Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage

被引:17
|
作者
Zhang, Kai [1 ]
Jiang, Zhe [1 ]
Ning, Jianting [2 ,3 ]
Huang, Xinyi [2 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 201306, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Security; Encryption; Authorization; Keyword search; Indexes; Eavesdropping; Cloud security; searchable encryption; attribute-based keyword search; subversion-resistant; cryptographic reverse firewall; ENCRYPTION; EFFICIENT;
D O I
10.1109/TIFS.2022.3172627
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure cloud search service allows resource-constrained clients to effectively search over encrypted cloud storage. Towards enabling owner-enforced search authorization, the notion of attribute-based keyword search (ABKS) has been introduced and widely deployed in practice. To enhance traditional security of ABKS, two state-of-the-art solutions are presented to address keyword guessing attacks or setup inconsistency for secret key. Nevertheless, they have not simultaneously considered the following threats to a data user: (i) inconsistent secret key/cipher-index caused by outside dishonest authority and/or data owner; (ii) algorithm substitution attacks (ASA) launched by inside adversarial eavesdropping. These attacks may unfortunately lead to cloud data breach and user information exposure. To tackle such outside and inside threats, we introduce subversion-resistance and consistency for secure and fine-grained cloud document search services. In particular, we propose a consistent ABKS system with cryptographic reverse firewalls (CRF). Technically, we refer to verifiable functional encryption and employ non-interactive zero-knowledge proofs of discrete logarithm equality to ensure strong input consistency for ABKS. In addition, we build a trusted CRF zone for sanitizing algorithm outputs against ASA attacks. Moreover, we formalize the security model and formally prove security of our system. To clarify practical performance, we implement state-of-the-art solutions and our system in real cloud environment based on Enron dataset. The results show that our system achieves more enhanced security properties without obviously sacrificing performance. In particular, our system achieves comparable time and storage cost for document-index encryption and document search, as compared to state-of-the-art solutions.
引用
收藏
页码:1771 / 1784
页数:14
相关论文
共 50 条
  • [31] Attribute-based data retrieval with semantic keyword search for e-health cloud
    Yang, Yang
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2015, 4 (04):
  • [32] On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting
    Sun, Jianfei
    Xiong, Hu
    Nie, Xuyun
    Zhang, Yinghui
    Wu, Pengfei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2518 - 2519
  • [33] Expressive attribute-based keyword search with constant-size ciphertext
    Jinguang Han
    Ye Yang
    Joseph K. Liu
    Jiguo Li
    Kaitai Liang
    Jian Shen
    Soft Computing, 2018, 22 : 5163 - 5177
  • [34] An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-Policy Attribute-Based Encryption With Keyword Search
    Gao, Jian
    Zhou, Fucai
    IEEE ACCESS, 2022, 10 : 8184 - 8193
  • [35] Expressive attribute-based keyword search with constant-size ciphertext
    Han, Jinguang
    Yang, Ye
    Liu, Joseph K.
    Li, Jiguo
    Liang, Kaitai
    Shen, Jian
    SOFT COMPUTING, 2018, 22 (15) : 5163 - 5177
  • [36] Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing
    Wu, Qing
    Li, Liangjun
    Zhang, Leyou
    Mu, Yi
    Rezaeibagha, Fatemeh
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5533 - 5543
  • [37] Oblivious Multi-Keyword Search for Secure Cloud Storage Service
    Zhang, Rui
    Xue, Rui
    Liu, Ling
    Zheng, Lijuan
    2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, : 269 - 276
  • [38] An Attribute-Based Keyword Search Scheme for Multiple Data Owners in Cloud-Assisted Industrial Internet of Things
    Yin, Hui
    Li, Yangfan
    Deng, Hua
    Zhang, Wei
    Qin, Zheng
    Li, Keqin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (04) : 5763 - 5773
  • [39] Multiauthority Attribute-Based Keyword Search over Cloud-Edge-End Collaboration in IoV
    Zhen, Yan
    Chui, Yilan
    Zhang, Puning
    Liu, Huan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [40] An attribute-based keyword search for m-Health networks
    Mamta
    Gupta, Brij
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2021, 17 (01) : 21 - 36