Cloud-Assisted Attribute-Based Searchable Encryption Scheme on Blockchain

被引:0
|
作者
Niu S. [1 ]
Xie Y. [1 ]
Yang P. [1 ]
Du X. [2 ]
机构
[1] College of Computer Science and Engineering, Northwest Normal University, Lanzhou
[2] College of Mathematics and Statistics, Northwest Normal University, Lanzhou
基金
中国国家自然科学基金;
关键词
Attribute-based encryption; Blockchain; Cloud-assisted; Fine-grained access control; Searchable encryption;
D O I
10.7544/issn1000-1239.2021.20200041
中图分类号
学科分类号
摘要
Searchable encryption technology can effectively solve the problem of searching encrypted data without decryption. In view of the fact that the existing searchable encryption technology does not consider the problem of fine-grained search permission of data users, and the problem of data security and privacy protection caused by the centralization of cloud storage in the existing searchable encryption schemes, this paper proposes a cloud-assisted attribute-based searchable encryption scheme on blockchain. In this scheme, searchable encryption technology is used to realize secure search of encrypted data on the blockchain, attribute-based encryption technology is used to realize fine-grained access control of data, and the immutability of the blockchain is used to ensure the security of keyword ciphertext. In this scheme, attribute-based encryption technology is used to encrypt keywords extracted from data files. The keyword ciphertext is uploaded to the blockchain in the form of a transaction. Keyword ciphertext and encrypted data files are stored on the semi-trusted cloud server. Based on the assumption of difficult problems, it is proved that the scheme can guarantee the security of keyword ciphertext and trapdoor. And important information related to keywords and trapdoors will not be leaked.The numerical experimental results show that the proposed scheme is more efficient in the key generation phase, trapdoor generation phase, and keyword search phase than the existing similar schemes. © 2021, Science Press. All right reserved.
引用
收藏
页码:811 / 821
页数:10
相关论文
共 23 条
  • [1] Feng Dengguo, Zhang Min, Zhang Yan, Et al., Research on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
  • [2] Qin Zhiguang, Xu Jun, Nie Xuyun, Et al., Overview of public key searchable encryption system, Journal of Cyber Security, 2, 3, pp. 1-12, (2017)
  • [3] Ma Mimi, He Debiao, Khan M K, Et al., Certificateless searchable public key encryption scheme for mobile healthcare system, Computers and Electrical Engineering, 65, pp. 413-424, (2018)
  • [4] Huang Qiong, Li Hongbo, An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks, Information Sciences, 403, 404, pp. 1-14, (2017)
  • [5] Sahai A, Waters B., Fuzzy identity-based encryption, LNCS 3494: Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques, pp. 457-473, (2005)
  • [6] Goyal V, Pandey O, Sahai A, Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proc of the 13th ACM Conf on Computer and Communications Security, pp. 89-98, (2006)
  • [7] Li Hongwei, Liu Dongxiao, Dai Yuanshun, Et al., Engineering searchable encryption of mobile cloud networks: When QoE meets QoP, IEEE Wireless Communications, 22, 4, pp. 74-80, (2015)
  • [8] Li Shuang, Xu Maozhi, Searchable encryption scheme based on attributes, Chinese Journal of Computers, 37, 5, pp. 1017-1024, (2014)
  • [9] Guan Zhitao, Yang Tingting, Xu Ruzhi, Et al., Multi-authority access control scheme based on attribute encryption for cloud storage, Journal on Communications, 36, 6, pp. 120-130, (2015)
  • [10] Ying Zuobin, Ma Jianfeng, Cui Jiangtao, Semi-policy hidden attribute encryption scheme supporting dynamic policy update, Journal on Communications, 36, 12, pp. 178-189, (2015)