Enabling verifiable multiple keywords search over encrypted cloud data

被引:58
作者
Miao, Yinbin [1 ,2 ]
Weng, Jian [3 ]
Liu, Ximeng [4 ]
Choo, Kim-Kwang Raymond [5 ]
Liu, Zhiquan [3 ]
Li, Hongwei [6 ]
机构
[1] Xidian Univ, Dept Cyber Engn, Xian 710071, Shaanxi, Peoples R China
[2] Key Lab Opt Commun & Networks, Chongqing 4000565, Peoples R China
[3] Jinan Univ, Coll Cyber Secur, Coll Informat Sci & Technol, Guangzhou 510632, Guangdong, Peoples R China
[4] Singapore Management Univ, Dept Informat Syst, 80 Stamford Rd, Singapore, Singapore
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Univ Elect Sci & Technol China, Dept Comp Sci & Engn, Chengdu 610051, Sichuan, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Searchable encryption; Certificate management; Key escrow; Ciphertexts indistinguishability; Signatures unforgeability;
D O I
10.1016/j.ins.2018.06.066
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable Encryption (SE) enables a user to search over encrypted data, such as data stored in a remote cloud server. Existing certificate-, identity-, and attribute-based SE schemes suffer from certificate management or key escrow limitations. Furthermore, the semi-honest-but-curious cloud may conduct partial search operations and return a fraction of the search results (i.e., incomplete results) in order to reduce costs. In this paper, we present a secure cryptographic primitive, Verifiable Multiple Keywords Search (VMKS) over ciphertexts, which leverages the Identity-Based Encryption (IBE) and certificateless signature techniques. The VMKS scheme allows the user to verify the correctness of search results and avoids both certificate management or key escrow limitations. We then demonstrate the security of proposed VMKS scheme (i.e., the scheme achieves both ciphertext indistinguishability and signature unforgeability). We also use a real-world dataset to evaluate its feasibility and efficiency. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:21 / 37
页数:17
相关论文
共 43 条
[1]  
[Anonymous], 2013, LNCS, DOI DOI 10.1007/978-3-319-02937-517
[2]  
[Anonymous], 2015, INT C NETW SYST SEC
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]   Server-Aided Public Key Encryption With Keyword Search [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Huang, Xinyi ;
Wang, Xiaofen ;
Wang, Yongjun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2833-2842
[5]   Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Wang, Xiaofen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) :789-798
[6]   A New General Framework for Secure Public Key Encryption with Keyword Search [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Wang, Xiaofen .
INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 :59-76
[7]  
Chen Y., 2013, IACR CRYPTOL EPRINT, V2013, P193
[8]   A multi-user searchable encryption scheme with keyword authorization in a cloud storage [J].
Deng, Zuojie ;
Li, Kenli ;
Li, Keqin ;
Zhou, Jingli .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 :208-218
[9]   User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage [J].
Li, Jiguo ;
Yao, Wei ;
Han, Jinguang ;
Zhang, Yichen ;
Shen, Jian .
IEEE SYSTEMS JOURNAL, 2018, 12 (02) :1767-1777
[10]   Certificateless Public Auditing with Privacy Preserving for Cloud-Assisted Wireless Body Area Networks [J].
Kang, Baoyuan ;
Wang, Jiaqiang ;
Shao, Dongyang .
MOBILE INFORMATION SYSTEMS, 2017, 2017