Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data

被引:1
|
作者
Shen, Hua [1 ]
Zhou, Jian [1 ]
Wu, Ge [2 ]
Zhang, Mingwu [1 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan 430068, Peoples R China
[2] Southeast Univ, Sch Cyber Sci Engn, Nanjing 211189, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; attribute-based encryption; linear secret sharing; attribute revocation; EFFICIENT;
D O I
10.1109/ACCESS.2023.3334733
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The convenience and efficient management of cloud servers have resulted in an increasing number of users opting to store their data in the cloud. Consequently, data-outsourcing services relying on cloud servers have been extensively deployed and utilized. In this case, before outsourcing the data to cloud storage, we should ensure unauthorized users cannot access the data. In this article, we present a scheme termed MKSABE-VaAR (multi-keyword searchable attribute-based encryption with verification and attribute revocation). Aiming at the problems of inefficiency, excessive computation in the search process, and only supporting single-keyword search in most attribute-based searchable encryption schemes, first, we package multiple keywords into a polynomial to realize multi-keyword search. Based on this polynomial, MKSABE-VaAR can reduce the amount of search calculation for keyword ciphertext and improve search efficiency by reducing the number of bilinear pairing operations. At the same time, we have made some special constructs for indexing to add verification of user attributes in the keyword search process, which improves the search accuracy. Moreover, we adopt a linear secret-sharing technique to construct the attribute revocation function of MKSABE-VaAR, making a lower computational cost of attribute revocation. Furthermore, the mechanism of storing data and indexes separately greatly reduces the risk of data leakage of MKSABE-VaAR.
引用
收藏
页码:139715 / 139727
页数:13
相关论文
共 50 条
  • [41] Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage
    Wang, Shangping
    Zhang, Duo
    Zhang, Yaling
    Liu, Lihua
    IEEE ACCESS, 2018, 6 : 30444 - 30457
  • [42] Protecting data in cloud environment with attribute-based encryption
    Zhu, Shuaishuai
    Yang, Xiaoyuan
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (02) : 91 - 97
  • [43] Improved Searchable Attribute Based Encryption in Cloud
    Sangeetha, D.
    Vaidehi, V.
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 823 - 836
  • [44] Attribute-Based Encryption Scheme With High Efficient Revocation in Cloud Computing Environment
    Chen H.-S.
    Shen Q.-L.
    2018, Beijing University of Posts and Telecommunications (41): : 113 - 118
  • [45] Attribute-Based Searchable Encryption With Forward Security for Cloud-Assisted IoT
    Ghopur, Dilxat
    IEEE ACCESS, 2024, 12 : 90840 - 90852
  • [46] Expressive Ciphertext Policy Attribute-Based Searchable Encryption for Medical Records in Cloud
    Wu, Qing
    Ma, Xujin
    Zhang, Leyou
    Chen, Yanru
    Ma, Xujin (mxj419@126.com), 1600, Femto Technique Co., Ltd. (23): : 461 - 472
  • [47] Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage
    Wang, Shangping
    Zhang, Xiaoxue
    Zhang, Yaling
    PLOS ONE, 2016, 11 (11):
  • [48] DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
    Nasiraee, H.
    Ashouri-Talouki, M.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2019, 32 (09): : 1290 - 1298
  • [49] Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 : 112 - 123
  • [50] Hierarchy Attribute-Based Encryption Scheme to Support Direct Revocation in Cloud Storage
    Jiang Shuci
    Guo Weibin
    Fan Guisheng
    2017 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS 2017), 2017, : 869 - 874