Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata

被引:9
作者
Wang, Jiabei [1 ,2 ]
Zhang, Rui [1 ,2 ]
Li, Jianhao [1 ,2 ]
Xiao, Yuting [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Metadata; Servers; Security; Encryption; Keyword search; Authorization; Public key; Searchable encryption; metadata; secure search authorization; full keyword guessing attack; flexibility; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; BLIND SIGNATURE; QUERIES; SCHEME;
D O I
10.1109/TIFS.2022.3163886
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Metadata plays an essential role in facilitating data organizing, finding, and understanding, but it also contains lots of sensitive information about the data and the data users, e.g., the location where a picture was taken. In practice, when sensitive data is encrypted before being uploaded to untrusted public clouds, an oblivious dilemma comes: if the metadata is totally encrypted, and its functionalities no longer exist; otherwise, sensitive information may be leaked. Hence, a secure and flexible mechanism for processing different fields (marked private or public for different scenario needs) of metadata simultaneously is desirable. We searched the literature for methods of achieving such a goal, it turned out that this was not explicitly considered or reasonably solved before. Therefore, in this paper, we investigate the problem of constructing privacy-enhancing metadata, namely, 1) flexible and tamper-resistant metadata setting, 2) owner-enabled secure search authorization with explicit metadata. Based on the concept of public key encryption with keyword search (PEKS), we propose a novel Authorized Keyword Search over Encrypted Data with Metadata scheme (MD-AKS), which firstly well addressed the above demands. We formalize the security model and prove the security of MD-AKS scheme. Our work maximizes the flexibility of metadata setting in two aspects: the associated metadata can be set as an arbitrary string and the costs of clients are independent of explicit metadata's complexity. We implement MD-AKS, the theoretical comparison and experiment results further demonstrate the usability and scalability.
引用
收藏
页码:2746 / 2760
页数:15
相关论文
共 50 条
[41]   Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud [J].
Yilun Wu ;
Xicheng Lu ;
Jinshu Su ;
Peixin Chen ;
Xiaofeng Wang ;
Bofeng Zhang .
中国通信, 2017, 14 (05) :124-133
[42]   Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing [J].
Verma, Garima ;
Kanrar, Soumen .
WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (02) :975-996
[43]   Secure and Efficient Multi-keyword Fuzzy Search Over Encrypted Data on Alliance Chain [J].
Song, Jimeng ;
Shen, Ziqi ;
Yu, Han ;
Lai, Rongxin ;
Li, Yuancheng ;
Wang, Qingle ;
Li, Jianbin .
RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2024, 17 (07) :652-665
[44]   A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data [J].
Xia, Zhihua ;
Wang, Xinhui ;
Sun, Xingming ;
Wang, Qian .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) :340-352
[45]   Fast keyword search over encrypted data with short ciphertext in clouds [J].
Tseng, Yi-Fan ;
Fan, Chun-, I ;
Liu, Zi-Cheng .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
[46]   Document Attribute-based Keyword Search over Encrypted Data [J].
Fu, Zhangjie ;
Xi, Jie ;
Wang, Jin ;
Sun, Xingming .
2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, :787-790
[47]   Split keyword fuzzy and synonym search over encrypted cloud data [J].
Rajkumar Raghavendra S ;
S. S. Girish S ;
L. M. Geeta C. M. .
Multimedia Tools and Applications, 2018, 77 :10135-10156
[48]   Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method [J].
Miao, Yinbin ;
Zheng, Wei ;
Jia, Xiaohua ;
Liu, Ximeng ;
Choo, Kim-Kwang Raymond ;
Deng, Robert H. .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (01) :525-536
[49]   RSAE: Ranked Keyword Search over Asymmetric Encrypted cloud data [J].
Guo, Cheng ;
Song, Qiongqiong ;
Zhuang, Ruhan ;
Feng, Bin .
PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, :82-86
[50]   Privacy-Preserving Bloom Filter-Based Keyword Search Over Large Encrypted Cloud Data [J].
Liang, Yanrong ;
Ma, Jianfeng ;
Miao, Yinbin ;
Kuang, Da ;
Meng, Xiangdong ;
Deng, Robert H. .
IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (11) :3086-3098