REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data

被引:2
|
作者
Miao, Yinbin [1 ]
Li, Feng [1 ]
Jia, Xiaohua [2 ]
Wang, Huaxiong [3 ]
Liu, Ximeng [4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong 999077, Peoples R China
[3] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore 639798, Singapore
[4] Fuzhou Univ, Coll Math & Comp Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Access control; attribute-based encryption; identity-based encryption; keyword-based search; role-based access control; IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; BROADCAST ENCRYPTION; INDUSTRIAL INTERNET; SCHEME;
D O I
10.1109/TDSC.2023.3324640
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly reducing the users' final token generation and index update overheads, respectively. Formal security analysis proves that REKS is secure against chosen keyword and internal keyword guessing attacks, and findings from the empirical evaluations demonstrate that REKS is efficient and practical.
引用
收藏
页码:3247 / 3261
页数:15
相关论文
共 50 条
  • [21] Approximate Keyword-based Search over Encrypted Cloud Data
    Ibrahim, Ayad
    Jin, Hai
    Yassin, Ali A.
    Zou, Deqing
    2012 NINTH IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2012, : 238 - 245
  • [22] Efficient Keyword Search over Encrypted Cloud Data
    Meharwade, Anuradha
    Patil, G. A.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 139 - 145
  • [23] Centralized keyword search on encrypted data for cloud applications
    Jiang, Peng
    Mu, Yi
    Guo, Fuchun
    Wang, Xiaofen
    Lai, Jianchang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5064 - 5084
  • [24] Approach to keyword search over encrypted data in cloud
    Zhang, Peng
    Li, Yan
    Lin, Hai-Lun
    Yang, Rong
    Liu, Qing-Yun
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 147 - 153
  • [25] EFFICIENT KEYWORD SEARCH ON ENCRYPTED DYNAMIC CLOUD DATA
    Sardar, Laltu
    Sengupta, Binanda
    Ruj, Sushmita
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2024, 18 (05) : 1442 - 1470
  • [26] An efficient, secure and verifiable conjunctive keyword search scheme based on rank metric codes over encrypted outsourced cloud data
    Yousefipoor, Vahid
    Eghlidos, Taraneh
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [27] Garbled role-based access control in the cloud
    Masoom Alam
    Naina Emmanuel
    Tanveer Khan
    Yang Xiang
    Houcine Hassan
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
  • [28] Garbled role-based access control in the cloud
    Alam, Masoom
    Emmanuel, Naina
    Khan, Tanveer
    Xiang, Yang
    Hassan, Houcine
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1153 - 1166
  • [29] Multi-keyword Ranked Search with Fine-grained Access Control over Encrypted Cloud Data
    Lei, Jingyu
    Mo, Jiao
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 454 - 463
  • [30] Privacy Preserving Time Efficient Access Control Aware Keyword Search Over Encrypted Data on Cloud Storage
    P. Shanthi
    A. Umamakeswari
    Wireless Personal Communications, 2019, 109 : 2133 - 2145