A Multi-keyword Multi-user Searchable Encryption Scheme Based On Cloud Storage

被引:0
作者
Huang, Haiping [1 ,2 ,3 ]
Du, Jianpeng [1 ,2 ]
Wang, Hui [1 ,2 ]
Wang, Ruchuan [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Tec, Nanjing 210016, Jiangsu, Peoples R China
来源
2016 IEEE TRUSTCOM/BIGDATASE/ISPA | 2016年
关键词
searchable encryption; multi-keyword; multi-user; security; access controllability;
D O I
10.1109/TrustCom.2016.294
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, the huge growth of data from electronic business or social network leads to a trend that the owners of data are inclined to outsource their data (usually encrypted) to cloud storage servers. Leveraging searchable encryption technologies can not only guarantee the confidentiality and integrity of the data, but also achieve an effective search on encrypted data. Compared with the single keyword search, the multi-keyword search has an important practical significance for its more precise retrieval of data. Meanwhile, aimed at the defects in existing searchable encryption schemes, such as the unsatisfactory search efficiency and no support for multi-user search, etc., in this paper, we propose a multi-keyword multi-user searchable encryption scheme based on cloud storage, which is realized through secure interactions between authorized users and cloud severs. Our proposal adopts the encryption of exponent which is realized through secure interactions between authorized users and cloud severs involved generation of secure trapdoor and is of indistinguishability against adaptive chosen keyword attack (IND-CKA). Subsequently, theoretical and empirical evaluations demonstrate the desirable retrieval efficiency of our proposal compared with current methods. And meanwhile, our proposal achieves the access controllability of the encrypted data, and is of dynamic addition and revocation of authorized users, at the same time is of dynamic update of the user accessing to files.
引用
收藏
页码:1937 / 1943
页数:7
相关论文
共 50 条
  • [31] Verifiable Multi-Keyword Searchable Encryption with Forward and Backward Security
    Song X.-F.
    Wang H.-Q.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (04): : 727 - 742
  • [32] Update enabled multi-keyword searchable encryption scheme for secure data outsourcing
    Arora V.
    Tyagi S.S.
    International Journal of Information and Computer Security, 2017, 9 (04) : 288 - 301
  • [33] Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage
    Varri, Uma Sankararao
    Pasupuleti, Syam Kumar
    Kadambari, K., V
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 14 (9) : 11455 - 11467
  • [34] Comment on 'Multi-Keyword Searchable and Verifiable Attribute-Based Encryption over Cloud Data'
    Guo W.-P.
    Shi R.-H.
    Zhang X.-X.
    IEEE Transactions on Cloud Computing, 2023, 11 (04): : 3797 - 3798
  • [35] Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage
    Uma Sankararao Varri
    Syam Kumar Pasupuleti
    K. V Kadambari
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 11455 - 11467
  • [36] Paillier-Based Fuzzy Multi-Keyword Searchable Encryption Scheme with Order-Preserving
    Li, Xiehua
    Li, Fang
    Jiang, Jie
    Mei, Xiaoyu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 65 (02): : 1707 - 1721
  • [37] Multi-user searchable encryption with a designated server
    Li, Zhen
    Zhao, Minghao
    Jiang, Han
    Xu, Qiuliang
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (9-10) : 617 - 629
  • [38] BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records
    Fanfan, Shen
    Lin, Shi
    Jun, Zhang
    Chao, Xu
    Yong, Chen
    Yanxiang, He
    COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [39] Multi-keyword ranked searchable public-key encryption
    Hu, Chengyu
    Yang, Bo
    Liu, Pengtao
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (3-4) : 221 - 231
  • [40] Multi-keyword Fuzzy Search Encryption Scheme Based on Blockchain
    Xixi, Yan
    Suwei, Feng
    Yongli, Tang
    Pei, Yin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (04) : 1346 - 1355