Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services

被引:9
作者
Huang, Qinlong [1 ]
Wei, Qinglin [1 ]
Yan, Guanyu [1 ]
Zou, Lin [1 ]
Yang, Yixian [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
关键词
Keyword search; Cryptography; Indexes; Encryption; Cloud computing; Security; Computational modeling; Attribute-based encryption; bloom filter; cloud document services; keyword search; sublinear; ENCRYPTION;
D O I
10.1109/TSC.2023.3265270
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, various encryption techniques have been employed to protect the documents in cloud storage. In particular, attribute-based keyword search (ABKS) is a practical encryption primitive that can realize fine-grained access control and keyword based searching over encrypted documents. However, the search time in most of the existing ABKS schemes increases linearly with the size of document collection, which hinders the wide application of ABKS in cloud computing. To this end, we propose FAKS, a fast and privacy-preserving attribute-based keyword search system for cloud document services. Specifically, FAKS builds a Bloom filter tree structure from the document collection, which avoids matching keywords by traversing the entire collection. Then we introduce an attribute-based authenticated index retrieval (ABAIR) scheme to encrypt the Bloom filters in the tree node and retrieve the documents with the encrypted Bloom filters of the query keywords. Further, we give a concrete construction of FAKS from ABAIR to execute the keyword matching operations sublinearly in a top-down manner, and prove the security of FAKS against chosen keyword attack and keyword guessing attack. Finally, we conduct extensive experiments over the Wikipedia dataset, which show better and more stable search efficiency of FAKS compared to existing schemes.
引用
收藏
页码:3348 / 3360
页数:13
相关论文
共 30 条
[1]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[2]   Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing [J].
Chen, Yang ;
Li, Wenmin ;
Gao, Fei ;
Wen, Qiaoyan ;
Zhang, Hua ;
Wang, Huawei .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) :724-735
[3]   Attribute-Based Encryption with Expressive and Authorized Keyword Search [J].
Cui, Hui ;
Deng, Robert H. ;
Liu, Joseph K. ;
Li, Yingjiu .
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 :106-126
[4]  
De Caro A, 2011, IEEE SYMP COMP COMMU
[5]   Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange [J].
Derler, David ;
Jager, Tibor ;
Slamanig, Daniel ;
Striecks, Christoph .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 :425-455
[6]   Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries [J].
Grubbs, Paul ;
Lacharite, Marie-Sarah ;
Minaud, Brice ;
Paterson, Kenneth G. .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :315-331
[7]   Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data [J].
He, Kai ;
Guo, Jun ;
Weng, Jian ;
Weng, Jiasi ;
Liu, Joseph K. ;
Yi, Xun .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) :1207-1217
[8]   Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services [J].
Huang, Qinlong ;
Du, Jiabao ;
Yan, Guanyu ;
Yang, Yixian ;
Wei, Qinglin .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) :3443-3456
[9]   Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing [J].
Huang, Qinlong ;
Yan, Guanyu ;
Wei, Qinglin .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (02) :957-968
[10]   Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage [J].
Liang, Kaitai ;
Susilo, Willy .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) :1981-1992