A lightweight secure conjunctive keyword search scheme in hybrid cloud

被引:6
|
作者
He, Heng [1 ,2 ]
Zhang, Ji [1 ,2 ]
Li, Peng [1 ,2 ]
Jin, Yu [1 ,2 ]
Zhang, Tao [3 ]
机构
[1] Wuhan Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan, Hubei, Peoples R China
[2] Hubei Prov Key Lab Intelligent Informat Proc & Re, Wuhan, Hubei, Peoples R China
[3] New York Inst Technol, Coll Engn & Comp Sci, Old Westbury, NY 11568 USA
基金
中国国家自然科学基金;
关键词
Hybrid cloud; Conjunctive keyword search; Attribute-based encryption; Access control policy;
D O I
10.1016/j.future.2018.09.026
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Keyword search over encrypted sensitive data is an essential technique in cloud computing. Many traditional secure retrieval schemes of the encrypted data mainly apply to single file-owner and single retrieval-party scenario, which cannot be used in cloud environment effectively. The emergence of Attribute-Based Encryption (ABE) provides a new solution to deliver secure and multi-parties keyword search over the encrypted data. However, most existing attribute-based keyword search schemes suffer problems, such as, imposed heavy computational burden for file-owner, limited expressive capability of access control policy, supported for single keyword search only, etc. Hence, we present a Lightweight secure Conjunctive Keyword Search scheme in hybrid cloud environment (LCKS) based on ciphertext-policy ABE algorithm, which supports file-owner authorized conjunctive keyword search for multiparties. By delegating most computational tasks to private cloud servers, LCKS enables file-owners to generate keyword index efficiently while delivering a fine-grained access control policy through adopting an expressive tree structure. Both security analysis and performance evaluation show that LCKS is secure, highly efficient, and well suited for hybrid cloud. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:727 / 736
页数:10
相关论文
共 50 条
  • [31] Provable secure lightweight attribute-based keyword search for cloud-based Internet of Things networks
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (05)
  • [32] Passive Query-Recovery Attack Against Secure Conjunctive Keyword Search Schemes
    Dijkslag, Marco
    Damie, Marc
    Hahn, Florian
    Peter, Andreas
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 126 - 146
  • [33] A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
    Ameri, Mohammad Hassan
    Delavar, Mahshid
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (03) : 660 - 671
  • [34] A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud
    Zhang, Kai
    Liu, Ximeng
    Li, Yanping
    Zhang, Tao
    Yang, Shuhua
    IEEE ACCESS, 2020, 8 : 127845 - 127855
  • [35] Secure Ranked Keyword Search over Encrypted Cloud Data
    Wang, Cong
    Cao, Ning
    Li, Jin
    Ren, Kui
    Lou, Wenjing
    2010 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2010, 2010,
  • [36] Secure keyword search using dual encryption in cloud computing
    Tariq H.
    Agarwal P.
    International Journal of Information Technology, 2020, 12 (4) : 1063 - 1072
  • [37] Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Xia, Jinyue
    Szalachowski, Pawel
    Fang Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2787 - 2800
  • [38] A Forward Secure Dynamic Searchable Encryption Scheme Supporting Conjunctive Search
    Tang Y.
    Li J.
    Yan X.
    Zhao Q.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1853 - 1866
  • [39] An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud
    Li, Nan
    Su, Qianqian
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (01):
  • [40] Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing
    Nie, Kai
    Wang, Yunling
    Tao, Xiaoling
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (06) : 707 - 718