Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data

被引:28
|
作者
Liang, Kaitai [1 ]
Su, Chunhua [2 ]
Chen, Jiageng [3 ]
Liu, Joseph K. [4 ]
机构
[1] Aalto Univ, Dept Comp Sci, Helsinki, Finland
[2] Japan Adv Inst Sci & Technol, Sch Informat Sci, 1-1 Asahidai, Nomi, Ishikawa 9231292, Japan
[3] Cent China Normal Univ, Comp Sch, Wuhan 430079, Peoples R China
[4] Monash Univ, Fac Informat Technol, Melbourne, Vic, Australia
关键词
Encrypted cloud data; privacy; secure data search and share; efficiency; PROXY RE-ENCRYPTION; IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; CONJUNCTIVE KEYWORD SEARCH; SCHEME; DELEGATION;
D O I
10.1145/2897845.2897865
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing a huge amount of local data to remote cloud servers that has been become a significant trend for industries. Leveraging the considerable cloud storage space, industries can also put forward the outsourced data to cloud computing. How to collect the data for computing without loss of privacy and confidentiality is one of the crucial security problems. Searchable encryption technique has been proposed to protect the confidentiality of the outsourced data and the privacy of the corresponding data query. This technique, however, only supporting search functionality, may not be fully applicable to real-world cloud computing scenario whereby secure data search, share as well as computation are needed. This work presents a novel encrypted cloud-based data share and search system without loss of user privacy and data confidentiality. The new system enables users to make conjunctive keyword query over encrypted data, but also allows encrypted data to be efficiently and multiply shared among different users without the need of the "download-decrypt-then-encrypt" mode. As of independent interest, our system provides secure keyword update, so that users can freely and securely update data's keyword field. It is worth mentioning that all the above functionalities do not incur any expansion of ciphertext size, namely, the size of ciphertext remains constant during being searched, shared and keyword-updated. The system is proven secure and meanwhile, the efficiency analysis shows its great potential in being used in large-scale database.
引用
收藏
页码:83 / 94
页数:12
相关论文
共 50 条
  • [1] Towards efficient sharing of encrypted data in cloud-based mobile social network
    Sun, Xin
    Yao, Yiyang
    Xia, Yingjie
    Liu, Xuejiao
    Chen, Jian
    Wang, Zhiqiang
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (04): : 1892 - 1903
  • [2] Cloud-based MPC with Encrypted Data
    Alexandru, Andreea B.
    Morari, Manfred
    Pappas, George J.
    [J]. 2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 5014 - 5019
  • [3] SafeBox: A Scheme for Searching and Sharing Encrypted Data in Cloud Applications
    Wang, Guofeng
    Liu, Chuanyi
    Dong, Yingfei
    Pan, Hezhong
    Han, Peiyi
    Fang, Binxing
    [J]. 2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2017, : 648 - 653
  • [4] Enabling efficient and verifiable secure search on cloud-based encrypted big data
    Ruizhong Du
    Chenghao Yu
    Mingyue Li
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 2574 - 2590
  • [5] Enabling efficient and verifiable secure search on cloud-based encrypted big data
    Du, Ruizhong
    Yu, Chenghao
    Li, Mingyue
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2574 - 2590
  • [6] A cloud-based platform for encrypted data mining as a service
    Reyes-Palacios, Shanel
    Morales-Sandoval, Miguel
    Garcia-Hernandez, Jose Juan
    Marin-Castro, Heidy M.
    Gonzalez-Compean, J. L.
    [J]. 2023 MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, ENC, 2024,
  • [7] Efficient sharing of encrypted data
    Bennett, K
    Grothoff, C
    Horozov, T
    Patrascu, I
    [J]. INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 107 - 120
  • [8] Using secret sharing for searching in encrypted data
    Brinkman, R
    Doumen, J
    Jonker, W
    [J]. SECURE DATA MANAGEMENT, PROCEEDINGS, 2004, 3178 : 18 - 27
  • [9] Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-Based Systems
    Yang, Kan
    Shu, Jiangang
    Xie, Ruitao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 71 - 84
  • [10] Harnessing Encrypted Data in Cloud for Secure and Efficient Mobile Image Sharing
    Cui, Helei
    Yuan, Xingliang
    Wang, Cong
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (05) : 1315 - 1329