Provably secure public key encryption with keyword search for data outsourcing in cloud environments

被引:9
|
作者
Ghosh, Sudeep [1 ,2 ]
Islam, S. K. Hafizul [2 ]
Bisht, Abhishek [3 ]
Das, Ashok Kumar [3 ]
机构
[1] Guru Nanak Inst Technol, Dept Informat Technol, Kolkata 700114, W Bengal, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani 741235, W Bengal, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
关键词
Cloud server; Data outsourcing; Keyword search; Public key encryption; Probable security; RANKED SEARCH; ENABLING EFFICIENT; DESIGNATED TESTER; SCHEME; PRIVACY; ATTACKS;
D O I
10.1016/j.sysarc.2023.102876
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent days, the application of cloud computing has been gaining significant popularity among people. A considerable amount of data are being stored in the cloud server. However, data owners outsource their encrypted data to the cloud for various security reasons. Unfortunately, encrypted data cannot be searched, like plaintext data. So how to search encrypted data is an interesting problem in this era. Many public key encryption with keyword search (PEKS) schemes have been designed in the literature. However, most of them cannot prevent keyword-guessing attacks. In this paper, we develop a provably secure PEKS scheme in the random oracle model. This scheme may be used for secure email access from an email server containing a list of encrypted keywords. The proposed scheme can resist keyword-guessing attacks, and offer ciphertext and trapdoor indistinguishability properties. We use the data owner's private key during encryption to prevent keyword-guessing attacks. Using the data owner's public key in the verification phase ensures the resilience of keyword-guessing attacks. Finally, the proposed scheme has been tested on a real testbed, and the results show that it can be used in the cloud computing scenario to search for keywords on encrypted data.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
    Rhee, Hyun Sook
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 69 - 85
  • [42] Provably secure timed-release public key encryption
    Cheon, Jung Hee
    Hopper, Nicholas
    Kim, Yongdae
    Osipkov, Ivan
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (02)
  • [43] Provably secure and efficient escrowable public key encryption schemes
    Liu, Wen-Hao
    Wang, Sheng-Bao
    Cao, Zhen-Fu
    Han, Li-Dong
    Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 33 - 37
  • [44] Secure keyword search using dual encryption in cloud computing
    Tariq H.
    Agarwal P.
    International Journal of Information Technology, 2020, 12 (4) : 1063 - 1072
  • [45] SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks
    Chen, Yu-Chi
    COMPUTER JOURNAL, 2015, 58 (04): : 922 - 933
  • [46] Public-Key Encryption with Registered Keyword Search
    Tang, Qiang
    Chen, Liqun
    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 163 - +
  • [47] Public key encryption with conjunctive keyword search on lattice
    Wang, Peng
    Xiang, Tao
    Li, Xiaoguo
    Xiang, Hong
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 51
  • [48] Public key encryption with conjunctive field keyword search
    Park, DJ
    Kim, K
    Lee, PJ
    INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 73 - 86
  • [49] Public Key Encryption with Multi-keyword Search
    Hu, Chengyu
    He, Peng
    Liu, Pengtao
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 568 - +
  • [50] Public key encryption with temporary and fuzzy keyword search
    Vaanchig, Nyamsuren
    Qin, Zhiguang
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 3914 - 3935