Multi-server Key Aggregation Searchable Encryption Scheme in Cloud Environment

被引:2
作者
Zhang Yulei [1 ]
Liu Xiangzhen [1 ]
Lang Xiaoli [1 ]
Zhang Yongjie [2 ]
Chen Wenjuan [1 ]
Wang Caifen [1 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Gansu, Peoples R China
[2] Gansu Hlth Vocat Coll, Lanzhou 730070, Gansu, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; Key aggregation; Multiple servers; Keyword guessing;
D O I
10.11999/JEIT180418
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Key aggregation searchable encryption can not only retrieve ciphertext through keywords, but also can reduce user key management costs and security risks. This paper analyzes a verifiable key aggregation searchable encryption scheme, noting that the scheme does not satisfy keyword guessing attacks, and that unauthorized internal users can guess the private keys of other users. In order to improve the security of the original scheme, a multi-server key aggregation searchable encryption scheme is proposed in the cloud environment. The new scheme not only improves the security of the original solution, but also adds multiservice features, and improves the storage and search efficiency. Therefore, it is more suitable for a one-to-many user environment.
引用
收藏
页码:674 / 679
页数:6
相关论文
共 15 条
[1]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[2]   Multi-User Searchable Encryption Scheme With Constant-Size Keys [J].
Chang, YuJui ;
Wu, JaLing .
2017 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2 2017), 2017, :98-103
[3]   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage [J].
Chu, Cheng-Kang ;
Chow, Sherman S. M. ;
Tzeng, Wen-Guey ;
Zhou, Jianying ;
Deng, Robert H. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) :468-477
[4]   Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage [J].
Cui, Baojiang ;
Liu, Zheli ;
Wang, Lingyu .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2374-2385
[5]  
Huang HP, 2017, J ELECTRON INF TECHN, V39, P389, DOI 10.11999/JEIT160338
[6]   Verifiable searchable encryption with aggregate keys for data sharing system [J].
Liu, Zheli ;
Li, Tong ;
Li, Ping ;
Ji, Chunfu ;
Li, Jin .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :778-788
[7]   Attribute-based Proxy Re-encryption Scheme with Keyword Search [J].
Liu Zhenhua ;
Zhou Peilin ;
Duan Shuhong .
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) :683-689
[8]  
[陆海宁 Lu Haining], 2017, [信息网络安全, Netinfo Security], P38
[9]   Certificateless searchable public key encryption scheme for mobile healthcare system [J].
Ma, Mimi ;
He, Debiao ;
Khan, Muhammad Khurram ;
Chen, Jianhua .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 65 :413-424
[10]   Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things [J].
Ma, Mimi ;
He, Debiao ;
Kumar, Neeraj ;
Choo, Kim-Kwang Raymond ;
Chen, Jianhua .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (02) :759-767