Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting

被引:138
作者
Miao, Yinbin [1 ,2 ]
Liu, Ximeng [3 ,4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. [6 ]
Li, Jiguo [7 ]
Li, Hongwei [8 ]
Ma, Jianfeng [1 ,2 ]
机构
[1] Xidian Univ, Dept Cyber Engn, Xian 710071, Peoples R China
[2] State Key Lab Cryptol, POBox 5159, Beijing 100878, Peoples R China
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350117, Peoples R China
[4] Fujian Prov Key Lab Informat Secur Network Syst, Fuzhou 350117, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Dept Informat Syst, 80 Stamford Rd, Singapore, Singapore
[7] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
[8] Univ Elect Sci & Technol China, Dept Comp Sci & Engn, Chengdu 610051, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金; 新加坡国家研究基金会;
关键词
Ciphertext-policy attribute-based encryption; shared multi-owner setting; hidden access policy; user tracing; off-line keyword-guessing attack; PUBLIC-KEY ENCRYPTION; EFFICIENT; ATTACKS;
D O I
10.1109/TDSC.2019.2897675
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and supports fine-grained access control over encrypted data in the cloud. However, prior CP-ABKS schemes were designed to support unshared multi-owner setting, and cannot be directly applied in the shared multi-owner setting (where each record is accredited by a fixed number of data owners), without incurring high computational and storage costs. In addition, due to privacy concerns on access policies, most existing schemes are vulnerable to off-line keyword-guessing attacks if the keyword space is of polynomial size. Furthermore, it is difficult to identify malicious users who leak the secret keys when more than one data user has the same subset of attributes. In this paper, we present a privacy-preserving CP-ABKS system with hidden access policy in Shared Multi-owner setting (basic ABKS-SM system), and demonstrate how it is improved to support malicious user tracing (modified ABKS-SM system). We then prove that the proposed ABKS-SM systems achieve selective security and resist off-line keyword-guessing attack in the generic bilinear group model. We also evaluate their performance using real-world datasets.
引用
收藏
页码:1080 / 1094
页数:15
相关论文
共 43 条
  • [1] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [2] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [3] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [4] Server-Aided Public Key Encryption With Keyword Search
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Huang, Xinyi
    Wang, Xiaofen
    Wang, Yongjun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2833 - 2842
  • [5] Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 789 - 798
  • [6] Attribute-based Keyword Search Efficiency Enhancement Via an Online/Offline Approach
    Dong, Qiuxiang
    Guan, Zhi
    Chen, Zhong
    [J]. 2015 IEEE 21ST INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2015, : 298 - 305
  • [7] Public key encryption with keyword search secure against keyword guessing attacks without random oracle
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    [J]. INFORMATION SCIENCES, 2013, 238 : 221 - 241
  • [8] Herranz J, 2010, LECT NOTES COMPUT SC, V6056, P19
  • [9] Layouni M, 2008, LECT NOTES COMPUT SC, V5308, P387, DOI 10.1007/978-3-540-88625-9_26
  • [10] Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds
    Li, Hongwei
    Liu, Dongxiao
    Dai, Yuanshun
    Luan, Tom H.
    Yu, Shui
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2018, 6 (01) : 97 - 109