Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing

被引:90
|
作者
Miao, Yinbin [1 ]
Ma, Jianfeng [1 ]
Liu, Ximeng [2 ]
Li, Xinghua [1 ]
Jiang, Qi [1 ]
Zhang, Junwei [1 ]
机构
[1] Xidian Univ, Dept Cyber Engn, Xian 710071, Peoples R China
[2] Singapore Management Univ, Dept Informat Syst, 80 Stamford Rd, Singapore 188065, Singapore
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud computing; Keyword search; Logic gates; Encryption; Servers; Searchable encryption; hierarchical structures; ciphertext-policy attribute-based encryption; chosen-plaintext attack; chosen-keyword attack; RANKED SEARCH; ENCRYPTION; SECURITY;
D O I
10.1109/TSC.2017.2757467
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption (SE) has been a promising technology which allows users to perform search queries over encrypted data. However, the most of existing SE schemes cannot deal with the shared records that have hierarchical structures. In this paper, we devise a basic cryptographic primitive called as attribute-based keyword search over hierarchical data (ABKS-HD) scheme by using the ciphertext-policy attribute-based encryption (CP-ABE) technique, but this basic scheme cannot satisfy all the desirable requirements of cloud systems. The facts that the single keyword search will yield many irrelevant search results and the revoked users can access the unauthorized data with the old or outdated secret keys make this basic scheme not scale well in practice. To this end, we also propose two improved schemes (ABKS-HD-I, ABKS-HD-II) for the sake of supporting multi-keyword search and user revocation, respectively. In contrast with the state-of-the-art attribute-based keyword search (ABKS) schemes, the computation overhead of our schemes almost linearly increases with the number of users' attributes rather than the number of attributes in systems. Formal security analysis proves that our schemes are secure against both chosen-plaintext attack (CPA) and chosen-keyword attack (CKA) in the random oracle model. Furthermore, empirical study using a real-world dataset shows that our schemes are feasible and efficient in practical applications.
引用
收藏
页码:985 / 998
页数:14
相关论文
共 50 条
  • [21] Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
    Huang, Qinlong
    Yang, Yixian
    Shen, Mansuo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 239 - 249
  • [22] Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data
    Zhang, Yinghui
    Zhu, Tian
    Guo, Rui
    Xu, Shengmin
    Cui, Hui
    Cao, Jin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 971 - 983
  • [23] Multiauthority Attribute-Based Keyword Search over Cloud-Edge-End Collaboration in IoV
    Zhen, Yan
    Chui, Yilan
    Zhang, Puning
    Liu, Huan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [24] ABDKS: attribute-based encryption with dynamic keyword search in fog computing
    Fei MENG
    Leixiao CHENG
    Mingqiang WANG
    Frontiers of Computer Science, 2021, (05) : 189 - 197
  • [25] ABDKS: attribute-based encryption with dynamic keyword search in fog computing
    Meng, Fei
    Cheng, Leixiao
    Wang, Mingqiang
    FRONTIERS OF COMPUTER SCIENCE, 2021, 15 (05)
  • [26] Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
    Chen, Yanli
    Hu, Yuanyuan
    Zhu, Minhui
    Yang, Geng
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (08) : 1798 - 1808
  • [27] ABDKS: attribute-based encryption with dynamic keyword search in fog computing
    Fei Meng
    Leixiao Cheng
    Mingqiang Wang
    Frontiers of Computer Science, 2021, 15
  • [28] ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data
    Luo, Fucai
    Wang, Haiyan
    Lin, Changlu
    Yan, Xingfu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4970 - 4983
  • [29] Verifiable Attribute-Based Multi-Keyword Search over Encrypted Cloud Data in Multi-Owner Setting
    Fan, Yaqing
    Liu, Zhenhua
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 441 - 449
  • [30] Attribute-based keyword search encryption for power data protection
    Zhang, Xun
    Mu, Dejun
    Zhao, Jinxiong
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (02):