdoors for said keyword, verifying said plurality of different trapdoors with said plurality of different encrypted keywords corresponding to said keyword and determining said keyword if said plurality of different trapdoors match with one said encrypted keyword corresponding to said keyword else determining said keyword is not found.

BRIEF DESCRIPTION OF THE DRAWINGS

"Features, aspects, and advantages of the present invention will be better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:

"FIG. 1 shows a three-tier architecture for data outsourcing model;

"FIG. 2 shows a flowchart depicting a method for providing a searching over encrypted keywords in a database;

"FIG. 3 shows an environment in which the present invention can be practiced, in accordance with an embodiment of the present invention; and

"FIG. 4 shows a generalized computer network arrangement, in one embodiment of the present technique."

URL and more information on this patent application, see: Kaushik, Kulvaibhav; Varadharajan, Vijayaraghavan; Nallusamy, Rajarathnam. Providing Searching over Encrypted Keywords in a Database. Filed October 18, 2013 and posted May 8, 2014. Patent URL: http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=460&p=10&f=G&l=50&d=PG01&S1=20140501.PD.&OS=PD/20140501&RS=PD/20140501

Keywords for this news article include: Infosys Limited.

Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC


For more stories covering the world of technology, please see HispanicBusiness' Tech Channel



Source: Politics & Government Week


Story Tools






HispanicBusiness.com Facebook Linkedin Twitter RSS Feed Email Alerts & Newsletters