Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing

被引:90
|
作者
Miao, Yinbin [1 ]
Ma, Jianfeng [1 ]
Liu, Ximeng [2 ]
Li, Xinghua [1 ]
Jiang, Qi [1 ]
Zhang, Junwei [1 ]
机构
[1] Xidian Univ, Dept Cyber Engn, Xian 710071, Peoples R China
[2] Singapore Management Univ, Dept Informat Syst, 80 Stamford Rd, Singapore 188065, Singapore
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud computing; Keyword search; Logic gates; Encryption; Servers; Searchable encryption; hierarchical structures; ciphertext-policy attribute-based encryption; chosen-plaintext attack; chosen-keyword attack; RANKED SEARCH; ENCRYPTION; SECURITY;
D O I
10.1109/TSC.2017.2757467
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption (SE) has been a promising technology which allows users to perform search queries over encrypted data. However, the most of existing SE schemes cannot deal with the shared records that have hierarchical structures. In this paper, we devise a basic cryptographic primitive called as attribute-based keyword search over hierarchical data (ABKS-HD) scheme by using the ciphertext-policy attribute-based encryption (CP-ABE) technique, but this basic scheme cannot satisfy all the desirable requirements of cloud systems. The facts that the single keyword search will yield many irrelevant search results and the revoked users can access the unauthorized data with the old or outdated secret keys make this basic scheme not scale well in practice. To this end, we also propose two improved schemes (ABKS-HD-I, ABKS-HD-II) for the sake of supporting multi-keyword search and user revocation, respectively. In contrast with the state-of-the-art attribute-based keyword search (ABKS) schemes, the computation overhead of our schemes almost linearly increases with the number of users' attributes rather than the number of attributes in systems. Formal security analysis proves that our schemes are secure against both chosen-plaintext attack (CPA) and chosen-keyword attack (CKA) in the random oracle model. Furthermore, empirical study using a real-world dataset shows that our schemes are feasible and efficient in practical applications.
引用
收藏
页码:985 / 998
页数:14
相关论文
共 50 条
  • [41] A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search
    Li, Hongbo
    Huang, Qiong
    Susilo, Willy
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1532 - 1543
  • [42] Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Xia, Jinyue
    Szalachowski, Pawel
    Fang Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2787 - 2800
  • [43] ABDKS: attribute-based encryption with dynamic keyword search in fog computing
    Meng, Fei
    Cheng, Leixiao
    Wang, Mingqiang
    FRONTIERS OF COMPUTER SCIENCE, 2021, 15 (05)
  • [44] Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
    Chen, Yanli
    Hu, Yuanyuan
    Zhu, Minhui
    Yang, Geng
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (08) : 1798 - 1808
  • [45] ABDKS: attribute-based encryption with dynamic keyword search in fog computing
    Fei Meng
    Leixiao Cheng
    Mingqiang Wang
    Frontiers of Computer Science, 2021, 15
  • [46] Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification
    Ge, Xinrui
    Yu, Jia
    Zhang, Hanlin
    Hu, Chengyu
    Li, Zengpeng
    Qin, Zhan
    Hao, Rong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 490 - 504
  • [47] ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data
    Luo, Fucai
    Wang, Haiyan
    Lin, Changlu
    Yan, Xingfu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4970 - 4983
  • [48] Comment on "Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing"
    Cao, Zhengjun
    Markowitch, Olivier
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (02) : 392 - 393
  • [49] Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud
    Wu, Qing
    Lai, Taotao
    Zhang, Leyou
    Mu, Yi
    Rezaeibagha, Fatemeh
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 129
  • [50] Privacy-Protecting Attribute-Based Conjunctive Keyword Search Scheme in Cloud Storage
    Chen, Yang
    Liu, Yang
    Pan, Jin
    Gao, Fei
    Panaousis, Emmanouil
    JOURNAL OF INTERNET TECHNOLOGY, 2023, 24 (01): : 65 - 75