Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing

被引:17
作者
Varri, Uma Sankararao [1 ,2 ]
Pasupuleti, Syam Kumar [2 ]
Kadambari, K., V [1 ]
机构
[1] Natl Inst Technol, Warangal, Andhra Pradesh, India
[2] Inst Dev & Res Banking Technol, Hyderabad, India
来源
2020 20TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2020) | 2020年
关键词
Attribute-based searchable encryption; Cloud security; Data privacy; Key-escrow problem; Policy update;
D O I
10.1109/CCGrid49817.2020.00-48
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based searchable encryption (ABSE) schemes provide searchability and fine-grained access control over encrypted data in the cloud. Although prior ABSE schemes are designed to provide data protection and retrieval efficiency, they are suffering from the following issues. 1) A key-escrow problem, which may lead to the misuse of the user's secret key. 2) A single keyword search, which may produce irrelevant search results and also vulnerable in real-world applications. 3) A static policy update mechanism, which incurs high computation and communication overheads. In this paper, we propose a novel ABSE scheme called a key-escrow free attribute-based multi-keyword search with dynamic policy updates in cloud computing (KAMS-PU) to addresses all the above-stated issues. The security analysis proves that KAMS-PU is secure against malicious authority attacks and chosen keyword attack (CKA) in the random oracle model. Furthermore, performance analysis proves that KAMS-PU is efficient and practical in real-world applications.
引用
收藏
页码:450 / 458
页数:9
相关论文
共 22 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]  
Cao Q., 2019, WORLD WIDE WEB, V23, P1
[3]   AKSER: Attribute-based keyword search with efficient revocation in cloud computing [J].
Cui, Jie ;
Zhou, Han ;
Zhong, Hong ;
Xu, Yan .
INFORMATION SCIENCES, 2018, 423 :343-352
[4]   Attribute-based Keyword Search Efficiency Enhancement Via an Online/Offline Approach [J].
Dong, Qiuxiang ;
Guan, Zhi ;
Chen, Zhong .
2015 IEEE 21ST INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2015, :298-305
[5]  
Goh E.-J., 2003, Report 2003/216
[6]   Expressive attribute-based keyword search with constant-size ciphertext [J].
Han, Jinguang ;
Yang, Ye ;
Liu, Joseph K. ;
Li, Jiguo ;
Liang, Kaitai ;
Shen, Jian .
SOFT COMPUTING, 2018, 22 (15) :5163-5177
[7]  
Kalapatapu A, 2012, CLOUD COMPUTING: METHODOLOGY, SYSTEMS, AND APPLICATIONS, P3
[8]   TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud [J].
Li, Jian ;
Ma, Ruhui ;
Guan, Haibing .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (01) :126-139
[9]   KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage [J].
Li, Jiguo ;
Lin, Xiaonan ;
Zhang, Yichen ;
Han, Jinguang .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) :715-725
[10]  
[李双 Li Shuang], 2014, [计算机学报, Chinese Journal of Computers], V37, P1017