Secure and verifiable multi-keyword searchable encryption scheme in cloud

被引:0
|
作者
Zhang J. [1 ,2 ]
Wu M. [1 ]
Wang J. [3 ,4 ]
Liu P. [3 ,4 ]
Jiang Z. [4 ]
Peng C. [2 ]
机构
[1] School of Information Sciences and Technology, North China University of Technology, Beijing
[2] Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang
[3] Finance and Tax Innovation Department of JD Group, Beijing
[4] School of Computer and Cyber Sciences, Communication University of China, Beijing
来源
关键词
Cloud computing; Multi-keyword search; Q-ABDHE security assumption; Security proof;
D O I
10.11959/j.issn.1000-436x.2021054
中图分类号
学科分类号
摘要
Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers. However, encryption breaks the link- ability between the data. Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors. Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources. To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files. In the meanwhile, it also ensured the integrity check of the outsourced data. Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers. Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes. © 2021, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:139 / 149
页数:10
相关论文
共 19 条
  • [1] AMBRUST M, FOX A, JOSEPH A D, Et al., Above the clouds: a berkeley view of cloud computing, (2009)
  • [2] MELL P M, GRANCE T., The NIST definition of cloud computing, (2011)
  • [3] JULISCH K, HALL M., Security and control in the cloud, Information Security Journal: A Global Perspective, 19, 6, pp. 299-309, (2010)
  • [4] FENG D G, ZHANG M, ZHANG Y, Et al., Study on cloud computing security, Journal of Software, 22, 1, pp. 71-83, (2011)
  • [5] TANG Y, LEE P P C, LUI J C S, Et al., Secure overlay cloud storage with access control and assured deletion, IEEE Transactions on Dependable and Secure Computing, 9, 6, pp. 903-916, (2012)
  • [6] SONG D X, WAGNER D, PERRIG A., Practical techniques for searches on encrypted data, Proceeding 2000 IEEE Symposium on Security and Privacy, pp. 44-55, (2000)
  • [7] BONEH D, CRESCENZO G, OSTROVSKY R, Et al., Public key encryption with keyword search, International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506-522, (2004)
  • [8] GOLLE P, STADDON J, WATERS B., Secure conjunctive keyword search over encrypted data, Proceedings of the 2nd International Conference on Applied Cryptography and Network Security, pp. 31-45, (2004)
  • [9] BALLARD L, KAMARA S, MONROSE F., Achieving efficient conjunctive keyword searches over encrypted data, Proceedings of the 7th International Conference on Information and Communications Security, pp. 414-426, (2005)
  • [10] RYU E K, TAKAGI T., Efficient conjunctive keyword-searchable encryption, Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 409-414, (2007)