An enhanced searchable encryption scheme for secure data outsourcing

被引:0
|
作者
Rui Zhang
Jiabei Wang
Zishuai Song
Xi Wang
机构
[1] Chinese Academy of Sciences,State Key Laboratory of Information Security (SKLOIS), Institute of Information Engineering
[2] University of Chinese Academy of Sciences,School of Cyber Security
来源
Science China Information Sciences | 2020年 / 63卷
关键词
secure data outsourcing; (offline) outside and inside keyword guessing attack; secure channel free PEKS; conjunctive keyword search; server-aided scheme; standard model;
D O I
暂无
中图分类号
学科分类号
摘要
In the cloud environment, where the cloud server cannot always be fully trusted, both data and query privacy should be well protected for secure data outsourcing. Searchable encryption provides a more practical solution to secure data storage while enabling efficient search queries. In this paper, four important problems of public key encryption with keyword search (PEKS), namely, a scheme without secure channels, conjunctive keyword search, (offline) outside and inside keyword guessing attack (full KGA) resistance and proof in the standard model, are considered. We provide an in-depth analysis of the reasons behind (offline) full KGA by considering two types of PEKS schemes as examples. In particular, we introduce the concept of server-aided secure channel free public key encryption with conjunctive keyword search (SA-SCF-PECKS) which can resist (offline) full KGA. Furthermore, we provide a concrete and efficient construction of SA-SCF-PECKS, and prove its security in the standard model. To the best of our knowledge, our proposal is the first PECKS scheme to address these four problems simultaneously. We compare the security and efficiency of our scheme with those of other related PECKS schemes in theoretical and practical ways. In general, compared with other schemes, our SA-SCF-PECKS scheme shows better performance in terms of security and efficiency.
引用
收藏
相关论文
共 50 条
  • [41] A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data
    Li, Jiangnan
    Niu, Xiangyu
    Sun, Jinyuan Stella
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [42] Secure, Efficient and Dynamic Data Search using Searchable Symmetric Encryption
    Shaikh, Mohammed Saad
    Bavishi, Jatna
    Patel, Reema
    PROCEEDINGS OF 2020 5TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND ARTIFICIAL INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS (CLOUDTECH'20), 2020, : 246 - 252
  • [43] Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication
    Jiang, Changsong
    Xu, Chunxiang
    Yang, Guomin
    COMPUTER SECURITY-ESORICS 2024, PT IV, 2024, 14985 : 396 - 413
  • [44] An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
    Wu, Libing
    Chen, Biwen
    Zeadally, Sherali
    He, Debiao
    SOFT COMPUTING, 2018, 22 (23) : 7685 - 7696
  • [45] An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage
    Libing Wu
    Biwen Chen
    Sherali Zeadally
    Debiao He
    Soft Computing, 2018, 22 : 7685 - 7696
  • [46] EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search
    Tian, Pengxu
    Guo, Cheng
    Choo, Kim-Kwang Raymond
    Liu, Yining
    Li, Long
    Yao, Lin
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 3450 - 3460
  • [47] Secure Content Based Image Retrieval Scheme Based on Deep Hashing and Searchable Encryption
    Wang, Zhen
    Zhang, Qiu-yu
    Meng, Ling-tao
    Liu, Yi-lin
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (03): : 6161 - 6184
  • [48] SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE
    Li, Bao
    Zhou, Fucai
    Wang, Qiang
    Xu, Jian
    Feng, Da
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 154
  • [49] Cryptanalysis of an Asymmetric Searchable Encryption Scheme
    Zare, Fahimeh
    Mala, Hamid
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 82 - 85
  • [50] An Improved Asymmetric Searchable Encryption Scheme
    Wu, Qi
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 39 - 44