Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing

被引:90
|
作者
Miao, Yinbin [1 ]
Ma, Jianfeng [1 ]
Liu, Ximeng [2 ]
Li, Xinghua [1 ]
Jiang, Qi [1 ]
Zhang, Junwei [1 ]
机构
[1] Xidian Univ, Dept Cyber Engn, Xian 710071, Peoples R China
[2] Singapore Management Univ, Dept Informat Syst, 80 Stamford Rd, Singapore 188065, Singapore
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud computing; Keyword search; Logic gates; Encryption; Servers; Searchable encryption; hierarchical structures; ciphertext-policy attribute-based encryption; chosen-plaintext attack; chosen-keyword attack; RANKED SEARCH; ENCRYPTION; SECURITY;
D O I
10.1109/TSC.2017.2757467
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption (SE) has been a promising technology which allows users to perform search queries over encrypted data. However, the most of existing SE schemes cannot deal with the shared records that have hierarchical structures. In this paper, we devise a basic cryptographic primitive called as attribute-based keyword search over hierarchical data (ABKS-HD) scheme by using the ciphertext-policy attribute-based encryption (CP-ABE) technique, but this basic scheme cannot satisfy all the desirable requirements of cloud systems. The facts that the single keyword search will yield many irrelevant search results and the revoked users can access the unauthorized data with the old or outdated secret keys make this basic scheme not scale well in practice. To this end, we also propose two improved schemes (ABKS-HD-I, ABKS-HD-II) for the sake of supporting multi-keyword search and user revocation, respectively. In contrast with the state-of-the-art attribute-based keyword search (ABKS) schemes, the computation overhead of our schemes almost linearly increases with the number of users' attributes rather than the number of attributes in systems. Formal security analysis proves that our schemes are secure against both chosen-plaintext attack (CPA) and chosen-keyword attack (CKA) in the random oracle model. Furthermore, empirical study using a real-world dataset shows that our schemes are feasible and efficient in practical applications.
引用
收藏
页码:985 / 998
页数:14
相关论文
共 50 条
  • [21] Hierarchical Attribute-based Access Control with Authentication for Outsourced Data in Cloud Computing
    Liu, Xuejiao
    Xia, Yingjie
    Jiang, Shasha
    Xia, Fubiao
    Wang, Yanbo
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 477 - 484
  • [22] Multiauthority Attribute-Based Keyword Search over Cloud-Edge-End Collaboration in IoV
    Zhen, Yan
    Chui, Yilan
    Zhang, Puning
    Liu, Huan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [23] Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud
    Yuqin Sun
    Lidong Han
    Jingguo Bi
    Xiao Tan
    Qi Xie
    Journal of Cloud Computing, 12
  • [24] KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption
    Chaudhari, Payal
    Das, Manik Lal
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) : 1036 - 1044
  • [25] Practical and Dynamic Attribute-Based Keyword Search Supporting Numeric Comparisons Over Encrypted Cloud Data
    Yin, Hui
    Li, Yangfan
    Deng, Hua
    Zhang, Wei
    Qin, Zheng
    Li, Keqin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2855 - 2867
  • [26] Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud
    Sun, Yuqin
    Han, Lidong
    Bi, Jingguo
    Tan, Xiao
    Xie, Qi
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [27] FELT-ABKS: Fog-Enabled Lightweight Traceable Attribute-Based Keyword Search Over Encrypted Data
    Varri, Uma Sankararao
    Kasani, Sreekanth
    Pasupuleti, Syam Kumar
    Kadambari, K., V
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (10) : 7559 - 7571
  • [28] Attribute-based keyword search encryption for power data protection
    Zhang, Xun
    Mu, Dejun
    Zhao, Jinxiong
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (02):
  • [29] An Attribute-Based Keyword Search Scheme for Multiple Data Owners in Cloud-Assisted Industrial Internet of Things
    Yin, Hui
    Li, Yangfan
    Deng, Hua
    Zhang, Wei
    Qin, Zheng
    Li, Keqin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (04) : 5763 - 5773
  • [30] Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing
    Li, Jiguo
    Chen, Ningyu
    Zhang, Yichen
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 983 - 993