Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata

被引:9
作者
Wang, Jiabei [1 ,2 ]
Zhang, Rui [1 ,2 ]
Li, Jianhao [1 ,2 ]
Xiao, Yuting [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Metadata; Servers; Security; Encryption; Keyword search; Authorization; Public key; Searchable encryption; metadata; secure search authorization; full keyword guessing attack; flexibility; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; BLIND SIGNATURE; QUERIES; SCHEME;
D O I
10.1109/TIFS.2022.3163886
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Metadata plays an essential role in facilitating data organizing, finding, and understanding, but it also contains lots of sensitive information about the data and the data users, e.g., the location where a picture was taken. In practice, when sensitive data is encrypted before being uploaded to untrusted public clouds, an oblivious dilemma comes: if the metadata is totally encrypted, and its functionalities no longer exist; otherwise, sensitive information may be leaked. Hence, a secure and flexible mechanism for processing different fields (marked private or public for different scenario needs) of metadata simultaneously is desirable. We searched the literature for methods of achieving such a goal, it turned out that this was not explicitly considered or reasonably solved before. Therefore, in this paper, we investigate the problem of constructing privacy-enhancing metadata, namely, 1) flexible and tamper-resistant metadata setting, 2) owner-enabled secure search authorization with explicit metadata. Based on the concept of public key encryption with keyword search (PEKS), we propose a novel Authorized Keyword Search over Encrypted Data with Metadata scheme (MD-AKS), which firstly well addressed the above demands. We formalize the security model and prove the security of MD-AKS scheme. Our work maximizes the flexibility of metadata setting in two aspects: the associated metadata can be set as an arbitrary string and the costs of clients are independent of explicit metadata's complexity. We implement MD-AKS, the theoretical comparison and experiment results further demonstrate the usability and scalability.
引用
收藏
页码:2746 / 2760
页数:15
相关论文
共 50 条
[21]   Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data [J].
He, Kai ;
Guo, Jun ;
Weng, Jian ;
Weng, Jiasi ;
Liu, Joseph K. ;
Yi, Xun .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) :1207-1217
[22]   Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners [J].
Yin, Hui ;
Qin, Zheng ;
Zhang, Jixin ;
Ou, Lu ;
Li, Fangmin ;
Li, Keqin .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :689-700
[23]   A Practical and Secure Multi-Keyword Search Method over Encrypted Cloud Data [J].
Orencik, Cengiz ;
Kantarcioglu, Murat ;
Savas, Erkay .
2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, :390-397
[24]   Dynamic secure multi-keyword ranked search over encrypted cloud data [J].
Hozhabr, Maryam ;
Asghari, Parvaneh ;
Javadi, Hamid Haj Seyyed .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
[25]   A shareable keyword search over encrypted data in cloud computing [J].
Xu, Li ;
Weng, Chi-Yao ;
Yuan, Lun-Pin ;
Wu, Mu-En ;
Tso, Raylin ;
Sun, Hung-Min .
JOURNAL OF SUPERCOMPUTING, 2018, 74 (03) :1001-1023
[26]   Efficient and Expressive Keyword Search Over Encrypted Data in Cloud [J].
Cui, Hui ;
Wan, Zhiguo ;
Deng, Robert H. ;
Wang, Guilin ;
Li, Yingjiu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) :409-422
[27]   A shareable keyword search over encrypted data in cloud computing [J].
Li Xu ;
Chi-Yao Weng ;
Lun-Pin Yuan ;
Mu-En Wu ;
Raylin Tso ;
Hung-Min Sun .
The Journal of Supercomputing, 2018, 74 :1001-1023
[28]   VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner [J].
Yinbin Miao ;
Jianfeng Ma ;
Ximeng Liu ;
Zhiquan Liu ;
Limin Shen ;
Fushan Wei .
Peer-to-Peer Networking and Applications, 2018, 11 :287-297
[29]   Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds [J].
Zhang, Hua ;
Zhao, Shaohua ;
Guo, Ziqing ;
Wen, Qiaoyan ;
Li, Wenmin ;
Gao, Fei .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) :308-323
[30]   Authorized Equality Test of Encrypted Data for Secure Cloud Databases [J].
Ma, Sha .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :223-230