Provably secure public key encryption with keyword search for data outsourcing in cloud environments

被引:9
|
作者
Ghosh, Sudeep [1 ,2 ]
Islam, S. K. Hafizul [2 ]
Bisht, Abhishek [3 ]
Das, Ashok Kumar [3 ]
机构
[1] Guru Nanak Inst Technol, Dept Informat Technol, Kolkata 700114, W Bengal, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
关键词
Cloud server; Data outsourcing; Keyword search; Public key encryption; Probable security; RANKED SEARCH; ENABLING EFFICIENT; DESIGNATED TESTER; SCHEME; PRIVACY; ATTACKS;
D O I
10.1016/j.sysarc.2023.102876
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent days, the application of cloud computing has been gaining significant popularity among people. A considerable amount of data are being stored in the cloud server. However, data owners outsource their encrypted data to the cloud for various security reasons. Unfortunately, encrypted data cannot be searched, like plaintext data. So how to search encrypted data is an interesting problem in this era. Many public key encryption with keyword search (PEKS) schemes have been designed in the literature. However, most of them cannot prevent keyword-guessing attacks. In this paper, we develop a provably secure PEKS scheme in the random oracle model. This scheme may be used for secure email access from an email server containing a list of encrypted keywords. The proposed scheme can resist keyword-guessing attacks, and offer ciphertext and trapdoor indistinguishability properties. We use the data owner's private key during encryption to prevent keyword-guessing attacks. Using the data owner's public key in the verification phase ensures the resilience of keyword-guessing attacks. Finally, the proposed scheme has been tested on a real testbed, and the results show that it can be used in the cloud computing scenario to search for keywords on encrypted data.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Post-Quantum Secure Public Key Broadcast Encryption with Keyword Search
    Yang, Yang
    Yang, Shu-Lve
    Wang, Feng-He
    Sun, Jin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (02) : 485 - 497
  • [22] Provable Secure Dual-Server Public Key Encryption with Keyword Search
    Huang, Kaibin
    Tso, Raylin
    2017 IEEE 2ND INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2017, : 39 - 44
  • [23] On the Security of Secure Server-Designation Public Key Encryption with Keyword Search
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    Liu, Dongxiao
    COMPUTER JOURNAL, 2018, 61 (12): : 1791 - 1793
  • [24] Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search
    JIANG, Z. H. E.
    ZHANG, K. A., I
    WANG, L. I. A. N. G. L. I. A. N. G.
    NING, J. I. A. N. T. I. N. G.
    COMPUTER JOURNAL, 2023, 66 (09): : 2265 - 2278
  • [25] An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time
    Han, Lidong
    Guo, Junling
    Yang, Guang
    Xie, Qi
    Tian, Chengliang
    IEEE ACCESS, 2021, 9 : 151245 - 151253
  • [26] Improved Secure Server-Designated Public Key Encryption with Keyword Search
    Andola, Nitish
    Prakash, Sourabh
    Venkatesan, S.
    Verma, Shekhar
    2017 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [27] Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search
    Emura, Keita
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 237 - 256
  • [28] An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing
    Bo, Yang
    Zhang, Mingwu
    Du, Jun-Qiang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04): : 1083 - 1093
  • [29] Generic combination of public key encryption with keyword search and public key encryption
    Zhang, Rui
    Imai, Hideki
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 159 - 174
  • [30] The Public Verifiability of Public Key Encryption with Keyword Search
    Zhu, Binrui
    Sun, Jiameng
    Qin, Jing
    Ma, Jixin
    MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017), 2018, 235 : 299 - 312