Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage

被引:17
|
作者
Zhang, Kai [1 ]
Jiang, Zhe [1 ]
Ning, Jianting [2 ,3 ]
Huang, Xinyi [2 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 201306, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Security; Encryption; Authorization; Keyword search; Indexes; Eavesdropping; Cloud security; searchable encryption; attribute-based keyword search; subversion-resistant; cryptographic reverse firewall; ENCRYPTION; EFFICIENT;
D O I
10.1109/TIFS.2022.3172627
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure cloud search service allows resource-constrained clients to effectively search over encrypted cloud storage. Towards enabling owner-enforced search authorization, the notion of attribute-based keyword search (ABKS) has been introduced and widely deployed in practice. To enhance traditional security of ABKS, two state-of-the-art solutions are presented to address keyword guessing attacks or setup inconsistency for secret key. Nevertheless, they have not simultaneously considered the following threats to a data user: (i) inconsistent secret key/cipher-index caused by outside dishonest authority and/or data owner; (ii) algorithm substitution attacks (ASA) launched by inside adversarial eavesdropping. These attacks may unfortunately lead to cloud data breach and user information exposure. To tackle such outside and inside threats, we introduce subversion-resistance and consistency for secure and fine-grained cloud document search services. In particular, we propose a consistent ABKS system with cryptographic reverse firewalls (CRF). Technically, we refer to verifiable functional encryption and employ non-interactive zero-knowledge proofs of discrete logarithm equality to ensure strong input consistency for ABKS. In addition, we build a trusted CRF zone for sanitizing algorithm outputs against ASA attacks. Moreover, we formalize the security model and formally prove security of our system. To clarify practical performance, we implement state-of-the-art solutions and our system in real cloud environment based on Enron dataset. The results show that our system achieves more enhanced security properties without obviously sacrificing performance. In particular, our system achieves comparable time and storage cost for document-index encryption and document search, as compared to state-of-the-art solutions.
引用
收藏
页码:1771 / 1784
页数:14
相关论文
共 50 条
  • [21] Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage
    Yu, Yong
    Li, Yannan
    Yang, Bo
    Susilo, Willy
    Yang, Guomin
    Bai, Jian
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (02) : 377 - 390
  • [22] AKSER: Attribute-based keyword search with efficient revocation in cloud computing
    Cui, Jie
    Zhou, Han
    Zhong, Hong
    Xu, Yan
    INFORMATION SCIENCES, 2018, 423 : 343 - 352
  • [23] ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map
    Khan, Shawal
    Khan, Shahzad
    Zareei, Mahdi
    Alanazi, Faisal
    Kama, Nazri
    Alam, Masoom
    Anjum, Adeel
    IEEE ACCESS, 2021, 9 : 46313 - 46324
  • [24] Attribute-Based Management of Secure Kubernetes Cloud Bursting
    Femminella, Mauro
    Palmucci, Martina
    Reali, Gianluca
    Rengo, Mattia
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 1276 - 1298
  • [25] OO-ABMS: Online/Offline-Aided Attribute-Based Multi-Keyword Search
    Khan, Shahzad
    Zareei, Mahdi
    Khan, Shawal
    Alanazi, Faisal
    Alam, Masoom
    Waheed, Abdul
    IEEE ACCESS, 2021, 9 : 114392 - 114406
  • [26] Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    IEEE SYSTEMS JOURNAL, 2018, 12 (02): : 1731 - 1742
  • [27] Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
    Chen, Yanli
    Hu, Yuanyuan
    Zhu, Minhui
    Yang, Geng
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (08) : 1798 - 1808
  • [28] Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage
    Huang, Cheng
    Liu, Dongxiao
    Yang, Anjia
    Lu, Rongxing
    Shen, Xuemin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) : 353 - 371
  • [29] KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption
    Chaudhari, Payal
    Das, Manik Lal
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) : 1036 - 1044
  • [30] Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data
    He, Kai
    Guo, Jun
    Weng, Jian
    Weng, Jiasi
    Liu, Joseph K.
    Yi, Xun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1207 - 1217