Multi-user Attribute Based Searchable Encryption

被引:20
作者
Kaushik, Kulvaibhav [1 ]
Varadharajan, Vijayaraghavan [1 ]
Nallusamy, Rajarathnam [1 ]
机构
[1] Infosys Ltd, Infosys Labs, Convergence Lab, Bangalore 560100, Karnataka, India
来源
2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2 | 2013年
关键词
D O I
10.1109/MDM.2013.94
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Globalized services economy is increasingly adopting cloud computing in which applications, platforms, and infrastructre are available as services. Huge volume of data including sensitive data is outsourced and stored remotely in public clouds. There is a need for efficient protection of the privacy and security of users and their data without affecting its utility to authorized users. There needs to be a trade-off between data security and availability. Multi user encryption schemes provide partial solution by encrypting data and managing keys efficiently among the users but exposing the entire data accessible to all the users. But, in certain applications, the data need to be accessed by only specified users and they shall have access to only specifed parts of the data on a need to know basis. Ciphertext policy attribute based encryption supports keyword based search but require large amount of data for a single keyword thereby increasing the size and hence the cost of storage on the cloud. In this paper, we have proposed an encryption scheme which requires less storage space on the cloud but provides fine grained access control to authorized users. This is a hybrid scheme that combines the strenghts of both attribute based encryption and searchable encryption.
引用
收藏
页码:200 / 205
页数:6
相关论文
共 13 条
[1]  
[Anonymous], 2006, C COMP COMM SEC ACM
[2]  
[Anonymous], LNCS
[3]  
[Anonymous], 2007, IEEE S SEC PRIV
[4]  
[Anonymous], ACM C COMP COMM SEC
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]  
*CERT RES, 2000, ELL CURV CRYPT VERS
[7]  
Changyu Dong, 2008, LECT NOTES COMPUTER
[8]  
Gavriloaie R, 2004, LECT NOTES COMPUT SC, V3053, P342
[9]  
Kamara S., 2010, P FIN CRYPT WORKSH R
[10]  
Padma B., 2010, INT J COMPUTER SCI E, V2, P1904