Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage

被引:169
|
作者
Liang, Kaitai [1 ]
Susilo, Willy [2 ]
机构
[1] Aalto Univ, Dept Comp Sci, Espoo 02150, Finland
[2] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
芬兰科学院; 澳大利亚研究理事会;
关键词
Searchable attribute-based encryption; keyword update; encrypted data sharing; CONJUNCTIVE KEYWORD SEARCH; PUBLIC-KEY ENCRYPTION; PROXY RE-ENCRYPTION; DELEGATION;
D O I
10.1109/TIFS.2015.2442215
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
To date, the growth of electronic personal data leads to a trend that data owners prefer to remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and storage service without worrying the burden of local data management and maintenance. However, secure share and search for the outsourced data is a formidable task, which may easily incur the leakage of sensitive personal information. Efficient data sharing and searching with security is of critical importance. This paper, for the first time, proposes a searchable attribute-based proxy reencryption system. When compared with the existing systems only supporting either searchable attribute-based functionality or attribute-based proxy reencryption, our new primitive supports both abilities and provides flexible keyword update service. In particular, the system enables a data owner to efficiently share his data to a specified group of users matching a sharing policy and meanwhile, the data will maintain its searchable property but also the corresponding search keyword(s) can be updated after the data sharing. The new mechanism is applicable to many real-world applications, such as electronic health record systems. It is also proved chosen ciphertext secure in the random oracle model.
引用
下载
收藏
页码:1981 / 1992
页数:12
相关论文
共 50 条
  • [31] Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [32] Certificateless searchable attribute-based encryption approach for cloud data based on blockchain
    Jeba, J. Monisha Privthy
    Vivekrabinson, K.
    Raja, B. Shanmuga
    Sundareswaran, N.
    Vijay, M.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2024, 45 (04) : 239 - 253
  • [33] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [34] Attribute-Based Approaches for Secure Data Sharing in Industrial Contexts
    Chiquito, Alex
    Bodin, Ulf
    Schelen, Olov
    IEEE ACCESS, 2023, 11 : 10180 - 10195
  • [35] Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation
    Islam, Md Azharul
    Madria, Sanjay
    SECURITY AND PRIVACY, 2024, 7 (01)
  • [36] Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
    Lin, Suqing
    Zhang, Rui
    Wang, Mingsheng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1748 - 1758
  • [37] Attribute-based searchable encryption with decentralized key management for healthcare data sharing
    Yin, Hongjian
    Zhao, Yiming
    Zhang, Lei
    Qiao, Baojun
    Chen, Wenbo
    Wang, Huaqing
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 148
  • [38] Attribute-based Data Integrity Checking for Cloud Storage
    Tian, Miaomiao
    Wang, Lingyan
    Zhong, Hong
    Chen, Jie
    FUNDAMENTA INFORMATICAE, 2018, 163 (04) : 395 - 411
  • [39] A Blockchain-Based Anonymous Attribute-Based Searchable Encryption Scheme for Data Sharing
    Zhang, Kai
    Zhang, Yan
    Li, Yanping
    Liu, Ximeng
    Lu, Laifeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 1685 - 1697
  • [40] Efficient and privacy-aware attribute-based data sharing in mobile cloud computing
    Zhang, Yinghui
    Wu, Axin
    Zheng, Dong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1039 - 1048