Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments

被引:40
|
作者
Yu, Yong [1 ,2 ]
Shi, Junbin [1 ]
Li, Huilin [1 ]
Li, Yannan [3 ]
Du, Xiaojiang [4 ]
Guizani, Mohsen [5 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Guangdong Prov Key Lab Data Secur & Privacy Prote, Guangzhou 510632, Peoples R China
[3] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[4] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[5] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Encryption; Cloud computing; Access control; Keyword search; Public key; Searchable encryption; fine-grained access control; keyword guessing attack; IDENTITY-BASED ENCRYPTION; FRAMEWORK; SECURITY;
D O I
10.1109/JSAC.2020.2986620
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable computing resources. It is challenging to search data encrypted and stored in cloud storage servers. Searchable encryption enables data users to search on ciphertext without leaking any information about keywords and the plaintext of the data. Currently, a number of searchable encryption schemes have been proposed, but most of them provide unlimited search privileges to data users, which is not desirable in certain scenarios. In this paper, we propose a new construction of searchable encryption with fine-grained access control by using key-policy attribute-based cryptography to generate trapdoors to support AND, OR and threshold gates. The main idea is that the data owner encrypts the index keywords according to the specified access policy. The data user can generate a trapdoor to search on data, if and only if the attributes of the data user satisfy the access policy. We provide formal security proofs for the scheme, including the indistinguishability of ciphertexts and the indistinguishability of trapdoors, which are used to resist the chosen keyword attack and the keyword guessing attack of external adversaries. Comprehensive security analysis and implementation results show that the proposed scheme is provably secure and feasible in real-world applications.
引用
收藏
页码:1242 / 1251
页数:10
相关论文
共 50 条
  • [41] Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
    Hayata, Junichiro
    Ishizaka, Masahito
    Sakai, Yusuke
    Hanaoka, Goichiro
    Matsuura, Kanta
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 107 - 113
  • [42] Attribute-based keyword search encryption for power data protection
    Zhang, Xun
    Mu, Dejun
    Zhao, Jinxiong
    [J]. HIGH-CONFIDENCE COMPUTING, 2023, 3 (02):
  • [43] Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Zhou, Yunya
    [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 91 - 108
  • [44] Privacy-Preserving Decentralized Key-Policy Attribute-Based Signcryption in Cloud Computing Environments
    Meng Xian Yong
    Chen Zhong
    Meng Xiang Yu
    [J]. SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS II, PTS 1 AND 2, 2014, 475-476 : 1144 - +
  • [45] User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Rahulamathavan, Yogachandran
    Veluru, Suresh
    Han, Jinguang
    Li, Fei
    Rajarajan, Muttukrishnan
    Lu, Rongxing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (09) : 2939 - 2946
  • [46] Online/Offline Attribute-Based Encryption with Keyword Search against Keyword Guessing Attack
    Su, Hang
    Zhu, Zhiqiang
    Sun, Lei
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1487 - 1492
  • [47] Attribute-based keyword search encryption scheme for IoT edge environment
    Zhang, Kangjun
    Yuan, Lingyun
    Peng, Xingwei
    [J]. PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 102 - 107
  • [48] ABDKS: attribute-based encryption with dynamic keyword search in fog computing
    Fei MENG
    Leixiao CHENG
    Mingqiang WANG
    [J]. Frontiers of Computer Science., 2021, (05) - 197
  • [49] Attribute-based Proxy Re-encryption Scheme with Keyword Search
    Liu Zhenhua
    Zhou Peilin
    Duan Shuhong
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 683 - 689
  • [50] Accountable authority key policy attribute-based encryption
    WANG YongTao 1
    2 China Information Technology Security Evaluation Center
    3 Shanghai Key Laboratory of Scalable Computing and Systems
    4 State Key Laboratory of Information Security
    [J]. Science China(Information Sciences), 2012, 55 (07) : 1631 - 1638