A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud Computing

被引:0
作者
Wang, Fan [1 ]
Qin, Zheng [1 ]
Yin, Hui [2 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha, Peoples R China
[2] Changsha Univ, Coll Comp Engn & Appl Math, Changsha, Peoples R China
来源
CYBERSPACE SAFETY AND SECURITY, PT II | 2019年 / 11983卷
基金
中国国家自然科学基金;
关键词
CP-ABE; Access control; Searchable encryption; ENCRYPTION;
D O I
10.1007/978-3-030-37352-8_38
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of the Internet and the Internet of Things has led to a sharp increase in the amount of data. The great advantages of big data have promoted the research and usage of a series of related technologies in various fields. In the field of government, data from various departments is being aggregated to acquire more value which can help to improve the efficiency and quality of public service. Cloud computing, as an infrastructure of big data, is also applied in government big data. However, the sensitivity of government data determines that the data stored in the cloud must be well protected. Meanwhile, fine-grained data sharing is also important for the public services of government. Recently, several searchable attribute-based encryption schemes have been proposed to achieve fine-grained data access control and search on ciphertext simultaneously. Unfortunately, each of them has some imperfections in efficiency or access policy. In this paper, we propose a fine-grained authorized keyword secure search scheme by leveraging the attribute-based encryption primitive, whose access policy supports AND, OR, and threshold gates. We give the concrete construction, rigorous verification of correctness, detailed security analysis, and prove that our solution is efficiency through several experiments.
引用
收藏
页码:432 / 447
页数:16
相关论文
共 50 条
  • [31] Efective Error-Tolerant Keyword Search for Secure Cloud Computing
    杨波
    庞晓琼
    杜军强
    解丹
    Journal of Computer Science & Technology, 2014, 29 (01) : 81 - 89
  • [32] Fine-grained Access Control Scheme Based on Cloud Storage
    Niu, Xiaojie
    2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 512 - 515
  • [33] Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control
    Zhang, Kai
    Wang, Xiwen
    Ning, Jianting
    Gong, Junqing
    Huang, Xinyi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5286 - 5301
  • [34] Effective Error-Tolerant Keyword Search for Secure Cloud Computing
    Yang, Bo
    Pang, Xiao-Qiong
    Du, Jun-Qiang
    Xie, Dan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (01) : 81 - 89
  • [35] Towards secure and fine-grained data sharing over cloud platform
    Song, Fuyuan
    Sun, Xiaowei
    Gao, Yunlong
    Jiang, Qin
    Fu, Zhangjie
    FRONTIERS OF COMPUTER SCIENCE, 2025, 19 (06)
  • [36] Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing
    Liu, Qin
    Peng, Yu
    Jiang, Hongbo
    Wu, Jie
    Wang, Tian
    Peng, Tao
    Wang, Guojun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 4181 - 4195
  • [37] Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
    Qiang Cao
    Yanping Li
    Zhenqiang Wu
    Yinbin Miao
    Jianqing Liu
    World Wide Web, 2020, 23 : 959 - 989
  • [38] Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
    Cao, Qiang
    Li, Yanping
    Wu, Zhenqiang
    Miao, Yinbin
    Liu, Jianqing
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (02): : 959 - 989
  • [39] Fine Grained Key Computation Scheme for Secure Data Sharing in Cloud
    Polson, Deepa Maria
    Sabitha, S.
    Rajasree, M. S.
    2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 1110 - 1116
  • [40] Toward Fine-Grained and Forward-Secure Access Control in Cloud-Assisted IoT
    Deng, Hua
    Yin, Hui
    Qin, Zheng
    Ou, Lu
    Li, Fangmin
    Ge, Ningchao
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (22): : 36569 - 36580