A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing

被引:13
作者
Chen, Biwen [1 ]
Wu, Libing [3 ,4 ]
Li, Li [3 ]
Choo, Kim-Kwang Raymond [5 ]
He, Debiao [2 ,3 ]
机构
[1] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Peoples R China
[2] Guangdong Prov Key Lab Data Secur & Privacy Prote, Guangzhou 510632, Peoples R China
[3] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[4] Wuhan Univ, Shenzhen Res Inst, Shenzhen 518057, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Data sharing; cloud storage; searchable encryption; parallel search; forward privacy; KEYWORD SEARCH; EFFICIENT; PROTOCOL; INTERNET;
D O I
10.1109/ACCESS.2020.2971089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data sharing through the cloud is flourishing with the development of cloud computing technology. The new wave of technology will also give rise to new security challenges, particularly the data confidentiality in cloud-based sharing applications. Searchable encryption is considered as one of the most promising solutions for balancing data confidentiality and usability. However, most existing searchable encryption schemes cannot simultaneously satisfy requirements for both high search efficiency and strong security due to lack of some must-have properties, such as parallel search and forward security. To address this problem, we propose a variant searchable encryption with parallelism and forward privacy, namely the parallel and forward private searchable public-key encryption (PFP-SPE). PFP-SPE scheme achieves both the parallelism and forward privacy at the expense of slightly higher storage costs. PFP-SPE has similar search efficiency with that of some searchable symmetric encryption schemes but no key distribution problem. The security analysis and the performance evaluation on a real-world dataset demonstrate that the proposed scheme is suitable for practical application.
引用
收藏
页码:28009 / 28020
页数:12
相关论文
共 35 条
[1]  
[Anonymous], P IACR
[2]  
[Anonymous], IEEE T SERVICES COMP
[3]  
[Anonymous], IEEE T DEPENDABLE SE
[4]  
[Anonymous], 2012, P 19 ANN NETW DISTR
[5]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[6]  
Bost Raphael, 2019, Proceedings on Privacy Enhancing Technologies, V2019, P132, DOI 10.2478/popets-2019-0062
[7]   Σοφοζ - Forward Secure Searchable Encryption [J].
Bost, Raphael .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1143-1154
[8]   Leakage-Abuse Attacks Against Searchable Encryption [J].
Cash, David ;
Grubbs, Paul ;
Perry, Jason ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :668-679
[9]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20
[10]   New Constructions for Forward and Backward Private Symmetric Searchable Encryption [J].
Chamani, Javad Ghareh ;
Papadopoulos, Dimitrios ;
Papamanthou, Charalampos ;
Jalili, Rasool .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :1038-1055