KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption

被引:36
作者
Chaudhari, Payal [1 ]
Das, Manik Lal [2 ]
机构
[1] Pandit Deendayal Petr Univ PDPU, Gandhinagar 382007, Gujarat, India
[2] DA IICT, Dhirubhai Ambani Inst Informat & Commun Technol, Gandhinagar 382007, Gujarat, India
关键词
Encryption; Cloud computing; Receivers; Data privacy; Servers; Searchable encryption; attribute-based encryption; data privacy; receiver anonymity;
D O I
10.1109/TSC.2020.2973570
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In modern digital age, enterprise applications typically outsource user data in pubic cloud storage with the objective of availing flexibility and scalability features of cloud infrastructure, and importantly, making business goal more cost effective. Security and privacy concerns pose a challenging task to handle in cloud setup by both service providers and service consumers. In this landscape, before outsourcing the sensitive data on cloud storage, the data should be protected from unauthorized access and the privacy of the users should be preserved as per application requirement. In this article, we present a scheme, termed as KeySea, keyword-based search over attribute-based encrypted data with receiver anonymity. While searching documents pertaining to the target keyword(s), keeping receiver's anonymity and ensuring data privacy are important features in applications like healthcare, bureaucracy, social engineering, and so on. The construction of the KeySea scheme uses the hidden access policy in attribute-based searchable encryption. The KeySea scheme provides a secure and practical solution to address the issue of privacy-preserving search over encrypted data in the public cloud storage. We show the security strengths of the KeySea scheme and its practicality with experimental results.
引用
收藏
页码:1036 / 1044
页数:9
相关论文
共 50 条
[41]   Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search [J].
Shi, Junbin ;
Yu, Qiming ;
Yu, Yong ;
Wang, Lianhai ;
Zhang, Wenzheng .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) :12152-12168
[42]   A Key-Policy Searchable Attribute-Based Encryption Scheme for Efficient Keyword Search and Fine-Grained Access Control over Encrypted Data [J].
Yin, Hui ;
Xiong, Yinqiao ;
Zhang, Jixin ;
Ou, Lu ;
Liao, Shaolin ;
Qin, Zheng .
ELECTRONICS, 2019, 8 (03)
[43]   Attribute-Based Keyword Search and Data Access Control in Cloud [J].
Li, Jiazhi ;
Zhang, Lei .
2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, :382-386
[44]   ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data [J].
Luo, Fucai ;
Wang, Haiyan ;
Lin, Changlu ;
Yan, Xingfu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :4970-4983
[45]   DABKS: Dynamic Attribute-based Keyword Search in Cloud Computing [J].
Hu, Baishuang ;
Liu, Qin ;
Liu, Xuhui ;
Peng, Tao ;
Wang, Guojun ;
Wu, Jie .
2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
[46]   Substring-searchable attribute-based encryption and its application for IoT devices [J].
Sun, Xi ;
Wang, Hao ;
Fu, Xiu ;
Qin, Hong ;
Jiang, Mei ;
Xue, Likun ;
Wei, Xiaochao .
DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (02) :277-283
[47]   Attribute-Based Searchable Encryption With Forward Security for Cloud-Assisted IoT [J].
Ghopur, Dilxat .
IEEE ACCESS, 2024, 12 :90840-90852
[48]   An efficient KP design framework of attribute-based searchable encryption for user level revocation in cloud [J].
Mamta ;
Gupta, B. B. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18)
[49]   Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data [J].
He, Kai ;
Guo, Jun ;
Weng, Jian ;
Weng, Jiasi ;
Liu, Joseph K. ;
Yi, Xun .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) :1207-1217
[50]   Certificateless searchable attribute-based encryption approach for cloud data based on blockchain [J].
Jeba, J. Monisha Privthy ;
Vivekrabinson, K. ;
Raja, B. Shanmuga ;
Sundareswaran, N. ;
Vijay, M. .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2024, 45 (04) :239-253