Traceable and revocable multi-authority attribute-based keyword search for cloud storage

被引:12
作者
Varri, Uma Sankararao [1 ,2 ]
Pasupuleti, Syam Kumar [2 ]
Kadambari, K., V [1 ]
机构
[1] Natl Inst Technol Warangal, Hanamkonda, India
[2] Inst Dev & Res Banking Technol, Chennai, India
关键词
Searchable encryption; Attribute-based keyword search; Traceability; Revocation; Cloud storage; ENCRYPTION SCHEME; EFFICIENT;
D O I
10.1016/j.sysarc.2022.102745
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) provides data privacy and achieves fine-grained access control over encrypted data in the cloud. However, authorized users may misuse the secret key for financial benefits in a multi-user scenario. Thus, tracing those malicious users and revoking them from the system is essential. Alongside this, most existing schemes have only a single authority to generate the secret key, which may lead to misuse of the secret key. To address these problems, this paper proposes a traceable and revocable multi-authority attribute-based keyword search in the cloud. The scheme involves two authorities generating the user secret key to restrict any individual authority's unauthorized access to cloud data. The scheme also traces malicious users and revokes them from the system. Further, we prove that the scheme is secure against chosen keyword attacks, chosen plaintext attacks, and traceability. And also verify the security against malicious authorities. The performance analysis shows that the proposed scheme is efficient in computation cost compared to the state-of-the-art schemes.
引用
收藏
页数:9
相关论文
共 34 条
[1]   Multidata-Owner Searchable Encryption Scheme Over Medical Cloud Data With Efficient Access Control [J].
Abdelfattah, Sherif ;
Baza, Mohamed ;
Mahmoud, Mohamed M. E. A. ;
Fouda, Mostafa M. ;
Abualsaud, Khalid A. ;
Guizani, Mohsen .
IEEE SYSTEMS JOURNAL, 2022, 16 (03) :5067-5078
[2]  
[Anonymous], 2021, ENRON DATA SET
[3]  
Bao Y., 2022, IEEE J BIOMED HLTH I
[4]  
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[5]   Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation [J].
Cash, David ;
Jaeger, Joseph ;
Jarecki, Stanislaw ;
Jutla, Charanjit ;
Krawczyk, Hugo ;
Rosu, Marcel-Catalin ;
Steine, Michael .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[6]  
Chai Q, 2012, IEEE ICC
[7]   KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption [J].
Chaudhari, Payal ;
Das, Manik Lal .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) :1036-1044
[8]   Privacy Preserving Searchable Encryption with Fine-Grained Access Control [J].
Chaudhari, Payal ;
Das, Manik Lal .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (02) :753-762
[9]   Blockchain based searchable encryption for electronic health record sharing [J].
Chen, Lanxiang ;
Lee, Wai-Kong ;
Chang, Chin-Chen ;
Choo, Kim-Kwang Raymond ;
Zhang, Nan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 (420-429) :420-429
[10]   Attribute-based Keyword Search Efficiency Enhancement Via an Online/Offline Approach [J].
Dong, Qiuxiang ;
Guan, Zhi ;
Chen, Zhong .
2015 IEEE 21ST INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2015, :298-305