Provably secure public key encryption with keyword search for data outsourcing in cloud environments

被引:7
|
作者
Ghosh, Sudeep [1 ,2 ]
Islam, S. K. Hafizul [2 ]
Bisht, Abhishek [3 ]
Das, Ashok Kumar [3 ]
机构
[1] Guru Nanak Inst Technol, Dept Informat Technol, Kolkata 700114, W Bengal, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
关键词
Cloud server; Data outsourcing; Keyword search; Public key encryption; Probable security; RANKED SEARCH; ENABLING EFFICIENT; DESIGNATED TESTER; SCHEME; PRIVACY; ATTACKS;
D O I
10.1016/j.sysarc.2023.102876
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent days, the application of cloud computing has been gaining significant popularity among people. A considerable amount of data are being stored in the cloud server. However, data owners outsource their encrypted data to the cloud for various security reasons. Unfortunately, encrypted data cannot be searched, like plaintext data. So how to search encrypted data is an interesting problem in this era. Many public key encryption with keyword search (PEKS) schemes have been designed in the literature. However, most of them cannot prevent keyword-guessing attacks. In this paper, we develop a provably secure PEKS scheme in the random oracle model. This scheme may be used for secure email access from an email server containing a list of encrypted keywords. The proposed scheme can resist keyword-guessing attacks, and offer ciphertext and trapdoor indistinguishability properties. We use the data owner's private key during encryption to prevent keyword-guessing attacks. Using the data owner's public key in the verification phase ensures the resilience of keyword-guessing attacks. Finally, the proposed scheme has been tested on a real testbed, and the results show that it can be used in the cloud computing scenario to search for keywords on encrypted data.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] A provably secure certificateless public key encryption with keyword search
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, King-Hang
    Meng, Chao
    Wang, Eric Ke
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2019, 42 (01) : 20 - 28
  • [2] Provably secure public-key encryption with conjunctive and subset keyword search
    Oriol Farràs
    Jordi Ribes-González
    [J]. International Journal of Information Security, 2019, 18 : 533 - 548
  • [3] Provably secure public-key encryption with conjunctive and subset keyword search
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 533 - 548
  • [4] Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack
    Xu, Peng
    Jin, Hai
    Wu, Qianhong
    Wang, Wei
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) : 2266 - 2277
  • [5] Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage
    Zeng, Ming
    Qian, Haifeng
    Chen, Jie
    Zhang, Kai
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 426 - 438
  • [6] iPEKS: Fast and Secure Cloud Data Retrieval from the Public-key Encryption with Keyword Search
    Tseng, Fu-Kuo
    Chen, Rong-Jaye
    Lin, Bao-Shuh Paul
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 452 - 458
  • [7] Public Key Encryption with Keyword Search in Cloud: A Survey
    Zhou, Yunhong
    Li, Na
    Tian, Yanmei
    An, Dezhi
    Wang, Licheng
    [J]. ENTROPY, 2020, 22 (04)
  • [8] Forward Secure Public Key Encryption with Keyword Search for Cloud-assisted IoT
    Kim, Hyeongseob
    Hahn, Changhee
    Hur, Junbeom
    [J]. 2020 IEEE 13TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2020), 2020, : 549 - 556
  • [9] On the integration of public key data encryption and public key encryption with keyword search
    Baek, Joonsang
    Safavi-Naini, Reihaneh
    Susilo, Willy
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 217 - 232
  • [10] Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 789 - 798