Towards Secure Data Retrieval for Multi-Tenant Architecture Using Attribute-Based Key Word Search

被引:0
|
作者
Hong, Hanshu [1 ]
Xia, Yunhao [1 ]
Sun, Zhixin [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Minist Educ, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing 210003, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Inst Modern Posts, Nanjing 210003, Peoples R China
来源
SYMMETRY-BASEL | 2017年 / 9卷 / 06期
基金
中国国家自然科学基金;
关键词
attribute-based data retrieval; key word search; key exposure protection; multitenant architecture; KEYWORD SEARCH; ENCRYPTION; EFFICIENT;
D O I
10.3390/sym9060089
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Searchable encryption mechanism and attribute-based encryption (ABE) are two effective tools for providing fine-grained data access control in the cloud. Researchers have also taken their advantages to present searchable encryption schemes based on ABE and have achieved significant results. However, most of the existing key word search schemes based on ABE lack the properties of key exposure protection and highly efficient key updating when key leakage happens. To better tackle these problems, we present a key insulated attribute-based data retrieval scheme with key word search (KI-ABDR-KS) for multi-tenant architecture. In our scheme, a data owner can make a self-centric access policy of the encrypted data. Only when the possessing attributes match with the policy can a receiver generate a valid trapdoor and search the ciphertext. The proposed KI-ABDR-KS also provides full security protection when key exposure happens, which can minimize the damage brought by key exposure. Furthermore, the system public parameters remain unchanged during the process of key updating; this will reduce the considerable overheads brought by parameters synchronization. Finally, our KI-ABDR-KS is proven to be secure under chosen-keyword attack and achieves better efficiency compared to existing works.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Secure personal data sharing in cloud computing using attribute-based broadcast encryption
    FU Jing-yi
    HUANG Qin-long
    MA Zhao-feng
    YANG Yi-xian
    The Journal of China Universities of Posts and Telecommunications, 2014, (06) : 45 - 51
  • [32] Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating
    Naruse, Takeru
    Mohri, Masami
    Shiraishi, Yoshiaki
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2015, 5
  • [33] Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme
    Shruti
    Rani, Shalli
    Srivastava, Gautam
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 235
  • [34] Using Probabilistic Data Structures for Monitoring of Multi-tenant P4-based Networks
    Martins, Regis E. T.
    Verdi, Fabio L.
    Villaca, Rodolfo
    Garcia, Luis Fernando U.
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 209 - 212
  • [35] Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    SENSORS, 2018, 18 (05)
  • [36] A Secure Fog-cloud Architecture using Attribute-based Encryption for the Medical Internet of Things (MIoT)
    Alshehri, Suhair
    Almehmadi, Tahani
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (12) : 924 - 933
  • [37] Using Attribute-Based Access Control, Efficient Data Access in the Cloud with Authorized Search
    Saraswathy, K. S.
    Sujatha, S. S.
    INTERNATIONAL JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING SYSTEMS, 2022, 13 (07) : 569 - 575
  • [38] Towards Dynamic Request Updating With Elastic Scheduling for Multi-Tenant Cloud-Based Data Center Network
    Lu, Shuaibing
    Wu, Jie
    Shi, Jiamei
    Fang, Juan
    Zhang, Jiayue
    Liu, Haiming
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2223 - 2237
  • [39] A Digital Envelope approach using Attribute-Based Encryption for Secure Data Exchange in IoT Scenarios
    Perez, Salvador
    Hernandez-Ramos, Jose L.
    Skarmeta, Antonio F.
    Pedone, Diego
    Rotondi, Domenico
    Straniero, Leonardo
    2017 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS 2017), 2017, : 421 - 426
  • [40] A Secure Image-Video Retrieval Scheme with Attribute-Based Encryption and Multi-feature Fusion in Smart Grid
    Dang, Qian
    Zhao, Bo
    Sun, Biying
    Qiu, Yu
    Du, Chunhui
    SCIENCE OF CYBER SECURITY, SCISEC 2022 WORKSHOPS, 2022, 1680 : 150 - 166