Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage

被引:17
|
作者
Zhang, Kai [1 ]
Jiang, Zhe [1 ]
Ning, Jianting [2 ,3 ]
Huang, Xinyi [2 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 201306, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Security; Encryption; Authorization; Keyword search; Indexes; Eavesdropping; Cloud security; searchable encryption; attribute-based keyword search; subversion-resistant; cryptographic reverse firewall; ENCRYPTION; EFFICIENT;
D O I
10.1109/TIFS.2022.3172627
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure cloud search service allows resource-constrained clients to effectively search over encrypted cloud storage. Towards enabling owner-enforced search authorization, the notion of attribute-based keyword search (ABKS) has been introduced and widely deployed in practice. To enhance traditional security of ABKS, two state-of-the-art solutions are presented to address keyword guessing attacks or setup inconsistency for secret key. Nevertheless, they have not simultaneously considered the following threats to a data user: (i) inconsistent secret key/cipher-index caused by outside dishonest authority and/or data owner; (ii) algorithm substitution attacks (ASA) launched by inside adversarial eavesdropping. These attacks may unfortunately lead to cloud data breach and user information exposure. To tackle such outside and inside threats, we introduce subversion-resistance and consistency for secure and fine-grained cloud document search services. In particular, we propose a consistent ABKS system with cryptographic reverse firewalls (CRF). Technically, we refer to verifiable functional encryption and employ non-interactive zero-knowledge proofs of discrete logarithm equality to ensure strong input consistency for ABKS. In addition, we build a trusted CRF zone for sanitizing algorithm outputs against ASA attacks. Moreover, we formalize the security model and formally prove security of our system. To clarify practical performance, we implement state-of-the-art solutions and our system in real cloud environment based on Enron dataset. The results show that our system achieves more enhanced security properties without obviously sacrificing performance. In particular, our system achieves comparable time and storage cost for document-index encryption and document search, as compared to state-of-the-art solutions.
引用
收藏
页码:1771 / 1784
页数:14
相关论文
共 50 条
  • [1] SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search
    Jiang, Changsong
    Xu, Chunxiang
    Zhang, Zhao
    Chen, Kefei
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 3168 - 3183
  • [2] Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing
    Miao, Yinbin
    Ma, Jianfeng
    Liu, Ximeng
    Li, Xinghua
    Jiang, Qi
    Zhang, Junwei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (06) : 985 - 998
  • [3] Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing
    Chen, Yang
    Li, Wenmin
    Gao, Fei
    Wen, Qiaoyan
    Zhang, Hua
    Wang, Huawei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) : 724 - 735
  • [4] Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data
    Miao, Yinbin
    Deng, Robert H.
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Wu, Hongjun
    Li, Hongwei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) : 1667 - 1680
  • [5] Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services
    Huang, Qinlong
    Wei, Qinglin
    Yan, Guanyu
    Zou, Lin
    Yang, Yixian
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3348 - 3360
  • [6] A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud
    Zhang, Kai
    Liu, Ximeng
    Li, Yanping
    Zhang, Tao
    Yang, Shuhua
    IEEE ACCESS, 2020, 8 : 127845 - 127855
  • [7] A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
    Ameri, Mohammad Hassan
    Delavar, Mahshid
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (03) : 660 - 671
  • [8] Traceable and revocable multi-authority attribute-based keyword search for cloud storage
    Varri, Uma Sankararao
    Pasupuleti, Syam Kumar
    Kadambari, K., V
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 132
  • [9] An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation
    Cui, Yuanbo
    Gao, Fei
    Shi, Yijie
    Yin, Wei
    Panaousis, Emmanouil
    Liang, Kaitai
    IEEE ACCESS, 2020, 8 (08): : 99024 - 99036
  • [10] Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud
    Huang, Qinlong
    Yan, Guanyu
    Yang, Yixian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 678 - 691