A Key-Policy Searchable Attribute-Based Encryption Scheme for Efficient Keyword Search and Fine-Grained Access Control over Encrypted Data

被引:12
|
作者
Yin, Hui [1 ]
Xiong, Yinqiao [1 ,2 ]
Zhang, Jixin [3 ]
Ou, Lu [3 ]
Liao, Shaolin [4 ,5 ]
Qin, Zheng [3 ]
机构
[1] Changsha Univ, Coll Comp Engn & Appl Math, Changsha 410022, Hunan, Peoples R China
[2] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[3] Hunan Univ, Coll Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
[4] Argonne Natl Lab, Cass Ave, Lemont, IL 60439 USA
[5] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
关键词
access control; cloud computing; key-policy attribute-based encryption; searchable encryption; SECURITY;
D O I
10.3390/electronics8030265
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute based encryption is a promising technique that achieves flexible and fine-grained data access control over encrypted data, which is very suitable for a secure data sharing environment such as the currently popular cloud computing. However, traditional attribute based encryption fails to provide an efficient keyword based search on encrypted data, which somewhat weakens the power of this encryption technique, as search is usually the most important approach to quickly obtain data of interest from large-scale dataset. To address this problem, attribute based encryption with keyword search (ABKS) is designed to achieve fine-grained data access control and keyword based search, simultaneously, by an ingenious combination of attribute based encryption and searchable encryption. Recently, several ABKS schemes have been constructed in secure cloud storage system for data access control and keyword search. Nonetheless, each of these schemes has some defects such as impractical computation overhead and insufficient access policy expression. To overcome these limitations, in this paper, we design a Key-Policy Searchable Attribute-based Encryption Scheme (KPSABES) based on the full-blown key-policy attribute-based encryption proposed by Vipul Goyal et al. By novel design, our scheme not only inherits all advantages of that scheme but also achieves efficient and secure keyword search over encrypted data. We provide the detailed performance analyses and security proofs for our scheme. Extensive experiments demonstrated that our proposed scheme is superior in many aspects to the similar work.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data
    Luo, Fucai
    Wang, Haiyan
    Yan, Xingfu
    Wu, Jiahui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7245 - 7258
  • [2] Key-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control
    Liu, Ximeng
    Zhu, Hui
    Ma, Jianfeng
    Ma, Jun
    Ma, Siqi
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 694 - 699
  • [3] Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments
    Yu, Yong
    Shi, Junbin
    Li, Huilin
    Li, Yannan
    Du, Xiaojiang
    Guizani, Mohsen
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (06) : 1242 - 1251
  • [4] A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain
    Lu, Xiaofeng
    Fu, Songbing
    Jiang, Cheng
    Lio, Pietro
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [5] An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups
    Meng, Ru
    Zhou, Yanwei
    Ning, Jianting
    Liang, Kaitai
    Han, Jinguang
    Susilo, Willy
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 39 - 56
  • [6] Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation
    Ghopur, Dilxat
    Ma, Jianfeng
    Ma, Xindi
    Hao, Jialu
    Jiang, Tao
    Wang, Xiangyu
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3999 - 4011
  • [7] Fine-grained user access control in ciphertext-policy attribute-based encryption
    Hur, Junbeom
    Park, Chanil
    Hwang, Seong Oun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 253 - 261
  • [8] Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control
    Shan, Boshen
    Yao, Yuanzhi
    Li, Weihai
    Zuo, Xiaodong
    Yu, Nenghai
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1340 - 1347
  • [9] An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Wang, Changji
    Luo, Jianfa
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [10] A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud
    Zhang, Kai
    Liu, Ximeng
    Li, Yanping
    Zhang, Tao
    Yang, Shuhua
    [J]. IEEE ACCESS, 2020, 8 : 127845 - 127855