Provably secure public key encryption with keyword search for data outsourcing in cloud environments

被引:7
|
作者
Ghosh, Sudeep [1 ,2 ]
Islam, S. K. Hafizul [2 ]
Bisht, Abhishek [3 ]
Das, Ashok Kumar [3 ]
机构
[1] Guru Nanak Inst Technol, Dept Informat Technol, Kolkata 700114, W Bengal, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
关键词
Cloud server; Data outsourcing; Keyword search; Public key encryption; Probable security; RANKED SEARCH; ENABLING EFFICIENT; DESIGNATED TESTER; SCHEME; PRIVACY; ATTACKS;
D O I
10.1016/j.sysarc.2023.102876
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent days, the application of cloud computing has been gaining significant popularity among people. A considerable amount of data are being stored in the cloud server. However, data owners outsource their encrypted data to the cloud for various security reasons. Unfortunately, encrypted data cannot be searched, like plaintext data. So how to search encrypted data is an interesting problem in this era. Many public key encryption with keyword search (PEKS) schemes have been designed in the literature. However, most of them cannot prevent keyword-guessing attacks. In this paper, we develop a provably secure PEKS scheme in the random oracle model. This scheme may be used for secure email access from an email server containing a list of encrypted keywords. The proposed scheme can resist keyword-guessing attacks, and offer ciphertext and trapdoor indistinguishability properties. We use the data owner's private key during encryption to prevent keyword-guessing attacks. Using the data owner's public key in the verification phase ensures the resilience of keyword-guessing attacks. Finally, the proposed scheme has been tested on a real testbed, and the results show that it can be used in the cloud computing scenario to search for keywords on encrypted data.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Public Key Encryption with Wildcards Keyword Search
    Wang, Zhao-li
    Han, Jin-li
    Wang, Mei-juan
    Shi, Ya-qing
    Dong, Hui
    [J]. 2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 538 - 541
  • [32] Public key encryption with distributed keyword search
    Eslami, Ziba
    Noroozi, Mahnaz
    Amirizirtol, Kobra
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2369 - 2393
  • [33] Certificateless Public Key Encryption with Keyword Search
    Peng Yanguo
    Cui Jiangtao
    Peng Changgen
    Ying Zuobin
    [J]. CHINA COMMUNICATIONS, 2014, 11 (11) : 100 - 113
  • [34] Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices
    Mao, Yaojun
    Fu, Xingbing
    Guo, Chen
    Wu, Guohua
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (11)
  • [35] Key Insertion and Splay Tree Encryption Algorithm for Secure Data Outsourcing in Cloud
    Rani, A. Mercy Gnana
    Marimuthu, A.
    [J]. 2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 92 - +
  • [36] Public key encryption with keyword search secure against keyword guessing attacks without random oracle
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    [J]. INFORMATION SCIENCES, 2013, 238 : 221 - 241
  • [37] Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment
    Banik, Mandira
    Kumar, Sanjay
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [38] A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search
    Ma, Sha
    Huang, Qiong
    [J]. COMPUTER JOURNAL, 2020, 63 (12): : 1849 - 1858
  • [39] Public-key encryption with keyword search secure against continual memory attacks
    Hu, Chengyu
    Yang, Rupeng
    Liu, Pengtao
    Yu, Zuoxia
    Zhou, Yongbin
    Xu, Qiuliang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1613 - 1629
  • [40] Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
    Rhee, Hyun Sook
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 69 - 85