Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata

被引:9
作者
Wang, Jiabei [1 ,2 ]
Zhang, Rui [1 ,2 ]
Li, Jianhao [1 ,2 ]
Xiao, Yuting [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Metadata; Servers; Security; Encryption; Keyword search; Authorization; Public key; Searchable encryption; metadata; secure search authorization; full keyword guessing attack; flexibility; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; BLIND SIGNATURE; QUERIES; SCHEME;
D O I
10.1109/TIFS.2022.3163886
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Metadata plays an essential role in facilitating data organizing, finding, and understanding, but it also contains lots of sensitive information about the data and the data users, e.g., the location where a picture was taken. In practice, when sensitive data is encrypted before being uploaded to untrusted public clouds, an oblivious dilemma comes: if the metadata is totally encrypted, and its functionalities no longer exist; otherwise, sensitive information may be leaked. Hence, a secure and flexible mechanism for processing different fields (marked private or public for different scenario needs) of metadata simultaneously is desirable. We searched the literature for methods of achieving such a goal, it turned out that this was not explicitly considered or reasonably solved before. Therefore, in this paper, we investigate the problem of constructing privacy-enhancing metadata, namely, 1) flexible and tamper-resistant metadata setting, 2) owner-enabled secure search authorization with explicit metadata. Based on the concept of public key encryption with keyword search (PEKS), we propose a novel Authorized Keyword Search over Encrypted Data with Metadata scheme (MD-AKS), which firstly well addressed the above demands. We formalize the security model and prove the security of MD-AKS scheme. Our work maximizes the flexibility of metadata setting in two aspects: the associated metadata can be set as an arbitrary string and the costs of clients are independent of explicit metadata's complexity. We implement MD-AKS, the theoretical comparison and experiment results further demonstrate the usability and scalability.
引用
收藏
页码:2746 / 2760
页数:15
相关论文
共 50 条
[31]   Authorized Equality Test of Encrypted Data for Secure Cloud Databases [J].
Ma, Sha .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :223-230
[32]   Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data [J].
Yang, Xu ;
Wang, Qiuhao ;
Qi, Saiyu ;
Li, Ke ;
Wang, Jianfeng ;
Zhao, Wenjia ;
Qi, Yong .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06) :6356-6371
[33]   VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings [J].
Yinbin MIAO ;
Jianfeng MA ;
Ximeng LIU ;
Junwei ZHANG ;
Zhiquan LIU .
ScienceChina(InformationSciences), 2017, 60 (12) :192-206
[34]   VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings [J].
Miao, Yinbin ;
Ma, Jianfeng ;
Liu, Ximeng ;
Zhang, Junwei ;
Liu, Zhiquan .
SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (12)
[35]   Secure Search Over Encrypted Data in Cloud Computing [J].
Bakhtiari, Majid ;
Nateghizad, Majid ;
Zainal, Anazida .
2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, :290-295
[36]   Search Over Encrypted Cloud Data With Secure Updates [J].
Ocansey, Selasi Kwame ;
Wang, Changda .
2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, :380-386
[37]   Forward Secure Similarity Search Over Encrypted Data for Hamming Distance [J].
Wang, Beining ;
He, Kun ;
Huang, Yingying ;
Chen, Jing ;
Zhao, Chenbin ;
Du, Ruiying .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (03) :2478-2491
[38]   FELT-ABKS: Fog-Enabled Lightweight Traceable Attribute-Based Keyword Search Over Encrypted Data [J].
Varri, Uma Sankararao ;
Kasani, Sreekanth ;
Pasupuleti, Syam Kumar ;
Kadambari, K., V .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (10) :7559-7571
[39]   Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud [J].
Wu, Yilun ;
Lu, Xicheng ;
Su, Jinshu ;
Chen, Peixin ;
Wang, Xiaofeng ;
Zhang, Bofeng .
CHINA COMMUNICATIONS, 2017, 14 (05) :124-133
[40]   SSE-CTC: Search Over Encrypted Data With Owner-Enforced and Complete Time Constraints [J].
Yang, Jinjiang ;
Xue, Kaiping ;
Liu, Feng ;
Zhu, Bin ;
Li, Ruidong ;
Sun, Qibin ;
Lu, Jun .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (03) :1895-1907