The public cloud environment has attracted massive attackers to exploit insecure ports and access to data, services and other resources. Techniques, such as Public Key Encryption with Keyword Search (PEKS), could be deployed in cloud security to avoid accidents. PEKS allows users to search encrypted documents by a specific keyword without compromising the original data security. The first PEKS scheme was proposed in 2004, since then, PEKS has been experienced a great progress. Recently, Kazemian and Ma firstly incorporated with Fuzzy Logic technique to PEKS scheme, namely “Public Key Encryption with Multi-keywords Search using Mamdani System (m-PEMKS)”, in order to support Fuzzy Keyword (i.e. “latest”, “biggest”) Search. However, the m-PEMKS scheme has the ability to prevent Off-line Keyword Guessing Attack (OKGA) but it may suffer Inside Keyword Guessing Attack (IKGA). This paper will revisit the m-PEMKS scheme and propose a robust m-PEMKS mechanism. The proposed scheme has the properties of Ciphertext Indistinguishability, Trapdoor Indistinguishability and User Authentication which can prevent OKGA and IKGA. Besides, the proposed scheme supports both Fuzzy Keyword Search and Multiple Keywords Search and therefore, it is more practical and could be applied to the general public networks.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. Computational science and its applications? ICCSA, pp 1249–1259
Boneh D, Boyen X (2004) Secure identity based encryption without random oracles. Adv Cryptol CRYPTO 2004(3152):443–459
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Adv Cryptol EUROCRYPT 2004:506–522
Brier E, Clavier C, Olivier F (2004) Correlation power analysis with a leakage model. Lecture notes in computer science, pp 16–29
Byun J, Rhee H, Park H, Lee D (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lecture notes in computer science, pp 75–83
Chari S, Rao J, Rohatgi P (2003) Template attacks? CHES 2002, Springer, 2003, LNCS 2523, pp 51–62
Chen YC (2015) SPEKS: secure server-designation public key encryption with keyword search against keyword guessing attacks. Comput J 58(4):922–933
Cingolani P, Alcala-Fdez J (2012) jFuzzyLogic: a robust and flexible Fuzzy-Logic inference system language implementation. Fuzzy systems (FUZZ-IEEE), 2012 IEEE international conference on. IEEE
Cingolani P, Alcal-Fdez J (2013) jFuzzyLogic: a Java library to design fuzzy logic controllers according to the standard for fuzzy control programming. Int J Comput Intell Syst 6(Supplement 1):61–75
De Caro A, Iovino V (2011) jPBC: Java pairing based cryptography. In: 2011 IEEE symposium on computers and communications (ISCC)
Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403–404:1–14
Kazemian H (1998) Study of MIMO learning fuzzy controllers for dynamic system applications
Kazemian H, Ma Y (2020a) A secure and efficient public key authenticated encryption with multi-keywords search scheme against inside keyword guessing attack. Int J Cyber Secur Digit Forensics 9(2):90–101
Kazemian H, Ma Y (2020b) Fuzzy logic application to searchable cryptography. In: Proceedings of the 21st EANN (Engineering Applications of Neural Networks) 2020 conference, pp 410–422
Lermontov A, Yokoyama L, Lermontov M, Machado MAS (2009) River quality analysis using fuzzy water quality index: Ribeira do Iguape river watershed, Brazil. Ecol Indic 9:1188–1197
Li C-T, Lee C-W, Shen J-J (2015) An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn 80(3):1601–1611
Maghrebi H (2019) Deep learning based side channel attacks in practice. Cryptology ePrint Archive, Report 2019/578
Ma Y, Kazemian H (2018) Trapdoor-indistinguishable secure channel free public key encryption with multi-keywords search (student contributions). In: Proceedings of the 11th international conference on security of information and networks—-SIN18
Mamdani EH, Assilian S (1975) An experiment in linguistic synthesis with a fuzzy logic controller. Int J Man Mach Stud 7(1):1–13
Marchini A, Facchinetti T, Mistri M (2009) F-IND: a framework to design fuzzy indices of environmental conditions. Ecol Indic 9:485–496
Noroozi M, Eslami Z, Pakniat N (2018) Comments on a chaos-based public key encryption with keyword search scheme. Nonlinear Dyn 94(2):1127–1132
Rhee H, Park J, Susilo W, Lee D (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771
Singh J, Singh N, Sharma JK (2006) Fuzzy modeling and identification of intelligent control for refrigeration compressor. J Sci Ind Res 65:22–30
Takagi T, Sugeno M (1985) Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Sys Man Cybern 15:116–132
Tang Q, Chen L (2010) Public-key encryption with registered keyword search, public key infrastructures, services and applications. EuroPKI2009 6391:163–178
Voskoglou M (2020) Fuzzy sets, fuzzy logic and their applications
Wang T, Au M, Wu W (2016) An efficient secure channel free searchable encryption scheme with multiple keywords. Net Syst Secur 9955:251–265
Yau W, Heng S, Goi B (2008) Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. Lecture notes in computer science, pp 100–105
Yau W, Phan R, Heng S, Goi B (2013) Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int J Comput Math 90(12):2581–2587
Zadeh L (1973) Outline of a new approach to the analysis of complex systems and decision processes. IEEE Trans Syst Man Cybern SMC–3(1):28–44
Zhang X, Xu C, Xie R, Jin C (2018) Designated cloud server public key encryption with keyword search from lattice in the standard model. Chin J Electron 27(2):304–309
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Ma, Y., Kazemian, H. Public key authenticated encryption with multiple keywords search using Mamdani system. Evolving Systems 12, 687–699 (2021). https://doi.org/10.1007/s12530-021-09387-0