Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting

被引:138
作者
Miao, Yinbin [1 ,2 ]
Liu, Ximeng [3 ,4 ]
Choo, Kim-Kwang Raymond [5 ]
Deng, Robert H. [6 ]
Li, Jiguo [7 ]
Li, Hongwei [8 ]
Ma, Jianfeng [1 ,2 ]
机构
[1] Xidian Univ, Dept Cyber Engn, Xian 710071, Peoples R China
[2] State Key Lab Cryptol, POBox 5159, Beijing 100878, Peoples R China
[3] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350117, Peoples R China
[4] Fujian Prov Key Lab Informat Secur Network Syst, Fuzhou 350117, Peoples R China
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Singapore Management Univ, Dept Informat Syst, 80 Stamford Rd, Singapore, Singapore
[7] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
[8] Univ Elect Sci & Technol China, Dept Comp Sci & Engn, Chengdu 610051, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金; 新加坡国家研究基金会;
关键词
Ciphertext-policy attribute-based encryption; shared multi-owner setting; hidden access policy; user tracing; off-line keyword-guessing attack; PUBLIC-KEY ENCRYPTION; EFFICIENT; ATTACKS;
D O I
10.1109/TDSC.2019.2897675
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) facilitates search queries and supports fine-grained access control over encrypted data in the cloud. However, prior CP-ABKS schemes were designed to support unshared multi-owner setting, and cannot be directly applied in the shared multi-owner setting (where each record is accredited by a fixed number of data owners), without incurring high computational and storage costs. In addition, due to privacy concerns on access policies, most existing schemes are vulnerable to off-line keyword-guessing attacks if the keyword space is of polynomial size. Furthermore, it is difficult to identify malicious users who leak the secret keys when more than one data user has the same subset of attributes. In this paper, we present a privacy-preserving CP-ABKS system with hidden access policy in Shared Multi-owner setting (basic ABKS-SM system), and demonstrate how it is improved to support malicious user tracing (modified ABKS-SM system). We then prove that the proposed ABKS-SM systems achieve selective security and resist off-line keyword-guessing attack in the generic bilinear group model. We also evaluate their performance using real-world datasets.
引用
收藏
页码:1080 / 1094
页数:15
相关论文
共 43 条
[11]   Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data [J].
Li, Hongwei ;
Yang, Yi ;
Luan, Tom H. ;
Liang, Xiaohui ;
Zhou, Liang ;
Shen, Xuemin .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (03) :312-325
[12]   ENGINEERING SEARCHABLE ENCRYPTION OF MOBILE CLOUD NETWORKS: WHEN QOE MEETS QOP [J].
Li, Hongwei ;
Liu, Dongxiao ;
Dai, Yuanshun ;
Luan, Tom H. .
IEEE WIRELESS COMMUNICATIONS, 2015, 22 (04) :74-80
[13]   Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage [J].
Li, Hongwei ;
Liu, Dongxia ;
Dai, Yuanshun ;
Luan, Tom H. ;
Shen, Xuemin .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2015, 3 (01) :127-138
[14]   User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage [J].
Li, Jiguo ;
Yao, Wei ;
Han, Jinguang ;
Zhang, Yichen ;
Shen, Jian .
IEEE SYSTEMS JOURNAL, 2018, 12 (02) :1767-1777
[15]   Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage [J].
Li, Jiguo ;
Yan, Hao ;
Zhang, Yichen .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (01) :71-81
[16]   KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage [J].
Li, Jiguo ;
Lin, Xiaonan ;
Zhang, Yichen ;
Han, Jinguang .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) :715-725
[17]   Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing [J].
Li, Jiguo ;
Yao, Wei ;
Zhang, Yichen ;
Qian, Huiling ;
Han, Jinguang .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) :785-796
[18]  
Liang XH, 2007, LECT NOTES COMPUT SC, V4681, P69, DOI 10.1007/978-3-540-77048-0_6
[19]  
Lim J, 2011, LECT NOTES COMPUT SC, V6646, P13, DOI 10.1007/978-3-642-20754-9_3
[20]   White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures [J].
Liu, Zhen ;
Cao, Zhenfu ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (01) :76-88