A Multi-keyword Multi-user Searchable Encryption Scheme Based On Cloud Storage

被引:0
|
作者
Huang, Haiping [1 ,2 ,3 ]
Du, Jianpeng [1 ,2 ]
Wang, Hui [1 ,2 ]
Wang, Ruchuan [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Tec, Nanjing 210016, Jiangsu, Peoples R China
关键词
searchable encryption; multi-keyword; multi-user; security; access controllability;
D O I
10.1109/TrustCom.2016.294
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, the huge growth of data from electronic business or social network leads to a trend that the owners of data are inclined to outsource their data (usually encrypted) to cloud storage servers. Leveraging searchable encryption technologies can not only guarantee the confidentiality and integrity of the data, but also achieve an effective search on encrypted data. Compared with the single keyword search, the multi-keyword search has an important practical significance for its more precise retrieval of data. Meanwhile, aimed at the defects in existing searchable encryption schemes, such as the unsatisfactory search efficiency and no support for multi-user search, etc., in this paper, we propose a multi-keyword multi-user searchable encryption scheme based on cloud storage, which is realized through secure interactions between authorized users and cloud severs. Our proposal adopts the encryption of exponent which is realized through secure interactions between authorized users and cloud severs involved generation of secure trapdoor and is of indistinguishability against adaptive chosen keyword attack (IND-CKA). Subsequently, theoretical and empirical evaluations demonstrate the desirable retrieval efficiency of our proposal compared with current methods. And meanwhile, our proposal achieves the access controllability of the encrypted data, and is of dynamic addition and revocation of authorized users, at the same time is of dynamic update of the user accessing to files.
引用
收藏
页码:1937 / 1943
页数:7
相关论文
共 50 条
  • [1] Probably Secure Multi-user Multi-keyword Searchable Encryption Scheme in Cloud Storage
    Li, Shijin
    Wang, Fucai
    Shi, Ting
    Kuang, Jinyun
    [J]. PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 1368 - 1372
  • [2] A multi-user searchable encryption scheme with keyword authorization in a cloud storage
    Deng, Zuojie
    Li, Kenli
    Li, Keqin
    Zhou, Jingli
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 208 - 218
  • [3] An Efficient Scheme of Multi-user Searchable Encryption with Keyword in Cloud Storage
    He, Zhiling
    Wang, Baomin
    Luo, Wenjun
    [J]. PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 144 - 147
  • [4] Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage
    Wang, Shangping
    Jia, Shasha
    Zhang, Yaling
    [J]. IEEE ACCESS, 2019, 7 : 50136 - 50147
  • [5] Multi-user and Keyword-based Searchable Encryption Scheme
    Zhang, Ya-ling
    Liu, Li-jun
    Wang, Shang-ping
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 223 - 227
  • [6] A multi-keyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario
    Wang, Miaomiao
    Rui, Lanlan
    Xu, Siya
    Gao, Zhipeng
    Liu, Huiyong
    Guo, Shaoyong
    [J]. COMPUTER NETWORKS, 2023, 237
  • [7] Multi-keyword ranked searchable encryption scheme with access control for cloud storage
    Maryam Zarezadeh
    Hamid Mala
    Maede Ashouri-Talouki
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 207 - 218
  • [8] Multi-keyword ranked searchable encryption scheme with access control for cloud storage
    Zarezadeh, Maryam
    Mala, Hamid
    Ashouri-Talouki, Maede
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (01) : 207 - 218
  • [9] Secure and verifiable multi-keyword searchable encryption scheme in cloud
    Zhang J.
    Wu M.
    Wang J.
    Liu P.
    Jiang Z.
    Peng C.
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (04): : 139 - 149
  • [10] An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control
    Wu, Chuxin
    Zhang, Peng
    Liu, Hongwei
    Chen, Zehong
    Jiang, Zoe L.
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 389 - 398