Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing

被引:90
|
作者
Miao, Yinbin [1 ]
Ma, Jianfeng [1 ]
Liu, Ximeng [2 ]
Li, Xinghua [1 ]
Jiang, Qi [1 ]
Zhang, Junwei [1 ]
机构
[1] Xidian Univ, Dept Cyber Engn, Xian 710071, Peoples R China
[2] Singapore Management Univ, Dept Informat Syst, 80 Stamford Rd, Singapore 188065, Singapore
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud computing; Keyword search; Logic gates; Encryption; Servers; Searchable encryption; hierarchical structures; ciphertext-policy attribute-based encryption; chosen-plaintext attack; chosen-keyword attack; RANKED SEARCH; ENCRYPTION; SECURITY;
D O I
10.1109/TSC.2017.2757467
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption (SE) has been a promising technology which allows users to perform search queries over encrypted data. However, the most of existing SE schemes cannot deal with the shared records that have hierarchical structures. In this paper, we devise a basic cryptographic primitive called as attribute-based keyword search over hierarchical data (ABKS-HD) scheme by using the ciphertext-policy attribute-based encryption (CP-ABE) technique, but this basic scheme cannot satisfy all the desirable requirements of cloud systems. The facts that the single keyword search will yield many irrelevant search results and the revoked users can access the unauthorized data with the old or outdated secret keys make this basic scheme not scale well in practice. To this end, we also propose two improved schemes (ABKS-HD-I, ABKS-HD-II) for the sake of supporting multi-keyword search and user revocation, respectively. In contrast with the state-of-the-art attribute-based keyword search (ABKS) schemes, the computation overhead of our schemes almost linearly increases with the number of users' attributes rather than the number of attributes in systems. Formal security analysis proves that our schemes are secure against both chosen-plaintext attack (CPA) and chosen-keyword attack (CKA) in the random oracle model. Furthermore, empirical study using a real-world dataset shows that our schemes are feasible and efficient in practical applications.
引用
收藏
页码:985 / 998
页数:14
相关论文
共 50 条
  • [1] Attribute-Based Data Retrieval with Keyword Search over Encrypted Data in Cloud
    Ali, Azza A.
    Saleh, Shereen
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2019, 2020, 1058 : 876 - 890
  • [2] DABKS: Dynamic Attribute-based Keyword Search in Cloud Computing
    Hu, Baishuang
    Liu, Qin
    Liu, Xuhui
    Peng, Tao
    Wang, Guojun
    Wu, Jie
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [3] Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing
    Huang, Qinlong
    Yan, Guanyu
    Wei, Qinglin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (02) : 957 - 968
  • [4] AKSER: Attribute-based keyword search with efficient revocation in cloud computing
    Cui, Jie
    Zhou, Han
    Zhong, Hong
    Xu, Yan
    INFORMATION SCIENCES, 2018, 423 : 343 - 352
  • [5] Attribute-Based Keyword Search and Data Access Control in Cloud
    Li, Jiazhi
    Zhang, Lei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 382 - 386
  • [6] Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data
    Miao, Yinbin
    Deng, Robert H.
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Wu, Hongjun
    Li, Hongwei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1667 - 1680
  • [7] Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication
    Liu, Xueyan
    Lu, Tingting
    He, Xiaomei
    Yang, Xiaotao
    Niu, Shufen
    IEEE ACCESS, 2020, 8 (08): : 52062 - 52074
  • [8] Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing
    Wu, Axin
    Zheng, Dong
    Zhang, Yinghui
    Yang, Menglei
    SENSORS, 2018, 18 (07)
  • [9] Document Attribute-based Keyword Search over Encrypted Data
    Fu, Zhangjie
    Xi, Jie
    Wang, Jin
    Sun, Xingming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 787 - 790
  • [10] Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing
    Chen, Yang
    Li, Wenmin
    Gao, Fei
    Wen, Qiaoyan
    Zhang, Hua
    Wang, Huawei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) : 724 - 735