Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing

被引:4
作者
Li, Yuan [1 ]
Wang, Haiyan [2 ]
Wang, Shulan [3 ]
Ding, Yong [1 ,4 ]
机构
[1] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen, Peoples R China
[2] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen, Peoples R China
[3] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen, Peoples R China
[4] Guangxi Key Lab Cryptog Informat Secur, Guilin, Peoples R China
来源
2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC) | 2021年
基金
中国国家自然科学基金;
关键词
multi-keyword search; multi-search mechanism; LSSS matrix; 0; 1-coding theory; chosen-keyword attack; cloud computing; KEYWORD SEARCH;
D O I
10.1109/DSC49826.2021.9346237
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread application of cloud computing technology, data privacy security problem becomes more serious. The recent studies related to searchable encryption (SE) area have shown that the data owners can share their private data with efficient search function and high-strength security. However, the search method has yet to be perfected, compared with the plaintext search mechanism. In this paper, based LSSS matrix, we give a new searchable algorithm, which is suitable for many search method, such as exact search, Boolean search and range search. In order to improve the search efficiency, the 0, 1-coding theory is introduced in the process of ciphertext search. Meanwhile it is shown that multi-search mechanism can improve the efficiency of data sharing. Finally, the performance analysis is presented, which prove our scheme is secure, efficient, and human-friendly.
引用
收藏
页数:8
相关论文
共 41 条
[1]   A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage [J].
Ahuja, Rohit ;
Mohanty, Sraban Kumar .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) :32-44
[2]  
[Anonymous], 2004, NDSS
[3]  
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[4]   Linear Secret-Sharing Schemes for Forbidden Graph Access Structures [J].
Beimel, Amos ;
Farras, Oriol ;
Mintz, Yuval ;
Peter, Naty .
THEORY OF CRYPTOGRAPHY, TCC 2017, PT II, 2017, 10678 :394-423
[5]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]   Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Wang, Xiaofen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) :789-798
[8]   SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs [J].
Cheng, Lichen ;
Liu, Jiqiang ;
Xu, Guangquan ;
Zhang, Zonghua ;
Wang, Hao ;
Dai, Hong-Ning ;
Wu, Yulei ;
Wang, Wei .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2019, 6 (06) :1373-1385
[9]   Amazon Elastic Compute Cloud (EC2) versus In-House HPC Platform: A Cost Analysis [J].
Emeras, Joseph ;
Varrette, Sebastien ;
Plugaru, Valentin ;
Bouvry, Pascal .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2019, 7 (02) :456-468
[10]   M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices [J].
Gao, Chongzhi ;
Lv, Siyi ;
Wei, Yu ;
Wang, Zhi ;
Liu, Zheli ;
Cheng, Xiaochun .
IEEE ACCESS, 2018, 6 :38860-38869