Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing

被引:90
|
作者
Miao, Yinbin [1 ]
Ma, Jianfeng [1 ]
Liu, Ximeng [2 ]
Li, Xinghua [1 ]
Jiang, Qi [1 ]
Zhang, Junwei [1 ]
机构
[1] Xidian Univ, Dept Cyber Engn, Xian 710071, Peoples R China
[2] Singapore Management Univ, Dept Informat Syst, 80 Stamford Rd, Singapore 188065, Singapore
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud computing; Keyword search; Logic gates; Encryption; Servers; Searchable encryption; hierarchical structures; ciphertext-policy attribute-based encryption; chosen-plaintext attack; chosen-keyword attack; RANKED SEARCH; ENCRYPTION; SECURITY;
D O I
10.1109/TSC.2017.2757467
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption (SE) has been a promising technology which allows users to perform search queries over encrypted data. However, the most of existing SE schemes cannot deal with the shared records that have hierarchical structures. In this paper, we devise a basic cryptographic primitive called as attribute-based keyword search over hierarchical data (ABKS-HD) scheme by using the ciphertext-policy attribute-based encryption (CP-ABE) technique, but this basic scheme cannot satisfy all the desirable requirements of cloud systems. The facts that the single keyword search will yield many irrelevant search results and the revoked users can access the unauthorized data with the old or outdated secret keys make this basic scheme not scale well in practice. To this end, we also propose two improved schemes (ABKS-HD-I, ABKS-HD-II) for the sake of supporting multi-keyword search and user revocation, respectively. In contrast with the state-of-the-art attribute-based keyword search (ABKS) schemes, the computation overhead of our schemes almost linearly increases with the number of users' attributes rather than the number of attributes in systems. Formal security analysis proves that our schemes are secure against both chosen-plaintext attack (CPA) and chosen-keyword attack (CKA) in the random oracle model. Furthermore, empirical study using a real-world dataset shows that our schemes are feasible and efficient in practical applications.
引用
收藏
页码:985 / 998
页数:14
相关论文
共 50 条
  • [41] Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Li, Jin
    Wang, Qian
    Wang, Cong
    Cao, Ning
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [42] Preferred Keyword Search over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2013 IEEE/ACM 21ST INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2013, : 207 - 212
  • [43] A shareable keyword search over encrypted data in cloud computing
    Li Xu
    Chi-Yao Weng
    Lun-Pin Yuan
    Mu-En Wu
    Raylin Tso
    Hung-Min Sun
    The Journal of Supercomputing, 2018, 74 : 1001 - 1023
  • [44] Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption
    Zhu, Shuaishuai
    Han, Yiliang
    Wei, Yuechuan
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 257 - 261
  • [45] Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
    Wang, Shulan
    Liang, Kaitai
    Liu, Joseph K.
    Chen, Jianyong
    Yu, Jianping
    Xie, Weixin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) : 1661 - 1673
  • [46] Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage
    Wang, Shangping
    Yao, Lisha
    Zhang, Yaling
    PLOS ONE, 2018, 13 (10):
  • [47] Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2014, 57 (04): : 579 - 591
  • [48] Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing
    Varri, Uma Sankararao
    Pasupuleti, Syam Kumar
    Kadambari, K., V
    2020 20TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2020), 2020, : 450 - 458
  • [49] Attribute-based data transfer with filtering scheme in cloud computing
    Han, J. (jh843@uowmail.edu.au), 1600, Oxford University Press (57):
  • [50] Traceable and revocable multi-authority attribute-based keyword search for cloud storage
    Varri, Uma Sankararao
    Pasupuleti, Syam Kumar
    Kadambari, K., V
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 132