Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing

被引:90
|
作者
Miao, Yinbin [1 ]
Ma, Jianfeng [1 ]
Liu, Ximeng [2 ]
Li, Xinghua [1 ]
Jiang, Qi [1 ]
Zhang, Junwei [1 ]
机构
[1] Xidian Univ, Dept Cyber Engn, Xian 710071, Peoples R China
[2] Singapore Management Univ, Dept Informat Syst, 80 Stamford Rd, Singapore 188065, Singapore
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud computing; Keyword search; Logic gates; Encryption; Servers; Searchable encryption; hierarchical structures; ciphertext-policy attribute-based encryption; chosen-plaintext attack; chosen-keyword attack; RANKED SEARCH; ENCRYPTION; SECURITY;
D O I
10.1109/TSC.2017.2757467
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption (SE) has been a promising technology which allows users to perform search queries over encrypted data. However, the most of existing SE schemes cannot deal with the shared records that have hierarchical structures. In this paper, we devise a basic cryptographic primitive called as attribute-based keyword search over hierarchical data (ABKS-HD) scheme by using the ciphertext-policy attribute-based encryption (CP-ABE) technique, but this basic scheme cannot satisfy all the desirable requirements of cloud systems. The facts that the single keyword search will yield many irrelevant search results and the revoked users can access the unauthorized data with the old or outdated secret keys make this basic scheme not scale well in practice. To this end, we also propose two improved schemes (ABKS-HD-I, ABKS-HD-II) for the sake of supporting multi-keyword search and user revocation, respectively. In contrast with the state-of-the-art attribute-based keyword search (ABKS) schemes, the computation overhead of our schemes almost linearly increases with the number of users' attributes rather than the number of attributes in systems. Formal security analysis proves that our schemes are secure against both chosen-plaintext attack (CPA) and chosen-keyword attack (CKA) in the random oracle model. Furthermore, empirical study using a real-world dataset shows that our schemes are feasible and efficient in practical applications.
引用
收藏
页码:985 / 998
页数:14
相关论文
共 50 条
  • [31] VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
    Zheng, Qingji
    Xu, Shouhuai
    Ateniese, Giuseppe
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 522 - 530
  • [32] Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing
    Zhang, Yinghui
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    Li, Fenghua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4028 - 4049
  • [33] OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud
    Cui, Jie
    Zhou, Han
    Xu, Yan
    Zhong, Hong
    INFORMATION SCIENCES, 2019, 489 : 63 - 77
  • [34] Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption
    Gu, Ke
    Zhang, Wenbin
    Li, Xiong
    Jia, Weijia
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (01): : 271 - 288
  • [35] Provable secure lightweight attribute-based keyword search for cloud-based Internet of Things networks
    Ali, Mohammad
    Sadeghi, Mohammad-Reza
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (05)
  • [36] A shareable keyword search over encrypted data in cloud computing
    Xu, Li
    Weng, Chi-Yao
    Yuan, Lun-Pin
    Wu, Mu-En
    Tso, Raylin
    Sun, Hung-Min
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (03) : 1001 - 1023
  • [37] Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data
    Shiraly, Danial
    Eslami, Ziba
    Pakniat, Nasrollah
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [38] Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing
    Huang, Qinlong
    Yang, Yixian
    Shen, Mansuo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 72 : 239 - 249
  • [39] A shareable keyword search over encrypted data in cloud computing
    Li Xu
    Chi-Yao Weng
    Lun-Pin Yuan
    Mu-En Wu
    Raylin Tso
    Hung-Min Sun
    The Journal of Supercomputing, 2018, 74 : 1001 - 1023
  • [40] Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing
    Wu, Qing
    Li, Liangjun
    Zhang, Leyou
    Mu, Yi
    Rezaeibagha, Fatemeh
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5533 - 5543