Towards Secure Data Retrieval for Multi-Tenant Architecture Using Attribute-Based Key Word Search

被引:0
|
作者
Hong, Hanshu [1 ]
Xia, Yunhao [1 ]
Sun, Zhixin [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Minist Educ, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing 210003, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Inst Modern Posts, Nanjing 210003, Peoples R China
来源
SYMMETRY-BASEL | 2017年 / 9卷 / 06期
基金
中国国家自然科学基金;
关键词
attribute-based data retrieval; key word search; key exposure protection; multitenant architecture; KEYWORD SEARCH; ENCRYPTION; EFFICIENT;
D O I
10.3390/sym9060089
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Searchable encryption mechanism and attribute-based encryption (ABE) are two effective tools for providing fine-grained data access control in the cloud. Researchers have also taken their advantages to present searchable encryption schemes based on ABE and have achieved significant results. However, most of the existing key word search schemes based on ABE lack the properties of key exposure protection and highly efficient key updating when key leakage happens. To better tackle these problems, we present a key insulated attribute-based data retrieval scheme with key word search (KI-ABDR-KS) for multi-tenant architecture. In our scheme, a data owner can make a self-centric access policy of the encrypted data. Only when the possessing attributes match with the policy can a receiver generate a valid trapdoor and search the ciphertext. The proposed KI-ABDR-KS also provides full security protection when key exposure happens, which can minimize the damage brought by key exposure. Furthermore, the system public parameters remain unchanged during the process of key updating; this will reduce the considerable overheads brought by parameters synchronization. Finally, our KI-ABDR-KS is proven to be secure under chosen-keyword attack and achieves better efficiency compared to existing works.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption
    Sudarsono, Amang
    Nakanishi, Toru
    2014 SECOND INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2014, : 536 - 542
  • [42] Towards Secure Data Sharing in Cloud Computing Using Attribute Based Proxy Re-Encryption with Keyword Search
    Hong, Hanshu
    Sun, Zhixin
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 218 - 223
  • [43] Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks
    Hyunsoo Kwon
    Daeyeong Kim
    Changhee Hahn
    Junbeom Hur
    Multimedia Tools and Applications, 2017, 76 : 19507 - 19521
  • [44] Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks
    Kwon, Hyunsoo
    Kim, Daeyeong
    Hahn, Changhee
    Hur, Junbeom
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19507 - 19521
  • [45] VPAMS: Verifiable and practical attribute-based multi-keyword search over encrypted cloud data
    Liang, Yanrong
    Li, Yanping
    Cao, Qiang
    Ren, Fang
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 108 (108)
  • [46] Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    IEEE ACCESS, 2018, 6 : 34051 - 34074
  • [47] A Secure Scheme for Storage, Retrieval, and Sharing of Digital Documents in Cloud Computing Using Attribute-Based Encryption on Mobile Devices
    Morales-Sandoval, Miguel
    Karina Vega-Castillo, Ana
    Diaz-Perez, Arturo
    INFORMATION SECURITY JOURNAL, 2014, 23 (1-2): : 22 - 31
  • [48] Verifiable Attribute-Based Multi-Keyword Search over Encrypted Cloud Data in Multi-Owner Setting
    Fan, Yaqing
    Liu, Zhenhua
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 441 - 449
  • [49] Boolean Searchable Attribute-Based Signcryption With Search Results Self-Verifiability Mechanism for Data Storage and Retrieval in Clouds
    Rao, Y. Sreenivasa
    Prasad, Suryakant
    Bera, Sourav
    Das, Ashok Kumar
    Susilo, Willy
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (04) : 1382 - 1399
  • [50] An Implementation of Secure Data Exchange System with Multi-hop Routing in Wireless Delay Tolerant Network Using Attribute-Based Encryption
    Sudarsono, Amang
    Nakanishi, Tom
    PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 470 - 476