KeySea: Keyword-Based Search With Receiver Anonymity in Attribute-Based Searchable Encryption

被引:28
|
作者
Chaudhari, Payal [1 ]
Das, Manik Lal [2 ]
机构
[1] Pandit Deendayal Petr Univ PDPU, Gandhinagar 382007, Gujarat, India
[2] DA IICT, Dhirubhai Ambani Inst Informat & Commun Technol, Gandhinagar 382007, Gujarat, India
关键词
Encryption; Cloud computing; Receivers; Data privacy; Servers; Searchable encryption; attribute-based encryption; data privacy; receiver anonymity;
D O I
10.1109/TSC.2020.2973570
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In modern digital age, enterprise applications typically outsource user data in pubic cloud storage with the objective of availing flexibility and scalability features of cloud infrastructure, and importantly, making business goal more cost effective. Security and privacy concerns pose a challenging task to handle in cloud setup by both service providers and service consumers. In this landscape, before outsourcing the sensitive data on cloud storage, the data should be protected from unauthorized access and the privacy of the users should be preserved as per application requirement. In this article, we present a scheme, termed as KeySea, keyword-based search over attribute-based encrypted data with receiver anonymity. While searching documents pertaining to the target keyword(s), keeping receiver's anonymity and ensuring data privacy are important features in applications like healthcare, bureaucracy, social engineering, and so on. The construction of the KeySea scheme uses the hidden access policy in attribute-based searchable encryption. The KeySea scheme provides a secure and practical solution to address the issue of privacy-preserving search over encrypted data in the public cloud storage. We show the security strengths of the KeySea scheme and its practicality with experimental results.
引用
收藏
页码:1036 / 1044
页数:9
相关论文
共 50 条
  • [11] Attribute-Based Proxy Re-Encryption with Keyword Search
    Shi, Yanfeng
    Liu, Jiqiang
    Han, Zhen
    Zheng, Qingji
    Zhang, Rui
    Qiu, Shuo
    PLOS ONE, 2014, 9 (12):
  • [12] Attribute-based keyword search encryption for power data protection
    Zhang, Xun
    Mu, Dejun
    Zhao, Jinxiong
    HIGH-CONFIDENCE COMPUTING, 2023, 3 (02):
  • [13] Searchable Attribute-Based Proxy Re-encryption: Keyword Privacy, Verifiable Expressive Search, and Outsourced Decryption
    Bera S.
    Rao Y.S.
    SN Computer Science, 5 (5)
  • [14] Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage
    Wang, Shangping
    Jia, Shasha
    Zhang, Yaling
    IEEE ACCESS, 2019, 7 : 50136 - 50147
  • [15] Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data
    Zhang, Yinghui
    Zhu, Tian
    Guo, Rui
    Xu, Shengmin
    Cui, Hui
    Cao, Jin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 971 - 983
  • [16] ELSA: Edge Lightweight Searchable Attribute-based encryption Multi-keyword Scalability
    Aljabri, Jawhara
    Michala, Anna Lito
    Singer, Jeremy
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [17] Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes
    Lin, Je-Kuan
    Lin, Wun-Ting
    Wu, Ja-Ling
    CRYPTOGRAPHY, 2023, 7 (02)
  • [18] Multi-user and Keyword-based Searchable Encryption Scheme
    Zhang, Ya-ling
    Liu, Li-jun
    Wang, Shang-ping
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 223 - 227
  • [19] Attribute-based keyword search encryption scheme for IoT edge environment
    Zhang, Kangjun
    Yuan, Lingyun
    Peng, Xingwei
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 102 - 107
  • [20] Attribute-based Proxy Re-encryption Scheme with Keyword Search
    Liu Zhenhua
    Zhou Peilin
    Duan Shuhong
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 683 - 689