A Multi-keyword Multi-user Searchable Encryption Scheme Based On Cloud Storage

被引:0
|
作者
Huang, Haiping [1 ,2 ,3 ]
Du, Jianpeng [1 ,2 ]
Wang, Hui [1 ,2 ]
Wang, Ruchuan [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Tec, Nanjing 210016, Jiangsu, Peoples R China
来源
2016 IEEE TRUSTCOM/BIGDATASE/ISPA | 2016年
关键词
searchable encryption; multi-keyword; multi-user; security; access controllability;
D O I
10.1109/TrustCom.2016.294
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, the huge growth of data from electronic business or social network leads to a trend that the owners of data are inclined to outsource their data (usually encrypted) to cloud storage servers. Leveraging searchable encryption technologies can not only guarantee the confidentiality and integrity of the data, but also achieve an effective search on encrypted data. Compared with the single keyword search, the multi-keyword search has an important practical significance for its more precise retrieval of data. Meanwhile, aimed at the defects in existing searchable encryption schemes, such as the unsatisfactory search efficiency and no support for multi-user search, etc., in this paper, we propose a multi-keyword multi-user searchable encryption scheme based on cloud storage, which is realized through secure interactions between authorized users and cloud severs. Our proposal adopts the encryption of exponent which is realized through secure interactions between authorized users and cloud severs involved generation of secure trapdoor and is of indistinguishability against adaptive chosen keyword attack (IND-CKA). Subsequently, theoretical and empirical evaluations demonstrate the desirable retrieval efficiency of our proposal compared with current methods. And meanwhile, our proposal achieves the access controllability of the encrypted data, and is of dynamic addition and revocation of authorized users, at the same time is of dynamic update of the user accessing to files.
引用
收藏
页码:1937 / 1943
页数:7
相关论文
共 50 条
  • [21] Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing
    Liu, Jinlu
    Zhao, Bo
    Qin, Jing
    Zhang, Xi
    Ma, Jixin
    COMPUTER JOURNAL, 2023, 66 (01): : 184 - 196
  • [22] Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data
    Zhang, Yinghui
    Zhu, Tian
    Guo, Rui
    Xu, Shengmin
    Cui, Hui
    Cao, Jin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 971 - 983
  • [23] Multi-keyword Searchable Encryption Based on Paillier and Private Set Intersection
    Zhou F.-C.
    Zhang Z.-Y.
    Wang K.-X.
    Li Y.-X.
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (03): : 321 - 326
  • [24] Multi-Keyword Searchable Encryption Algorithm Based on Semantic Extension
    Xu G.
    Shi C.
    Wang W.
    Pan Q.
    Li F.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2193 - 2206
  • [25] Certificateless Searchable Encryption Scheme in Multi-User Environment
    Feng, Tao
    Si, Jiewen
    CRYPTOGRAPHY, 2022, 6 (04)
  • [26] Multi-keyword searchable encryption for smart grid edge computing
    Wang, Dan
    Wu, Po
    Li, Bin
    Du, Haorui
    Luo, Min
    ELECTRIC POWER SYSTEMS RESEARCH, 2022, 212
  • [27] Verifiable Multi-Keyword Searchable Encryption with Forward and Backward Security
    Song X.-F.
    Wang H.-Q.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (04): : 727 - 742
  • [28] A Dynamic Searchable Encryption Scheme for Secure Cloud Server Operation Reserving Multi-keyword Ranked Search
    Kabir, Tasnim
    Adnan, Muhammad Abdullah
    PROCEEDINGS OF 2017 4TH INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), 2017, : 80 - 88
  • [29] Update enabled multi-keyword searchable encryption scheme for secure data outsourcing
    Arora V.
    Tyagi S.S.
    International Journal of Information and Computer Security, 2017, 9 (04) : 288 - 301
  • [30] Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage
    Varri, Uma Sankararao
    Pasupuleti, Syam Kumar
    Kadambari, K., V
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 14 (9) : 11455 - 11467