On the Security of Secure Keyword Search and Data Sharing Mechanism for Cloud Computing

被引:0
|
作者
Li, Cong [1 ,2 ,3 ,4 ]
Feng, Xinyu [3 ,4 ,5 ]
Shen, Qingni [3 ,4 ,5 ]
Wu, Zhonghai [3 ,4 ,5 ]
机构
[1] Peking Univ, Sch Comp Sci, Beijing 100871, Peoples R China
[2] Peking Univ, Natl Engn Res Ctr Software Engn, Beijing 100871, Peoples R China
[3] Peking Univ, Key Lab High Confidence Software Technol, Minist Educ, Beijing 100871, Peoples R China
[4] Peking Univ, PKU OCTA Lab Blockchain & Privacy Comp, Beijing 100871, Peoples R China
[5] Peking Univ, Sch Software & Microelect, Beijing 102600, Peoples R China
基金
国家重点研发计划;
关键词
Cryptanalysis; attribute-based encryption; proxy re-encryption; keyword search; keyword updating;
D O I
10.1109/TDSC.2023.3346795
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nearly all of the previous attribute-based proxy re-encryption (ABPRE) schemes cannot support keyword search and keyword updating without the aid of private key generator (PKG) simultaneously. To resolve this problem, recently in IEEE Transactions on Dependable and Secure Computing (doi: 10.1109/TDSC.2020.2963978), Ge et al. proposed a ciphertext-policy ABPRE scheme with keyword search, dubbed CPAB-KSDS, which supports keyword updating without communicating with PKG. It also achieves indistinguishability against chosen-ciphertext attack (IND-CCA) security and indistinguishability against chosen-keyword attack (IND-CKA) security in the random oracle model. In this paper, we carefully analyze the security of Ge et al.'s CPAB-KSDS scheme and find that they did not give a correct reduction from IND-CKA security of theirs to the underlying cryptographic assumption. Furthermore, we also give a concrete attack on IND-CKA security of the CPAB-KSDS scheme. Therefore, it fails to achieve IND-CKA security they claimed, which is an essential security requirement for the encryption scheme with keyword search.
引用
收藏
页码:4306 / 4308
页数:3
相关论文
共 50 条
  • [21] Preferred Keyword Search over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2013 IEEE/ACM 21ST INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2013, : 207 - 212
  • [22] A shareable keyword search over encrypted data in cloud computing
    Li Xu
    Chi-Yao Weng
    Lun-Pin Yuan
    Mu-En Wu
    Raylin Tso
    Hung-Min Sun
    The Journal of Supercomputing, 2018, 74 : 1001 - 1023
  • [23] Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing
    Song, Zishuai
    Ma, Hui
    Zhang, Rui
    Xu, Wenhan
    Li, Jianhao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2234 - 2249
  • [24] Review of Data Security Frameworks for Secure Cloud Computing
    Umrigar, Kunaal
    Mathew, Rejo
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 933 - 941
  • [25] Secure Search Over Encrypted Data in Cloud Computing
    Bakhtiari, Majid
    Nateghizad, Majid
    Zainal, Anazida
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 290 - 295
  • [26] Data Sharing Security and Privacy Preservation in Cloud Computing
    Prasad, Kadam
    Poonam, Jadhav
    Gauri, Khupase
    Thoutam, N. C.
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1070 - 1075
  • [27] Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing
    Liu, Jinlu
    Zhao, Bo
    Qin, Jing
    Zhang, Xi
    Ma, Jixin
    COMPUTER JOURNAL, 2023, 66 (01): : 184 - 196
  • [28] Supporting secure keyword search in the personal cloud
    Lallali, Saliha
    Anciaux, Nicolas
    Popa, Lulian Sandu
    Pucheral, Philippe
    INFORMATION SYSTEMS, 2017, 72 : 1 - 26
  • [29] Data sharing platform and security mechanism based on cloud computing under the Internet of Things
    Cai, Jie
    Wang, Jun
    OPEN COMPUTER SCIENCE, 2022, 12 (01) : 403 - 415
  • [30] A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
    Li, Ruixuan
    Shen, Chenglin
    He, Heng
    Gu, Xiwu
    Xu, Zhiyong
    Xu, Cheng-Zhong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 344 - 357