REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data

被引:2
|
作者
Miao, Yinbin [1 ]
Li, Feng [1 ]
Jia, Xiaohua [2 ]
Wang, Huaxiong [3 ]
Liu, Ximeng [4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong 999077, Peoples R China
[3] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore 639798, Singapore
[4] Fuzhou Univ, Coll Math & Comp Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Access control; attribute-based encryption; identity-based encryption; keyword-based search; role-based access control; IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; BROADCAST ENCRYPTION; INDUSTRIAL INTERNET; SCHEME;
D O I
10.1109/TDSC.2023.3324640
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly reducing the users' final token generation and index update overheads, respectively. Formal security analysis proves that REKS is secure against chosen keyword and internal keyword guessing attacks, and findings from the empirical evaluations demonstrate that REKS is efficient and practical.
引用
收藏
页码:3247 / 3261
页数:15
相关论文
共 50 条
  • [1] Keyword Search With Access Control Over Encrypted Cloud Data
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    IEEE SENSORS JOURNAL, 2017, 17 (03) : 858 - 868
  • [2] A Cluster Based Multi-keyword Search on Outsourced Encrypted Cloud Data
    Handa, Rohit
    Challa, Rama Krishna
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 115 - 120
  • [3] Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment
    Sultan, Nazatul Haque
    Kaaniche, Nesrine
    Laurent, Maryline
    Barbhuiya, Ferdous Ahmed
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 216 - 233
  • [4] Keyword Search with Access Control over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2014 IEEE 22ND INTERNATIONAL SYMPOSIUM OF QUALITY OF SERVICE (IWQOS), 2014, : 87 - 92
  • [5] Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (12) : 1947 - 1960
  • [6] Enhanced Role-Based Access Control for Cloud Security
    Balamurugan, B.
    Krishna, P. Venkata
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 837 - 852
  • [7] Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data
    Li, Jiayi
    Ma, Jianfeng
    Miao, Yinbin
    Yang, Ruikang
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 2005 - 2019
  • [8] Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2381 - 2395
  • [9] Attribute-Based Keyword Search and Data Access Control in Cloud
    Li, Jiazhi
    Zhang, Lei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 382 - 386
  • [10] An Efficient Multi-keyword Synonym-Based Fuzzy Ranked Search Over Outsourced Encrypted Cloud Data
    Saini, Vandana
    Challa, Rama Krishna
    Khan, Neelam S.
    ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES, 2016, 452 : 433 - 441