PAESS: Public-Key Authentication Encryption With Similar Data Search for Pay-Per-Query

被引:0
作者
Chen, Liqing [1 ,2 ]
Li, Jiayi [1 ,3 ]
Li, Jiguo [2 ,3 ,4 ]
Weng, Jian [5 ]
机构
[1] Huaiyin Inst Technol, Fac Comp & Software Engn, Huaian 223003, Jiangsu, Peoples R China
[2] Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Fujian, Peoples R China
[3] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Fujian, Peoples R China
[4] Minist Educ, Key Lab Analyt Math & Applicat, Fuzhou 350117, Fujian, Peoples R China
[5] Jinan Univ, Coll Informat Sci & Technol, Guangzhou 510632, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Encryption; Servers; Public key; Data models; Authentication; Keyword search; Adaptation models; Computational modeling; Security; Public-key authentication encryption with keyword search; similar data search; pay-per-query model; adaptively-chosen-targets attack; KEYWORD RANKED SEARCH; BROADCAST ENCRYPTION; ADAPTIVELY SECURE; SYMMETRIC-ENCRYPTION; SCHEME;
D O I
10.1109/TIFS.2024.3484155
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, many cloud service providers adopt the pay-per-query model to offer paid search services to the public. The data owner rents the resources of cloud service providers and charges the data user a fee based on the data volume to be queried. While this commercial model offers flexibility, convenience, and cost-effectiveness, it comes with a significant vulnerability to data breaches. Public-key authentication encryption with keyword search (PAEKS) is a technology which is well applied in the pay-per-query model. But there is no PAEKS scheme applicable to this scenario. For this purpose, we present public-key authentication encryption with similar data search for pay-per-query (PAESS) and construct the first idiographic scheme PAESS-I. PAESS-I utilizes Shamir secret sharing and locality sensitive hashing to implement similar data search, has the verifiability of results, adds the charge function to prevent cloud servers and data users from colluding to deny deductions. We propose the second scheme PAESS-II based on PAESS-I, which is a mobile-friendly lightweight PAESS. Our second scheme operates in the pay-per-query model without pairing and exponential operations. PAESS-I satisfies ciphertext indistinguishability and trapdoor indistinguishability, and sacrifices the computational performance in favor of the pay-per-query model. The optimized PAESS-II is resistant to adaptively-chosen-targets attack, and satisfies ciphertext indistinguishability and trapdoor indistinguishability. PAESS-II distinguishes itself from other existing similar schemes by having the same characteristics as PAESS-I, along with the benefits when it comes to the calculation cost.
引用
收藏
页码:9910 / 9923
页数:14
相关论文
共 46 条
  • [11] Adaptively secure certificate-based broadcast encryption and its application to cloud storage service
    Chen, Liqing
    Li, Jiguo
    Lu, Yang
    Zhang, Yichen
    [J]. INFORMATION SCIENCES, 2020, 538 : 273 - 289
  • [12] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    [J]. SOFT COMPUTING, 2020, 24 (06) : 4589 - 4606
  • [13] Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (03): : 1523 - 1545
  • [14] Public key authenticated searchable encryption against frequency analysis attacks
    Cheng, Leixiao
    Meng, Fei
    [J]. INFORMATION SCIENCES, 2023, 640
  • [15] Public key encryption with keyword search secure against keyword guessing attacks without random oracle
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    [J]. INFORMATION SCIENCES, 2013, 238 : 221 - 241
  • [16] Boolean Searchable Symmetric Encryption With Filters on Trusted Hardware
    Ferreira, Bernardo
    Portela, Bernardo
    Oliveira, Tiago
    Borges, Guilherme
    Domingos, Henrique
    Leitao, Joao
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1307 - 1319
  • [17] Gionis A, 1999, PROCEEDINGS OF THE TWENTY-FIFTH INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, P518
  • [18] Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query
    Hahn, Changhee
    Yoon, Hyundo
    Hur, Junbeom
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1169 - 1181
  • [19] Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things
    He, Debiao
    Ma, Mimi
    Zeadally, Sherali
    Kumar, Neeraj
    Liang, Kaitai
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3618 - 3627
  • [20] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    [J]. INFORMATION SCIENCES, 2017, 403 : 1 - 14