MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX

被引:11
|
作者
Michalas, Antonis [1 ]
Bakas, Alexandros [1 ]
Dang, Hai-Van [2 ]
Zalitko, Alexandr [1 ]
机构
[1] Tampere Univ Technol, Tampere, Finland
[2] Univ Westminster, London, England
来源
关键词
Access control; Attribute-Based Encryption; Cloud security; Hybrid encryption; Policies; Storage protection; Symmetric Searchable Encryption;
D O I
10.1007/978-3-030-35055-0_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure cloud storage is considered as one of the most important problems that both businesses and end-users take into account before moving their private data to the cloud. Lately, we have seen some interesting approaches that are based either on the promising concept of Symmetric Searchable Encryption (SSE) or on the well-studied field of Attribute-Based Encryption (ABE). Our construction, MicroSCOPE, combines both ABE and SSE to utilize the advantages of each technique. Finally, we enhance our construction with an access control mechanism by utilizing the functionality provided by SGX.
引用
收藏
页码:254 / 270
页数:17
相关论文
共 50 条
  • [21] Attribute-Based and Keywords Vector Searchable Public Key Encryption
    Wang, Huiwen
    Li, Jianqiang
    Yang, Yanli
    Ming, Zhong
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 317 - 326
  • [22] An Attribute-based Searchable Encryption Scheme Supporting Trapdoor Updating
    Xu, Jingjing
    Ying, Chun
    Tan, Shuhua
    Sun, Zhe
    Wang, Pan
    Sun, Zhixin
    [J]. 2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 7 - 14
  • [23] Comment on an Attribute-Based Searchable Encryption Scheme With Receiver Anonymity
    Zu, Guangao
    Lu, Yang
    Li, Jiguo
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (04) : 1875 - 1876
  • [24] On Attribute-Based Encryption for Access Control to Multidimensional Data Structures
    Epishkina, Anna
    Zapechnikov, Sergey
    [J]. BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES (BICA) FOR YOUNG SCIENTISTS, 2018, 636 : 251 - 256
  • [25] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    [J]. ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [26] Attribute-based encryption with Hidden access structures
    Wang, Hai-Bin
    Chen, Shao-Zhen
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (02): : 457 - 461
  • [27] A keyword searchable attribute-based encryption scheme with attribute update for cloud storage
    Wang, Shangping
    Ye, Jian
    Zhang, Yaling
    [J]. PLOS ONE, 2018, 13 (05):
  • [28] New access control systems based on outsourced attribute-based encryption
    Li, Jin
    Chen, Xiaofeng
    Li, Jingwei
    Jia, Chunfu
    Ma, Jianfeng
    Lou, Wenjing
    [J]. JOURNAL OF COMPUTER SECURITY, 2015, 23 (06) : 659 - 683
  • [29] On Enabling Attribute-Based Encryption to Be Traceable Against Traitors
    Liu, Zhen
    Huang, Qiong
    Wong, Duncan S.
    [J]. COMPUTER JOURNAL, 2021, 64 (04): : 575 - 598
  • [30] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    [J]. Cryptology and Information Security Series, 2009, 2 : 156 - 168