Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud

被引:18
作者
Wu, Qing [1 ]
Lai, Taotao [1 ]
Zhang, Leyou [2 ]
Mu, Yi [3 ]
Rezaeibagha, Fatemeh [4 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Automat, Xi'an 710121, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
[3] City Univ Macau, Inst Data Sci, Macau, Peoples R China
[4] Murdoch Univ, Discipline Informat Technol Math & Stat, Perth, Australia
基金
中国国家自然科学基金;
关键词
Searchable encryption; Multi-authority; Multi-cloud; Privacy protection; Consortium blockchain; ACCESS-CONTROL SCHEME; AUTHORITY; EFFICIENT;
D O I
10.1016/j.sysarc.2022.102569
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the arrival of the 5G era, fast and secure data sharing is attracting increased attention. Among of the presented solutions, keyword search plays an important role since it can identify users and search ciphertext without decryption. However, the existing searchable algorithms have many limitations, such as powerful central authority, match processes being only carried out on the cloud server, and center corruption and single point of failure being easy to cause. Presently, the fairness of the keyword search is still a challenge. To solve these problems, we present a multi-authority and multi-cloud keyword search scheme based on the consortium blockchain and attribute-based encryption. Under this framework, multi-cloud block storage technique is used to address the unreliability of cloud servers, where at least two ciphertext files are stored in blocks on multiple cloud servers. It can resist malicious leaks, ciphertext tampering, and deletion of ciphertext by cloud servers. Blockchain allows the proposed scheme to achieve the integrity and correctness of the encrypted data, which also solves the fairness of search results. Furthermore, the scheme realizes privacy protection by hiding the keyword and the access policy in the trapdoor matching process. Finally, the security analyses and performance comparisons show the advantages of the proposed scheme over the existing work.
引用
收藏
页数:12
相关论文
共 44 条
  • [1] Ali M., 2019, SENSORS-BASEL, V20
  • [2] Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT
    Banerjee, Soumya
    Bera, Basudeb
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Khan, Muhammad Khurram
    Rodrigues, Joel J. P. C.
    [J]. COMPUTER COMMUNICATIONS, 2021, 169 : 99 - 113
  • [3] PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
    Belguith, Sana
    Kaaniche, Nesrine
    Laurent, Maryline
    Jemai, Abderrazak
    Attia, Rabah
    [J]. COMPUTER NETWORKS, 2018, 133 : 141 - 156
  • [4] Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control
    Cao, Qiang
    Li, Yanping
    Wu, Zhenqiang
    Miao, Yinbin
    Liu, Jianqing
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (02): : 959 - 989
  • [5] Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
    Cui, Hui
    Wan, Zhiguo
    Deng, Robert H.
    Wang, Guilin
    Li, Yingjiu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) : 409 - 422
  • [6] RETRACTED: E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption (Retracted Article)
    Deepa, N.
    Pandiaraja, P.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (05) : 4877 - 4887
  • [7] Eltayieb N., 2019, J SYST ARCHIT, V98
  • [8] Blockchain-based authentication and authorization for smart city applications
    Esposito, Christian
    Ficco, Massimo
    Gupta, Brij Bhooshan
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (02)
  • [9] Efficient and privacy preserving access control scheme for fog-enabled IoT
    Fan, Kai
    Xu, Huiyue
    Gao, Longxiang
    Li, Hui
    Yang, Yintang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 99 : 134 - 142
  • [10] Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption
    Gorasia, Nikita
    Srikanth, R. R.
    Doshi, Nishant
    Rupareliya, Jay
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 632 - 639