Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage

被引:17
|
作者
Zhang, Kai [1 ]
Jiang, Zhe [1 ]
Ning, Jianting [2 ,3 ]
Huang, Xinyi [2 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 201306, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Security; Encryption; Authorization; Keyword search; Indexes; Eavesdropping; Cloud security; searchable encryption; attribute-based keyword search; subversion-resistant; cryptographic reverse firewall; ENCRYPTION; EFFICIENT;
D O I
10.1109/TIFS.2022.3172627
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure cloud search service allows resource-constrained clients to effectively search over encrypted cloud storage. Towards enabling owner-enforced search authorization, the notion of attribute-based keyword search (ABKS) has been introduced and widely deployed in practice. To enhance traditional security of ABKS, two state-of-the-art solutions are presented to address keyword guessing attacks or setup inconsistency for secret key. Nevertheless, they have not simultaneously considered the following threats to a data user: (i) inconsistent secret key/cipher-index caused by outside dishonest authority and/or data owner; (ii) algorithm substitution attacks (ASA) launched by inside adversarial eavesdropping. These attacks may unfortunately lead to cloud data breach and user information exposure. To tackle such outside and inside threats, we introduce subversion-resistance and consistency for secure and fine-grained cloud document search services. In particular, we propose a consistent ABKS system with cryptographic reverse firewalls (CRF). Technically, we refer to verifiable functional encryption and employ non-interactive zero-knowledge proofs of discrete logarithm equality to ensure strong input consistency for ABKS. In addition, we build a trusted CRF zone for sanitizing algorithm outputs against ASA attacks. Moreover, we formalize the security model and formally prove security of our system. To clarify practical performance, we implement state-of-the-art solutions and our system in real cloud environment based on Enron dataset. The results show that our system achieves more enhanced security properties without obviously sacrificing performance. In particular, our system achieves comparable time and storage cost for document-index encryption and document search, as compared to state-of-the-art solutions.
引用
收藏
页码:1771 / 1784
页数:14
相关论文
共 50 条
  • [41] Document Attribute-based Keyword Search over Encrypted Data
    Fu, Zhangjie
    Xi, Jie
    Wang, Jin
    Sun, Xingming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 787 - 790
  • [42] Attribute-based keyword search encryption for power data protection
    Zhang, Xun
    Mu, Dejun
    Zhao, Jinxiong
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (02):
  • [43] Verifiable and Privacy-Enhanced Authorized Keyword Search for Mobile Cloud Storage
    Long, Zhentao
    Zhang, Kai
    Li, Jinguo
    Wu, Pengfei
    Ning, Jianting
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 7348 - 7359
  • [44] Secure attribute-based data sharing for resource-limited users in cloud computing
    Li, Jin
    Zhang, Yinghui
    Chen, Xiaofeng
    Xiang, Yang
    COMPUTERS & SECURITY, 2018, 72 : 1 - 12
  • [45] Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization
    Chen, E.
    Zhu, Yan
    Liang, Kaitai
    Yin, Hongjian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 579 - 594
  • [46] A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
    Guo, Lifeng
    Li, Zhihao
    Yau, Wei-Chuen
    Tan, Syh-Yuan
    IEEE ACCESS, 2020, 8 : 26107 - 26118
  • [47] Lightweight Attribute-based Keyword Search with Policy Protection for Cloud-assisted IoT
    Sun, Jianfei
    Xiong, Hu
    Deng, Robert H.
    Zhang, Yinghui
    Liu, Ximeng
    Cao, Mingsheng
    2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 25 - 32
  • [48] Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing
    Huang, Qinlong
    Yan, Guanyu
    Wei, Qinglin
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (02) : 957 - 968
  • [49] Verifiable and Boolean keyword searchable attribute-based signcryption for electronic medical record storage and retrieval in cloud computing environment
    Bera, Sourav
    Prasad, Suryakant
    Rao, Y. Sreenivasa
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (18) : 20324 - 20382
  • [50] A Secure Attribute Based Keyword Search Scheme Against Keyword Guessing Attack
    Yousefipoor, Vahid
    Ameri, Mohammad Hassan
    Mohajeri, Javad
    Eghlidos, Taraneh
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 124 - 128