Attribute-based multiparty searchable encryption model for privacy protection of text data

被引:5
|
作者
Yin, Shoulin [1 ]
Li, Hang [1 ]
Teng, Lin [1 ]
Laghari, Asif Ali [1 ]
Estrela, Vania Vieira [2 ]
机构
[1] Shenyang Normal Univ, Software Coll, Shenyang 110034, Peoples R China
[2] Fed Fluminense Univ UFF, Niteroi, RJ, Brazil
关键词
Cloud storage; Hidden access structure; Attribute-enabled searchable Re-Encryption model; Proxy Re-Encryption; Medical data; IoMT;
D O I
10.1007/s11042-023-16818-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The problems of data storage and sharing have been well solved with cloud storage. However, the disadvantage is that users' messages are stored in the cloud without encryption protection. Cloud storage managers can access or even obtain user data, which brings significant security risks to data owners. Therefore, some cloud storage centers adopt ciphertext storage, which can protect them from the risk of user privacy disclosure. However, there are also problems, that is, how to find the desired data achieved in the cloud server search and how to ensure information integrity in the search process. Moreover, the encryption operation destroys the value and size relation of the original plaintext data. It does not have semantic and statistical characteristics when retrieving. Combining the hidden access structure in an attribute-based file searchable encryption model with proxy Re-Encryption technology, we propose an attribute-based file retrieval model with a partially hidden access structure supporting Proxy Re-Encryption. The model solves the above problems effectively and supports keyword updating. Finally, the security of the model is proved based on the hypothesis of D-linear and decisional q-parallel bilinear Diffie-Hellman exponent under the random oracle model.
引用
收藏
页码:45881 / 45902
页数:22
相关论文
共 50 条
  • [1] Attribute-based multiparty searchable encryption model for privacy protection of text data
    Shoulin Yin
    Hang Li
    Lin Teng
    Asif Ali Laghari
    Vania Vieira Estrela
    Multimedia Tools and Applications, 2024, 83 : 45881 - 45902
  • [2] Attribute-Based Encryption Method for Data Privacy Security Protection
    Li, Ziqian
    He, Yeshen
    Zhang, Yiying
    Li, Siwei
    Wang, Cong
    Zhang, Xiankun
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 458 - 467
  • [3] Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
    Feng T.
    Chen L.
    Fang J.
    Shi J.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (05): : 224 - 233
  • [4] Attribute-Based Symmetric Searchable Encryption
    Dang, Hai-Van
    Ullah, Amjad
    Bakas, Alexandros
    Michalas, Antonis
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 318 - 336
  • [5] Attribute-Based Searchable Encryption: A Survey
    Yan, Li
    Wang, Gaozhou
    Yin, Tian
    Liu, Peishun
    Feng, Hongxin
    Zhang, Wenbin
    Hu, Hailin
    Pan, Fading
    ELECTRONICS, 2024, 13 (09)
  • [6] Enhancing Data Privacy Protection in Ciphertext-Policy Attribute-Based Encryption
    Patil, Sachin Popat
    Basthikodi, Mustafa
    Kumaraswamy, S.
    Gurpur, Ananth Prabhu
    Raga, Akashraj
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 1113 - 1124
  • [7] Distributed and Privacy-Preserving Data Dissemination at the Network Edge via Attribute-Based Searchable Encryption
    Huso, Ingrid
    Piro, Giuseppe
    Boggia, Gennaro
    2022 20TH MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE (MEDCOMNET), 2022,
  • [8] The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing
    Michalas, Antonis
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 146 - 155
  • [9] Certificateless searchable attribute-based encryption approach for cloud data based on blockchain
    Jeba, J. Monisha Privthy
    Vivekrabinson, K.
    Raja, B. Shanmuga
    Sundareswaran, N.
    Vijay, M.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2024, 45 (04) : 239 - 253
  • [10] Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption
    Feng, Tao
    Pei, Hongmei
    Ma, Rong
    Tian, Youliang
    Feng, Xiaoqin
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (01): : 871 - 884