Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments

被引:40
|
作者
Yu, Yong [1 ,2 ]
Shi, Junbin [1 ]
Li, Huilin [1 ]
Li, Yannan [3 ]
Du, Xiaojiang [4 ]
Guizani, Mohsen [5 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Guangdong Prov Key Lab Data Secur & Privacy Prote, Guangzhou 510632, Peoples R China
[3] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[4] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[5] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Encryption; Cloud computing; Access control; Keyword search; Public key; Searchable encryption; fine-grained access control; keyword guessing attack; IDENTITY-BASED ENCRYPTION; FRAMEWORK; SECURITY;
D O I
10.1109/JSAC.2020.2986620
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable computing resources. It is challenging to search data encrypted and stored in cloud storage servers. Searchable encryption enables data users to search on ciphertext without leaking any information about keywords and the plaintext of the data. Currently, a number of searchable encryption schemes have been proposed, but most of them provide unlimited search privileges to data users, which is not desirable in certain scenarios. In this paper, we propose a new construction of searchable encryption with fine-grained access control by using key-policy attribute-based cryptography to generate trapdoors to support AND, OR and threshold gates. The main idea is that the data owner encrypts the index keywords according to the specified access policy. The data user can generate a trapdoor to search on data, if and only if the attributes of the data user satisfy the access policy. We provide formal security proofs for the scheme, including the indistinguishability of ciphertexts and the indistinguishability of trapdoors, which are used to resist the chosen keyword attack and the keyword guessing attack of external adversaries. Comprehensive security analysis and implementation results show that the proposed scheme is provably secure and feasible in real-world applications.
引用
收藏
页码:1242 / 1251
页数:10
相关论文
共 50 条
  • [1] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [2] Hierarchical Authority Key-Policy Attribute-Based Encryption
    You, Lin
    Wang, Lijun
    [J]. 2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 868 - 872
  • [3] Large universe decentralized key-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 501 - 509
  • [4] A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud
    Zhang, Kai
    Liu, Ximeng
    Li, Yanping
    Zhang, Tao
    Yang, Shuhua
    [J]. IEEE ACCESS, 2020, 8 : 127845 - 127855
  • [5] A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
    Ameri, Mohammad Hassan
    Delavar, Mahshid
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (03) : 660 - 671
  • [6] Key-Policy Multi-authority Attribute-Based Encryption
    Longo, Riccardo
    Marcolla, Chiara
    Sala, Massimiliano
    [J]. ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 152 - 164
  • [7] Adaptable key-policy attribute-based encryption with time interval
    Siqi Ma
    Junzuo Lai
    Robert H. Deng
    Xuhua Ding
    [J]. Soft Computing, 2017, 21 : 6191 - 6200
  • [8] Key-Policy Attribute-Based Encryption from Bilinear Maps
    Tiplea, Ferucio Laurentiu
    Dragan, Constantin Catalin
    Nica, Anca-Maria
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 28 - 42
  • [9] KEY-POLICY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR GENERAL CIRCUITS
    Bolocan, Diana
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2020, 21 (01): : 11 - 19
  • [10] Adaptable key-policy attribute-based encryption with time interval
    Ma, Siqi
    Lai, Junzuo
    Deng, Robert H.
    Ding, Xuhua
    [J]. SOFT COMPUTING, 2017, 21 (20) : 6191 - 6200