Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search

被引:5
作者
Shi, Junbin [1 ,2 ]
Yu, Qiming [1 ]
Yu, Yong [1 ]
Wang, Lianhai [3 ]
Zhang, Wenzheng [2 ]
机构
[1] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu, Peoples R China
[3] Qilu Univ Technol, Shandong Acad Sci, Shandong Prov Key Lab Comp Networks, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
access control; cloud computing; keyword search; privacy preserving; public key encryption; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; SCHEME;
D O I
10.1002/int.23080
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a highly evolved big data era, intelligent data analysis can improve social operation efficiency and save resources. However, it also brings masses of conflicts, such as malicious mining and abuse of personal privacy information. This paper introduces a privacy protection scheme for social applications. In this scheme, attribute based searchable encryption is used to defend the security of confidential data and ensure the availability of data. Moreover, the access control structure of ciphertext strategy can meet the needs of data sharing in social applications. Security analysis shows that the scheme does not disclose privacy information in index ciphertext, search trapdoor, and equality test. Compared with plaintext information upload and sharing, the additional performance overhead caused by the scheme is acceptable. The scheme can be actually deployed in social applications.
引用
收藏
页码:12152 / 12168
页数:17
相关论文
共 29 条
[11]   Server-Aided Public Key Encryption With Keyword Search [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Huang, Xinyi ;
Wang, Xiaofen ;
Wang, Yongjun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2833-2842
[12]   Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Wang, Xiaofen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) :789-798
[13]  
CNN Business, US
[14]  
Goyal V., 2006, PROC ADV 24 ANN INT, P89, DOI [DOI 10.1145/1180405.1180418, 10.1145/1180405.1180418]
[15]   BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT [J].
Liu, Suhui ;
Yu, Jiguo ;
Xiao, Yinhao ;
Wan, Zhiguo ;
Wang, Shengling ;
Yan, Biwei .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09) :7851-7867
[16]  
Park DJ, 2005, LECT NOTES COMPUT SC, V3325, P73
[17]   Dynamic Keyword Search With Hierarchical Attributes in Cloud Computing [J].
Peng, Tao ;
Liu, Qin ;
Hu, Baishuang ;
Liu, Jierong ;
Zhu, Jiawei .
IEEE ACCESS, 2018, 6 :68948-68960
[18]   Trapdoor security in a searchable public-key encryption scheme with a designated tester [J].
Rhee, Hyun Sook ;
Park, Jong Hwan ;
Susilo, Willy ;
Lee, Dong Hoon .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) :763-771
[19]   Fuzzy identity-based encryption [J].
Sahai, A ;
Waters, B .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :457-473
[20]   Proxy re-encryption with keyword search [J].
Shao, Jun ;
Cao, Zhenfu ;
Liang, Xiaohui ;
Lin, Huang .
INFORMATION SCIENCES, 2010, 180 (13) :2576-2587