Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage

被引:0
作者
Xia, Qi [1 ]
Ni, Jianbing [1 ]
Kanpogninge, Ansuura John Bosco Aristotle [2 ]
Gee, James C. [3 ]
机构
[1] Univ Elect Sci & Technol China, Big Data Res Ctr, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Univ Dev Studies, Tamale, Ghana
[3] Univ Penn, Sch Engn & Appl Sci, Philadelphia, PA 19104 USA
关键词
Cloud storage; mobile network; mobile cloud computing; searchable encryption; data sharing; KEYWORD SEARCH; EFFICIENT;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mobile cloud computing is referred as the combination of cloud computing and mobile networks to bring benefits for both mobile users and cloud computing providers. While once the data of mobile users is outsourced to the cloud, it is a formidable and challenging task for the data owners to realize both the data confidentiality and the utilization because it seems unachievable to search and retrieve the special contents on the data encrypted by traditional encryption schemes. To address this issue, we propose a searchable public-key encryption scheme for a group of users in mobile cloud storage. In our proposal, a dynamic asymmetric group key agreement protocol is utilized for data sharing among a body of mobile users and the technique of proxy re-signature is employed to update the searchable ciphertexts when the mobile users in the group varies. Through the security proof and performance evaluation, we demonstrate the new scheme is both secure and efficient, and hence it reaches the requirements of the users, network operators, as well as cloud computing providers in application.
引用
收藏
页码:440 / 453
页数:14
相关论文
共 50 条
  • [31] A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage
    Alimohammadi, Kobra
    Bayat, Majid
    Javadi, Hamid H. S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (3-4) : 2855 - 2872
  • [32] Searchable Encryption Cloud Storage with Dynamic Data Update to Support Efficient Policy Hiding
    Cao, Laicheng
    Kang, Yifan
    Wu, Qirui
    Wu, Rong
    Guo, Xian
    Feng, Tao
    CHINA COMMUNICATIONS, 2020, 17 (06) : 153 - 163
  • [33] Searchable encryption algorithm based on key aggregation of multiple data owners in data sharing
    Xu, Guangwei
    Ji, Wenrui
    Wang, Yan
    Shi, Xiujin
    Huang, Qiubo
    Gan, Yanglan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [34] Searchable Encryption Cloud Storage with Dynamic Data Update to Support Efficient Policy Hiding
    Laicheng Cao
    Yifan Kang
    Qirui Wu
    Rong Wu
    Xian Guo
    Tao Feng
    中国通信, 2020, 17 (06) : 153 - 163
  • [35] Multi-server searchable data crypt: searchable data encryption scheme for secure distributed cloud storage
    Shahien, Toka
    Sarhan, Amany M.
    Alshewimy, Mahmoud A. M.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (09) : 8663 - 8681
  • [36] A new lightweight public key encryption with equality test for cloud storage
    Lin, Hao
    Zhao, Gaohua
    Song, Shouyou
    Wu, Wei
    Jiang, Wei
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (10) : 28947 - 28968
  • [37] Verifiable and authenticated searchable encryption scheme with aggregate key in cloud storage
    Liu, Zhenhua
    Liu, Yaohui
    2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 421 - 425
  • [38] A certificateless authenticated searchable encryption with dynamic multi-receiver for cloud storage
    Chenam, Venkata Bhikshapathi
    Ali, Syed Taqi
    COMPUTER COMMUNICATIONS, 2023, 211 : 157 - 177
  • [39] Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage
    Zhang, Yuan
    Xu, Chunxiang
    Ni, Jianbing
    Li, Hongwei
    Shen, Xuemin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (04) : 1335 - 1348
  • [40] Cloud Storage Data Sharing Based on Attribute Encryption in Smart Healthcare
    Niu Shufen
    Song Mi
    Fang Lizhi
    Wang Caifen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (01) : 107 - 117