Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search

被引:5
作者
Shi, Junbin [1 ,2 ]
Yu, Qiming [1 ]
Yu, Yong [1 ]
Wang, Lianhai [3 ]
Zhang, Wenzheng [2 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu, Peoples R China
[3] Qilu Univ Technol, Shandong Acad Sci, Shandong Prov Key Lab Comp Networks, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
access control; cloud computing; keyword search; privacy preserving; public key encryption; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; SCHEME;
D O I
10.1002/int.23080
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a highly evolved big data era, intelligent data analysis can improve social operation efficiency and save resources. However, it also brings masses of conflicts, such as malicious mining and abuse of personal privacy information. This paper introduces a privacy protection scheme for social applications. In this scheme, attribute based searchable encryption is used to defend the security of confidential data and ensure the availability of data. Moreover, the access control structure of ciphertext strategy can meet the needs of data sharing in social applications. Security analysis shows that the scheme does not disclose privacy information in index ciphertext, search trapdoor, and equality test. Compared with plaintext information upload and sharing, the additional performance overhead caused by the scheme is acceptable. The scheme can be actually deployed in social applications.
引用
收藏
页码:12152 / 12168
页数:17
相关论文
共 29 条
[1]   Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE [J].
Agrawal, Shweta ;
Maitra, Monosij ;
Yamada, Shota .
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 :765-797
[2]  
[Anonymous], about us
[3]  
[Anonymous], MICROSOFT VISUAL STU
[4]  
[Anonymous], CONSUM REP
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[7]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[8]  
Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
[9]  
Camenisch J, 2009, LECT NOTES COMPUT SC, V5443, P196
[10]   KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption [J].
Chaudhari, Payal ;
Das, Manik Lal .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) :1036-1044