Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata

被引:4
|
作者
Wang, Jiabei [1 ,2 ]
Zhang, Rui [1 ,2 ]
Li, Jianhao [1 ,2 ]
Xiao, Yuting [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Metadata; Servers; Security; Encryption; Keyword search; Authorization; Public key; Searchable encryption; metadata; secure search authorization; full keyword guessing attack; flexibility; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; BLIND SIGNATURE; QUERIES; SCHEME;
D O I
10.1109/TIFS.2022.3163886
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Metadata plays an essential role in facilitating data organizing, finding, and understanding, but it also contains lots of sensitive information about the data and the data users, e.g., the location where a picture was taken. In practice, when sensitive data is encrypted before being uploaded to untrusted public clouds, an oblivious dilemma comes: if the metadata is totally encrypted, and its functionalities no longer exist; otherwise, sensitive information may be leaked. Hence, a secure and flexible mechanism for processing different fields (marked private or public for different scenario needs) of metadata simultaneously is desirable. We searched the literature for methods of achieving such a goal, it turned out that this was not explicitly considered or reasonably solved before. Therefore, in this paper, we investigate the problem of constructing privacy-enhancing metadata, namely, 1) flexible and tamper-resistant metadata setting, 2) owner-enabled secure search authorization with explicit metadata. Based on the concept of public key encryption with keyword search (PEKS), we propose a novel Authorized Keyword Search over Encrypted Data with Metadata scheme (MD-AKS), which firstly well addressed the above demands. We formalize the security model and prove the security of MD-AKS scheme. Our work maximizes the flexibility of metadata setting in two aspects: the associated metadata can be set as an arbitrary string and the costs of clients are independent of explicit metadata's complexity. We implement MD-AKS, the theoretical comparison and experiment results further demonstrate the usability and scalability.
引用
收藏
页码:2746 / 2760
页数:15
相关论文
共 50 条
  • [1] Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment
    Sultan, Nazatul Haque
    Kaaniche, Nesrine
    Laurent, Maryline
    Barbhuiya, Ferdous Ahmed
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 216 - 233
  • [2] DOAS: Efficient data owner authorized search over encrypted cloud data
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Ximeng
    Liu, Zhiquan
    Zhang, Junwei
    Wei, Fushan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (03) : 349 - 360
  • [3] Authorized Keyword Search on Encrypted Data
    Shi, Jie
    Lai, Junzuo
    Li, Yingjiu
    Deng, Robert H.
    Weng, Jian
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 419 - 435
  • [4] DOAS: Efficient data owner authorized search over encrypted cloud data
    Yinbin Miao
    Jianfeng Ma
    Ximeng Liu
    Zhiquan Liu
    Junwei Zhang
    Fushan Wei
    Peer-to-Peer Networking and Applications, 2018, 11 : 349 - 360
  • [5] Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy
    Xu, Lingling
    Li, Wanhua
    Zhang, Fangguo
    Cheng, Rong
    Tang, Shaohua
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2096 - 2109
  • [6] Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things
    Zhang, Yinghui
    Wu, Axin
    Zhang, Tiantian
    Zheng, Dong
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 413 - 421
  • [7] Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things
    Yinghui Zhang
    Axin Wu
    Tiantian Zhang
    Dong Zheng
    Annals of Telecommunications, 2019, 74 : 413 - 421
  • [8] Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing
    Liu, Qin
    Peng, Yu
    Jiang, Hongbo
    Wu, Jie
    Wang, Tian
    Peng, Tao
    Wang, Guojun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 4181 - 4195
  • [9] Split keyword fuzzy and synonym search over encrypted cloud data
    Raghavendra, S.
    Girish, S.
    Geeta, C. M.
    Buyya, Rajkumar
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (08) : 10135 - 10156
  • [10] Achieving Authorized and Ranked Multi-keyword Search over Encrypted Cloud Data
    Li, Hongwei
    Liu, Dongxiao
    Jia, Kun
    Lin, Xiaodong
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7450 - 7455