REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data

被引:2
|
作者
Miao, Yinbin [1 ]
Li, Feng [1 ]
Jia, Xiaohua [2 ]
Wang, Huaxiong [3 ]
Liu, Ximeng [4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong 999077, Peoples R China
[3] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore 639798, Singapore
[4] Fuzhou Univ, Coll Math & Comp Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Access control; attribute-based encryption; identity-based encryption; keyword-based search; role-based access control; IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; BROADCAST ENCRYPTION; INDUSTRIAL INTERNET; SCHEME;
D O I
10.1109/TDSC.2023.3324640
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly reducing the users' final token generation and index update overheads, respectively. Formal security analysis proves that REKS is secure against chosen keyword and internal keyword guessing attacks, and findings from the empirical evaluations demonstrate that REKS is efficient and practical.
引用
收藏
页码:3247 / 3261
页数:15
相关论文
共 50 条
  • [31] Privacy Preserving Time Efficient Access Control Aware Keyword Search Over Encrypted Data on Cloud Storage
    Shanthi, P.
    Umamakeswari, A.
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (04) : 2133 - 2145
  • [32] ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data
    Luo, Fucai
    Wang, Haiyan
    Lin, Changlu
    Yan, Xingfu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4970 - 4983
  • [33] Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced Data
    Fu, Zhangjie
    Wu, Xinle
    Wang, Qian
    Ren, Kui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (12) : 2986 - 2997
  • [34] Enforcing Role-Based Access Control for Secure Data Storage in the Cloud
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    COMPUTER JOURNAL, 2011, 54 (10): : 1675 - 1687
  • [35] Semantic-based Compound Keyword Search over Encrypted Cloud Data
    Lang, Bo
    Wang, Jinmiao
    Li, Ming
    Liu, Yanxi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (03) : 850 - 863
  • [36] Attribute-Based Data Retrieval with Keyword Search over Encrypted Data in Cloud
    Ali, Azza A.
    Saleh, Shereen
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2019, 2020, 1058 : 876 - 890
  • [37] Confusing-Keyword Based Secure Search over Encrypted Cloud Data
    Zhangjie Fu
    Yangen Liu
    Xingming Sun
    Yuling Liu
    Zuwei Tian
    Mobile Networks and Applications, 2020, 25 : 125 - 132
  • [38] Multi-keyword secure search of encrypted cloud data based on semantics
    Wang, Xuejian
    Qin, Baodong
    2024 6TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING, ICNLP 2024, 2024, : 271 - 276
  • [39] Confusing-Keyword Based Secure Search over Encrypted Cloud Data
    Fu, Zhangjie
    Liu, Yangen
    Sun, Xingming
    Liu, Yuling
    Tian, Zuwei
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 125 - 132
  • [40] Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
    Qiang Cao
    Yanping Li
    Zhenqiang Wu
    Yinbin Miao
    Jianqing Liu
    World Wide Web, 2020, 23 : 959 - 989