REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data

被引:2
作者
Miao, Yinbin [1 ]
Li, Feng [1 ]
Jia, Xiaohua [2 ]
Wang, Huaxiong [3 ]
Liu, Ximeng [4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. [6 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong 999077, Peoples R China
[3] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore 639798, Singapore
[4] Fuzhou Univ, Coll Math & Comp Sci, Key Lab Informat Secur Network Syst, Fuzhou 350108, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Access control; attribute-based encryption; identity-based encryption; keyword-based search; role-based access control; IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; BROADCAST ENCRYPTION; INDUSTRIAL INTERNET; SCHEME;
D O I
10.1109/TDSC.2023.3324640
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly reducing the users' final token generation and index update overheads, respectively. Formal security analysis proves that REKS is secure against chosen keyword and internal keyword guessing attacks, and findings from the empirical evaluations demonstrate that REKS is efficient and practical.
引用
收藏
页码:3247 / 3261
页数:15
相关论文
共 54 条
  • [1] Alderman James, 2017, Financial Cryptography and Data Security. FC 2017 International Workshops WAHC, BITCOIN, VOTING, WTSC, and TA. Revised Selected Papers: LNCS 10323, P35, DOI 10.1007/978-3-319-70278-0_3
  • [2] Broadcast Searchable Keyword Encryption
    Ali, Mohamed Ali Hamza
    Zhong, Ting
    Li, Fagen
    Qin, Zhiguan
    Abdelrahaman, Ahmed A. A.
    [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1010 - 1016
  • [3] Ameri M. H., 2015, IACR Cryptol, ePrint Arch., V2015
  • [4] A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
    Ameri, Mohammad Hassan
    Delavar, Mahshid
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (03) : 660 - 671
  • [5] Attrapadung N, 2006, LECT NOTES COMPUT SC, V4284, P161
  • [6] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [7] Hierarchical identity based encryption with constant size ciphertext
    Boneh, D
    Boyen, X
    Goh, EJ
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
  • [8] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [9] Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control
    Chen, Zehong
    Zhang, Fangguo
    Zhang, Peng
    Liu, Joseph K.
    Huang, Jiwu
    Zhao, Hanbang
    Shen, Jian
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 712 - 724
  • [10] Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
    Cui, Hui
    Wan, Zhiguo
    Deng, Robert H.
    Wang, Guilin
    Li, Yingjiu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) : 409 - 422