A Multi-keyword Multi-user Searchable Encryption Scheme Based On Cloud Storage

被引:0
|
作者
Huang, Haiping [1 ,2 ,3 ]
Du, Jianpeng [1 ,2 ]
Wang, Hui [1 ,2 ]
Wang, Ruchuan [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Tec, Nanjing 210016, Jiangsu, Peoples R China
关键词
searchable encryption; multi-keyword; multi-user; security; access controllability;
D O I
10.1109/TrustCom.2016.294
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, the huge growth of data from electronic business or social network leads to a trend that the owners of data are inclined to outsource their data (usually encrypted) to cloud storage servers. Leveraging searchable encryption technologies can not only guarantee the confidentiality and integrity of the data, but also achieve an effective search on encrypted data. Compared with the single keyword search, the multi-keyword search has an important practical significance for its more precise retrieval of data. Meanwhile, aimed at the defects in existing searchable encryption schemes, such as the unsatisfactory search efficiency and no support for multi-user search, etc., in this paper, we propose a multi-keyword multi-user searchable encryption scheme based on cloud storage, which is realized through secure interactions between authorized users and cloud severs. Our proposal adopts the encryption of exponent which is realized through secure interactions between authorized users and cloud severs involved generation of secure trapdoor and is of indistinguishability against adaptive chosen keyword attack (IND-CKA). Subsequently, theoretical and empirical evaluations demonstrate the desirable retrieval efficiency of our proposal compared with current methods. And meanwhile, our proposal achieves the access controllability of the encrypted data, and is of dynamic addition and revocation of authorized users, at the same time is of dynamic update of the user accessing to files.
引用
收藏
页码:1937 / 1943
页数:7
相关论文
共 50 条
  • [41] Revocable and Searchable Attribute-based Encryption Scheme with Multi-keyword and Verifiability for Internet of Things
    [J]. Yin, Fangfang (yinff21@163.com), 1600, Femto Technique Co., Ltd. (23):
  • [42] Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage
    Uma Sankararao Varri
    Syam Kumar Pasupuleti
    K. V Kadambari
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 11455 - 11467
  • [43] A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings
    Zhang, Shuo
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    [J]. SENSORS, 2020, 20 (23) : 1 - 19
  • [44] Paillier-Based Fuzzy Multi-Keyword Searchable Encryption Scheme with Order-Preserving
    Li, Xiehua
    Li, Fang
    Jiang, Jie
    Mei, Xiaoyu
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 65 (02): : 1707 - 1721
  • [45] Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage
    Wang, Shangping
    Yao, Lisha
    Zhang, Yaling
    [J]. PLOS ONE, 2018, 13 (10):
  • [46] Multi-keyword Searchable Encryption Based on Paillier and Private Set Intersection
    Zhou F.-C.
    Zhang Z.-Y.
    Wang K.-X.
    Li Y.-X.
    [J]. Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (03): : 321 - 326
  • [47] A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment
    Zhou, Yihua
    Tang, Bin
    Yang, Yuguang
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [48] Multi-keyword ranked searchable public-key encryption
    Hu, Chengyu
    Yang, Bo
    Liu, Pengtao
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (3-4) : 221 - 231
  • [49] Multi-keyword searchable encryption for smart grid edge computing
    Wang, Dan
    Wu, Po
    Li, Bin
    Du, Haorui
    Luo, Min
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 2022, 212
  • [50] Verifiable Multi-Keyword Searchable Encryption with Forward and Backward Security
    Song X.-F.
    Wang H.-Q.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (04): : 727 - 742