Multi-keyword ranked searchable encryption scheme with access control for cloud storage

被引:1
|
作者
Maryam Zarezadeh
Hamid Mala
Maede Ashouri-Talouki
机构
[1] University of Isfahan,Department of Information Technology Engineering
关键词
Searchable encryption; Cloud computing; Data outsourcing; Multi-keyword search; Access control;
D O I
暂无
中图分类号
学科分类号
摘要
With the advent of cloud computing, data owners are motivated to outsource their data to public clouds for decreasing the cost of management systems. For protecting data privacy, sensitive data must be encrypted before outsourcing. So, equipping cloud server with search service over encrypted data is an important issue. Considering the large number of data users and documents in the cloud, users may be interested to perform multi-keyword search and receive the most related data. In this paper, we investigate the Pasupuleti et al.’s scheme which is a multi-keyword ranked search over encrypted cloud data. Their scheme has problems in index construction, trapdoor generation and search procedures. We address these problems and suggest a multi-keyword ranked search over encrypted data on cloud storage. The proposed ranked searchable encryption scheme enhances system usability by ranking results instead of just sending undifferentiated results and ensures file retrieval accuracy. We also use the relevance score from information retrieval to build a secure searchable index, and apply an additive order-preserving encryption to protect the sensitive scores of files. Our scheme also guarantees access control of users during the data retrieval by attribute-based encryption. Analysis shows that our scheme is secure and efficient for cloud storage.
引用
收藏
页码:207 / 218
页数:11
相关论文
共 50 条
  • [21] Multi-keyword search encryption scheme supporting flexible access control
    Yan, Xixi
    Zhao, Qiang
    Tang, Yongli
    Li, Yingying
    Li, Jingran
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (01): : 55 - 66
  • [22] Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes
    Lin, Je-Kuan
    Lin, Wun-Ting
    Wu, Ja-Ling
    [J]. CRYPTOGRAPHY, 2023, 7 (02)
  • [23] Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data
    Li, Jiayi
    Ma, Jianfeng
    Miao, Yinbin
    Yang, Ruikang
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 2005 - 2019
  • [24] Update enabled multi-keyword searchable encryption scheme for secure data outsourcing
    Arora, Vasudha
    Tyagi, S.S.
    [J]. International Journal of Information and Computer Security, 2017, 9 (04) : 288 - 301
  • [25] Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data
    Zhang, Yinghui
    Zhu, Tian
    Guo, Rui
    Xu, Shengmin
    Cui, Hui
    Cao, Jin
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 971 - 983
  • [26] Multi-Keyword Certificateless Searchable Public Key Authenticated Encryption Scheme Based on Blockchain
    Yang, Xiaodong
    Chen, Guilan
    Wang, Meiding
    Li, Ting
    Wang, Caifen
    [J]. IEEE ACCESS, 2020, 8 : 158765 - 158777
  • [27] A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing
    Li, Yuancheng
    Hou, Haiyan
    Chen, Wenping
    [J]. INFORMATION SECURITY JOURNAL, 2020, 29 (06): : 284 - 296
  • [28] Identity-based authenticated multi-keyword searchable encryption scheme for cloud-assisted telemedicine information system
    School of Mathematical Sciences, Guizhou Normal University, Guiyang
    550025, China
    不详
    550025, China
    不详
    550025, China
    [J]. Comput Electr Eng, 2024,
  • [29] Multi-Keyword Searchable Encryption Algorithm Based on Semantic Extension
    Xu, Guangwei
    Shi, Chunhong
    Wang, Wentao
    Pan, Qiao
    Li, Feng
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2193 - 2206
  • [30] MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms
    Mouri, Israt Jahan
    Ridowan, Muhammad
    Adnan, Muhammad Abdullah
    [J]. CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 376 - 378