Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage

被引:0
|
作者
Xia, Qi [1 ]
Ni, Jianbing [1 ]
Kanpogninge, Ansuura John Bosco Aristotle [2 ]
Gee, James C. [3 ]
机构
[1] Univ Elect Sci & Technol China, Big Data Res Ctr, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Dev Studies, Tamale, Ghana
[3] Univ Penn, Sch Engn & Appl Sci, Philadelphia, PA 19104 USA
关键词
Cloud storage; mobile network; mobile cloud computing; searchable encryption; data sharing; KEYWORD SEARCH; EFFICIENT;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mobile cloud computing is referred as the combination of cloud computing and mobile networks to bring benefits for both mobile users and cloud computing providers. While once the data of mobile users is outsourced to the cloud, it is a formidable and challenging task for the data owners to realize both the data confidentiality and the utilization because it seems unachievable to search and retrieve the special contents on the data encrypted by traditional encryption schemes. To address this issue, we propose a searchable public-key encryption scheme for a group of users in mobile cloud storage. In our proposal, a dynamic asymmetric group key agreement protocol is utilized for data sharing among a body of mobile users and the technique of proxy re-signature is employed to update the searchable ciphertexts when the mobile users in the group varies. Through the security proof and performance evaluation, we demonstrate the new scheme is both secure and efficient, and hence it reaches the requirements of the users, network operators, as well as cloud computing providers in application.
引用
收藏
页码:440 / 453
页数:14
相关论文
共 50 条
  • [1] A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing
    Chen, Biwen
    Wu, Libing
    Li, Li
    Choo, Kim-Kwang Raymond
    He, Debiao
    IEEE ACCESS, 2020, 8 : 28009 - 28020
  • [2] Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage
    Zhou, Yuyang
    Hu, Zhebin
    Li, Fagen
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 383 - 396
  • [3] Subversion-resistant public-key searchable encryption for data sharing in IIoT
    Zhou, Rang
    He, Yongkang
    Li, Wanpeng
    Wang, Yanping
    Zhang, Xiaojun
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 161
  • [4] Lattice-based searchable public-key encryption scheme for secure cloud storage
    Xie, Run
    Xu, Chunxiang
    He, Chanlian
    Zhang, Xiaojun
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 3 - 20
  • [5] Pattern Hiding and Authorized Searchable Encryption for Data Sharing in Cloud Storage
    Zhang, Kai
    Hu, Boli
    Ning, Jianting
    Gong, Junqing
    Qian, Haifeng
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2025, 37 (05) : 2802 - 2815
  • [6] Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
    Cui, Baojiang
    Liu, Zheli
    Wang, Lingyu
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2374 - 2385
  • [7] Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage
    Wu, Axin
    Li, Fagen
    Xin, Xiangjun
    Zhang, Yinghui
    Zhu, Jianhao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 149
  • [8] An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage
    Wang, Xuqi
    Xie, Yu
    Cheng, Xiangguo
    Jiang, Zhengtao
    2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2019,
  • [9] Efficient public key encryption with user-friendly keywords search for searchable cloud storage
    Chen, Kuo-Chang
    Chen, Yu-Chi
    Horng, Gwoboa
    Tso, Raylin
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 724 - 733
  • [10] Hidden-Token Searchable Public-Key Encryption
    Zuo, Cong
    Shao, Jun
    Liu, Zhe
    Ling, Yun
    Wei, Guiyi
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 248 - 254