ABDKS: attribute-based encryption with dynamic keyword search in fog computing

被引:15
作者
Meng, Fei [1 ,2 ]
Cheng, Leixiao [3 ]
Wang, Mingqiang [1 ,2 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] Minist Educ, Key Lab Cryptol Technol & Informat Secur, Jinan 250100, Peoples R China
[3] Fudan Univ, Sch Math Sci, Shanghai 200433, Peoples R China
基金
中国国家自然科学基金;
关键词
access control; attribute-based encryption; keyword search; fog computing; outsourcing;
D O I
10.1007/s11704-020-9472-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption with keyword search (ABKS) achieves both fine-grained access control and keyword search. However, in the previous ABKS schemes, the search algorithm requires that each keyword to be identical between the target keyword set and the ciphertext keyword set, otherwise the algorithm does not output any search result, which is not conducive to use. Moreover, the previous ABKS schemes are vulnerable to what we call a peer-decryption attack, that is, the ciphertext may be eavesdropped and decrypted by an adversary who has sufficient authorities but no information about the ciphertext keywords. In this paper, we provide a new system in fog computing, the ciphertext-policy attribute-based encryption with dynamic keyword search (ABDKS). In ABDKS, the search algorithm requires only one keyword to be identical between the two keyword sets and outputs the corresponding correlation which reflects the number of the same keywords in those two sets. In addition, our ABDKS is resistant to peer-decryption attack, since the decryption requires not only sufficient authority but also at least one keyword of the ciphertext. Beyond that, the ABDKS shifts most computational overheads from resource constrained users to fog nodes. The security analysis shows that the ABDKS can resist Chosen-Plaintext Attack (CPA) and Chosen-Keyword Attack (CKA).
引用
收藏
页数:9
相关论文
共 33 条
[1]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[2]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]  
Bonomi F., 2012, P 1 ED MCC WORKSH MO, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
[4]  
Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
[5]   AKC-Based Revocable ABE Schemes from LWE Assumption [J].
Cheng, Leixiao ;
Meng, Fei ;
Meng, Xianmeng ;
Zhang, Qixin .
SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
[6]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[7]   Attribute-Based Encryption with Expressive and Authorized Keyword Search [J].
Cui, Hui ;
Deng, Robert H. ;
Liu, Joseph K. ;
Li, Yingjiu .
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 :106-126
[8]  
Goyal V., 2006, P 13 ACM C COMP COMM, P89, DOI DOI 10.1145/1180405.1180418
[9]  
Horváth M, 2015, LECT NOTES COMPUT SC, V8939, P566, DOI 10.1007/978-3-662-46078-8_47
[10]   Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data [J].
Li, Hongwei ;
Yang, Yi ;
Luan, Tom H. ;
Liang, Xiaohui ;
Zhou, Liang ;
Shen, Xuemin .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (03) :312-325