FELT-ABKS: Fog-Enabled Lightweight Traceable Attribute-Based Keyword Search Over Encrypted Data

被引:15
作者
Varri, Uma Sankararao [1 ]
Kasani, Sreekanth [2 ]
Pasupuleti, Syam Kumar [3 ]
Kadambari, K., V [1 ]
机构
[1] Natl Inst Technol Warangal, Dept Comp Sci & Engn, Warangal 506004, Andhra Pradesh, India
[2] Univ Hyderabad, Dept Comp Sci & Engn, Hyderabad 500046, India
[3] Inst Dev & Res Banking Technol, Ctr Cloud Comp, Hyderabad 500057, India
关键词
Cloud computing; Keyword search; Encryption; Access control; Computational modeling; Medical services; Internet of Things; Attribute-based keyword search (ABKS); fog computing; lightweight computation; revocation; traceability; PUBLIC-KEY ENCRYPTION;
D O I
10.1109/JIOT.2021.3139148
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based keyword search (ABKS) achieves privacy-preserving keyword search and fine-grained access control over encrypted data in the cloud. However, existing ABKS schemes cannot be directly applied for resource-constrained (such as Internet of Things) devices due to heavy computation overhead. In addition, identifying the malicious user who misuses the secret key is difficult if more than one user is having the same set of attributes. Furthermore, user revocation and attribute revocation are two important challenges in real-world applications. To address these challenges, this article proposes a FELT-ABKS: fog-enabled lightweight traceable ABKS over encrypted data by using ciphertext-policy ABKS to realize keyword search and fine-grained access control. FELT-ABKS achieves minimal computation cost at end users by transferring maximum computation to fog nodes. Furthermore, FELT-ABKS traces the malicious users who misuse their secret key. Besides, it supports user revocation and attribute revocation. The security analysis proves that FELT-ABKS is secure against the chosen keyword attack, chosen-plaintext attack, and modify secret key attack. Finally, experiments demonstrate that FELT-ABKS is lightweight and feasible.
引用
收藏
页码:7559 / 7571
页数:13
相关论文
共 27 条
[1]   A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage [J].
Ameri, Mohammad Hassan ;
Delavar, Mahshid ;
Mohajeri, Javad ;
Salmasizadeh, Mahmoud .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (03) :660-671
[2]  
[Anonymous], ENRON DATA SET
[3]  
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]   Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation [J].
Cash, David ;
Jaeger, Joseph ;
Jarecki, Stanislaw ;
Jutla, Charanjit ;
Krawczyk, Hugo ;
Rosu, Marcel-Catalin ;
Steine, Michael .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[6]  
Chai Q, 2012, IEEE ICC
[7]   Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage [J].
Chen, Rongmao ;
Mu, Yi ;
Yang, Guomin ;
Guo, Fuchun ;
Wang, Xiaofen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) :789-798
[8]   Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage [J].
Du, Minxin ;
Wang, Qian ;
He, Meiqi ;
Weng, Jian .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2320-2332
[9]   Semantic-Aware Searching Over Encrypted Data for Cloud Computing [J].
Fu, Zhangjie ;
Xia, Lili ;
Sun, Xingming ;
Liu, Alex X. ;
Xie, Guowu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2359-2371
[10]   Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement [J].
Fu, Zhangjie ;
Wu, Xinle ;
Guan, Chaowen ;
Sun, Xingming ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2706-2716