A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments

被引:13
作者
Mihailescu, Marius Iulian [1 ]
Nita, Stefania Loredana [2 ]
机构
[1] Spiru Haret Univ Bucharest, Sci Res Ctr Math & Comp Sci, Bucharest 030045, Romania
[2] Ferdinand I Mil Tech Acad, Dept Comp & Cyber Secur, Bucharest 050141, Romania
关键词
applied cryptography; theoretical cryptography; information security; cybersecurity; searchable encryption; KEYWORD SEARCH;
D O I
10.3390/cryptography6010008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing offers the possibility of providing suitable access within a network for a set of resources. Many users use different services for outsourcing their data within the cloud, saving and mitigating the local storage and other resources involved. One of the biggest concerns is represented by storing sensitive data on remote servers, which can be found to be extremely challenging within different situations related to privacy. Searchable Encryption (SE) represents a particular case of Fully Homomorphic Encryption (FHE) and at the same time represents a method composed from a set of algorithms meant to offer protection for users' sensitive data, while it preserves the searching functionality on the server-side. There are two main types of SE: Searchable Symmetric Encryption (SSE), where the ciphertexts and trapdoors for searching are performed using private key holders, and Public Key Searchable Encryption (PKSE), in which a specific number of users have the public key based on which are capable of outputting ciphertexts and giving the possibility of producing the trapdoors by using the private key from the holder. In this article, we propose a searchable encryption system that uses biometric authentication. Additionally, biometric data are used in the trapdoor generation process, such that an unauthorized user cannot submit search queries. The proposed system contains three components: classic user authentication (based on username, password, and a message with a code using short message service (SMS), biometric authentication, and the searchable encryption scheme. The first two components can be seen as two-factor authentication (2FA), and the second component represents the initialization step of the searchable encryption scheme. In the end, we show and demonstrate that the proposed scheme can be implemented with success for medium to complex network infrastructures. We have granted special attention to the trapdoor function, which generates a value that can be used to perform the search process and search function that is based on the trapdoor pair for searching within the index structure. We provide the correctness and security proof of the operations, which gives us the guarantee that the cloud servers return the correct documents. Additionally, we discuss measuring the performance of the authentication scheme in terms of performance indicators, introducing two indicators for measuring purposes-namely, cloud average number of non-legitim the user actions for cloud purposes (C-ANNL) and cloud average number of legitim user actions (C-ANLU).
引用
收藏
页数:22
相关论文
共 56 条
  • [1] A Survey on Homomorphic Encryption Schemes: Theory and Implementation
    Acar, Abbas
    Aksu, Hidayet
    Uluagac, A. Selcuk
    Conti, Mauro
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [2] [Anonymous], 2021, ENISA Threat Landscape-The year in review
  • [3] On Secret Sharing with Newton's Polynomial for Multi-Factor Authentication
    Bezzateev, Sergey
    Davydov, Vadim
    Ometov, Aleksandr
    [J]. CRYPTOGRAPHY, 2020, 4 (04) : 1 - 11
  • [4] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [5] A Survey of Provably Secure Searchable Encryption
    Bosch, Christoph
    Hartel, Pieter
    Jonker, Willem
    Peter, Andreas
    [J]. ACM COMPUTING SURVEYS, 2015, 47 (02)
  • [6] Performance evaluation of continuous authentication systems
    Bours, Patrick
    Mondal, Soumik
    [J]. IET BIOMETRICS, 2015, 4 (04) : 220 - 226
  • [7] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
  • [8] Cachet C., 2020, CRYPTOLOGY EPRINT AR
  • [9] A Blockchain-Based Mutual Authentication Scheme for Collaborative Edge Computing
    Cheng, Guanjie
    Chen, Yan
    Deng, Shuiguang
    Gao, Honghao
    Yin, Jianwei
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 9 (01) : 146 - 158
  • [10] How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability
    Chi, Po-Wen
    Wang, Ming-Hung
    Shiu, Hung-, Jr.
    [J]. IEEE ACCESS, 2020, 8 : 89866 - 89881