An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage

被引:0
作者
Libing Wu
Biwen Chen
Sherali Zeadally
Debiao He
机构
[1] Wuhan University,Computer Science
[2] University of Kentucky,The College of Communication and Information
[3] Wuhan University,Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering
来源
Soft Computing | 2018年 / 22卷
关键词
Privacy; Insider keyword guessing attack; File-injection attack; Searchable public key encryption; Secure cloud storage;
D O I
暂无
中图分类号
学科分类号
摘要
In the area of searchable encryption, the searchable public key encryption (SPE) is an attractive technique in secure cloud storage. SPE assures the data confidentiality without affecting the usage of the data stored in the cloud. Furthermore, compared with the symmetric searchable encryption, SPE does not require key distribution and management. We investigate the security of the searchable public key encryption based on the traditional Boneh’s framework. Although existing SPE schemes can enable users to search over encrypted data, most of these schemes are vulnerable to the file-injection attack and the insider keyword guessing attack. To mitigate these attacks, we propose an efficient and secure searchable public key encryption with privacy protection (SPE-PP). We then provide a concrete construction of SPE-PP that uses the Diffie–Hellman shared secret key, and we prove it can resist these attacks. Both the theoretical analysis and the experimental results show that our scheme achieves strong security along with high efficiency.
引用
收藏
页码:7685 / 7696
页数:11
相关论文
共 158 条
  • [1] Abdalla M(2005)Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions Crypto, Springer 3621 205-222
  • [2] Bellare M(2015)Multi-cloud data management using shamir’s secret sharing and quantum byzantine agreement schemes Int J Cloud Appl Comput (IJCAC) 5 35-52
  • [3] Catalano D(2004)Public key encryption with keyword search Eurocrypt, Springer 3027 506-522
  • [4] Kiltz E(2016)Dual-server public-key encryption with keyword search for secure cloud storage IEEE Trans Inf Forensics Secur 11 789-798
  • [5] Kohno T(1976)New directions in cryptography IEEE Trans Inf Theory 22 644-654
  • [6] Lange T(2017)Taxonomy of dos and ddos attacks and desirable defense mechanism in a cloud computing environment Neural Comput Appl 28 3655-3682
  • [7] Malone-Lee J(2017)Cloud-assisted secure video transmission and sharing framework for smart cities Future Gener Comput Syst 83 569-606
  • [8] Neven G(2017)An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks Inf Sci 403 1-14
  • [9] Paillier P(2017)Homomorphic encryption as a service for outsourced images in mobile cloud computing environment Int J Cloud Appl Comput (IJCAC) 7 27-40
  • [10] Shi H(2009)Constructing peks schemes secure against keyword guessing attacks is possible? Comput Commun 32 394-396