Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing

被引:11
作者
Su, Yaping [1 ]
Wang, Jianfeng [1 ]
Wang, Yunling [1 ]
Miao, Meixia [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710126, Shaanxi, Peoples R China
[2] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Servers; Cloud computing; Encryption; Indexes; Keyword search; Searchable encryption; garbled bloom filter; verifiable search; KEYWORD SEARCH; DATABASE; SECURE; CHALLENGES; SCHEME;
D O I
10.1109/ACCESS.2019.2943971
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of Multi-Key Searchable Encryption (MKSE) enables data owners to outsource their data into a cloud server, while supporting fine-grained data sharing with the authorized users. Note that the traditional MKSE is vulnerable to data leakage. That is, the malicious data owner may collude with the server and recover the search queries of authorized users. Recently, Hamlin et al. (PKC18) presented a new MKSE construction that can ensure data privacy between data owner and authorized users, where the share key is generated depending on data owner, authorized user and the specific document. However, their scheme cannot support verifiable search in the case of the malicious cloud server. In this paper, we propose a new verifiable MKSE (VMKSE) scheme by leveraging Garbled Bloom Filter, which can simultaneously support verifiability of search result and secure data sharing in multi-user setting. Compared to the state-of-the-art solution, the proposed scheme is superior in efficiency and verifiability. The experiment results demonstrate the efficiency of our scheme.
引用
收藏
页码:141352 / 141362
页数:11
相关论文
共 38 条
[21]  
Liu X., IEEE T DEPENDABLE SE
[22]   Verifiable searchable encryption with aggregate keys for data sharing system [J].
Liu, Zheli ;
Li, Tong ;
Li, Ping ;
Ji, Chunfu ;
Li, Jin .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :778-788
[23]   Publicly verifiable database scheme with efficient keyword search [J].
Miao, Meixia ;
Wang, Jianfeng ;
Wen, Sheng ;
Ma, Jianfeng .
INFORMATION SCIENCES, 2019, 475 :18-28
[24]  
Nabil M., 2018, P IEEE INT C COMM IC, P1
[25]  
Popa R. A., 2013, 2013508 IACR CRYPT E
[26]  
Qi Chai, 2012, IEEE International Conference on Communications (ICC 2012), P917, DOI 10.1109/ICC.2012.6364125
[27]   Security Challenges for the Public Cloud [J].
Ren, Kui ;
Wang, Cong ;
Wang, Qian .
IEEE INTERNET COMPUTING, 2012, 16 (01) :69-73
[28]  
Sun WH, 2015, IEEE INFOCOM SER, DOI 10.1109/INFOCOM.2015.7218596
[29]  
van Liesdonk P, 2010, LECT NOTES COMPUT SC, V6358, P87, DOI 10.1007/978-3-642-15546-8_7
[30]  
Van Rompay C., 2018, P IFIP ANN C DAT APP, P263