Attribute-Based Searchable Encryption With Forward Security for Cloud-Assisted IoT

被引:1
作者
Ghopur, Dilxat [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Attribute-based encryption; puncturable encryption; searchable encryption; self-controlled data deletion; forward security;
D O I
10.1109/ACCESS.2024.3418886
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-Policy Attribute-Based Searchable Encryption (CP-ABSE) is one of the most suitable encryption mechanisms in cloud environments for its fine-grained access structure and keyword retrieval capability over the ciphertext. However, in the CP-ABSE schemes, guaranteeing the forward security of the outsourced cloud data and securely deleting those no longer needed data without relying on the cloud are challenging problems. To handle such challenges, we propose a Puncturable CP-ABSE (Pun-CP-ABSE) scheme that achieves self-controlled data deletion with a fine-grained access structure under the searchable mechanism. The data owner punctures the trapdoor to accomplish the data deletion. Then, the deletion process does not need to communicate with a trusted third party and can guarantee forward security. After the puncturation, the cloud server can no longer search for the corresponding ciphertext. Furthermore, we prove the Pun-CP-ABSE scheme is secure against the Chosen-Plaintext Attack (CPA) and Chosen-Keyword Attack (CKA). We have also implemented the Pun-CP-ABSE scheme to show its efficiency and feasibility.
引用
收藏
页码:90840 / 90852
页数:13
相关论文
共 35 条
[1]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[2]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[3]   RMA-CPABE : A multi-authority CPABE scheme with reduced ciphertext size for IoT devices [J].
Chaudhary, Chandan Kumar ;
Sarma, Richa ;
Barbhuiya, Ferdous Ahmed .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 138 :226-242
[4]   Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing [J].
Chen, Yang ;
Li, Wenmin ;
Gao, Fei ;
Wen, Qiaoyan ;
Zhang, Hua ;
Wang, Huawei .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) :724-735
[5]   Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure [J].
Das, Sangjukta ;
Namasudra, Suyel .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) :821-829
[6]  
Feng J. Ma, Transparentciphertext retrieval system supporting integration of encrypted heteroge-neous database in cloud-assisted IoT
[7]  
Fu X., IEEE Trans. Inf. Forensics Security, V11, P2706
[8]  
Geambasu T., 2009, P USENIX SEC S MONTR, V316, P5555
[9]   Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation [J].
Ghopur, Dilxat ;
Ma, Jianfeng ;
Ma, Xindi ;
Miao, Yinbin ;
Hao, Jialu ;
Jiang, Tao .
SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (07)
[10]  
Goyal V., 2006, Proceedings of the 13th ACM Conference on Computer and Communications Security, P89, DOI DOI 10.1145/1180405.1180418