AKSER: Attribute-based keyword search with efficient revocation in cloud computing

被引:61
作者
Cui, Jie [1 ]
Zhou, Han [1 ]
Zhong, Hong [1 ]
Xu, Yan [1 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Outsourcing computation; Multi-keyword search; Attribute-based encryption; Efficient revocation; PUBLIC-KEY ENCRYPTION; SYMMETRIC-ENCRYPTION; SECURITY; PRIVACY;
D O I
10.1016/j.ins.2017.09.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of cloud computing, it is becoming increasingly popular for data owners to outsource their data to public cloud servers while allowing indented data users to retrieve these data stored in the cloud. For security and privacy reasons, data owners usually encrypt their data prior to outsourcing to the cloud server. At the same time, users often need to find data related to specific keywords of interest, this motivates research on the searchable encryption technique. In this paper, we focus on a different, yet more challenging, scenario where the outsourced dataset can have contribution from multiple owners and are searchable by multiple users. Based on our research of attribute-based encryption (ABE), we propose an attribute-based keyword search with efficient revocation scheme (AMER). Our scheme is highly efficient in terms of user revocation and can achieve fine-grained authorization of the search under the distributed multiple-attribute authorized institution. Security analysis demonstrates that the proposed scheme AKSER can achieve keyword semantic security, keyword secrecy, trapdoor unlinkability, and collusion resistance. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:343 / 352
页数:10
相关论文
共 35 条
  • [1] Security in cloud computing: Opportunities and challenges
    Ali, Mazhar
    Khan, Samee U.
    Vasilakos, Athanasios V.
    [J]. INFORMATION SCIENCES, 2015, 305 : 357 - 383
  • [2] [Anonymous], USENIX SEC S
  • [3] [Anonymous], 2014, P 2014 ACM WORKSH IN
  • [4] [Anonymous], 2009, STANFORD U
  • [5] Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
  • [6] Bao F, 2008, LECT NOTES COMPUT SC, V4991, P71
  • [7] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [8] QueryGen: Semantic interpretation of keyword queries over heterogeneous information systems
    Bobed, Carlos
    Mena, Eduardo
    [J]. INFORMATION SCIENCES, 2016, 329 : 412 - 433
  • [9] Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
    Cao, Ning
    Wang, Cong
    Li, Ming
    Ren, Kui
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) : 222 - 233
  • [10] Cheng-Chi Lee, 2013, International Journal of Network Security, V15, P321