Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata

被引:4
|
作者
Wang, Jiabei [1 ,2 ]
Zhang, Rui [1 ,2 ]
Li, Jianhao [1 ,2 ]
Xiao, Yuting [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
基金
中国国家自然科学基金;
关键词
Metadata; Servers; Security; Encryption; Keyword search; Authorization; Public key; Searchable encryption; metadata; secure search authorization; full keyword guessing attack; flexibility; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; BLIND SIGNATURE; QUERIES; SCHEME;
D O I
10.1109/TIFS.2022.3163886
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Metadata plays an essential role in facilitating data organizing, finding, and understanding, but it also contains lots of sensitive information about the data and the data users, e.g., the location where a picture was taken. In practice, when sensitive data is encrypted before being uploaded to untrusted public clouds, an oblivious dilemma comes: if the metadata is totally encrypted, and its functionalities no longer exist; otherwise, sensitive information may be leaked. Hence, a secure and flexible mechanism for processing different fields (marked private or public for different scenario needs) of metadata simultaneously is desirable. We searched the literature for methods of achieving such a goal, it turned out that this was not explicitly considered or reasonably solved before. Therefore, in this paper, we investigate the problem of constructing privacy-enhancing metadata, namely, 1) flexible and tamper-resistant metadata setting, 2) owner-enabled secure search authorization with explicit metadata. Based on the concept of public key encryption with keyword search (PEKS), we propose a novel Authorized Keyword Search over Encrypted Data with Metadata scheme (MD-AKS), which firstly well addressed the above demands. We formalize the security model and prove the security of MD-AKS scheme. Our work maximizes the flexibility of metadata setting in two aspects: the associated metadata can be set as an arbitrary string and the costs of clients are independent of explicit metadata's complexity. We implement MD-AKS, the theoretical comparison and experiment results further demonstrate the usability and scalability.
引用
收藏
页码:2746 / 2760
页数:15
相关论文
共 50 条
  • [31] Secure and Efficient Multi-keyword Fuzzy Search Over Encrypted Data on Alliance Chain
    Song, Jimeng
    Shen, Ziqi
    Yu, Han
    Lai, Rongxin
    Li, Yuancheng
    Wang, Qingle
    Li, Jianbin
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2024, 17 (07) : 652 - 665
  • [32] Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing
    Verma, Garima
    Kanrar, Soumen
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (02) : 975 - 996
  • [33] A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
    Xia, Zhihua
    Wang, Xinhui
    Sun, Xingming
    Wang, Qian
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) : 340 - 352
  • [34] BSMFS: Blockchain assisted Secure Multi-keyword Fuzzy Search over Encrypted Data
    Chakraborty, Partha Sarathi
    Chandrawanshi, Mangesh Shivaji
    Kumar, Puspesh
    Tripathy, Somanath
    2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 216 - 221
  • [35] Secure and privacy-preserving keyword search retrieval over hashed encrypted cloud data
    Sathyabalaji, N.
    Komarasamy, G.
    Raja, Daniel Madan S.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (05)
  • [36] Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners
    Yin, Hui
    Qin, Zheng
    Zhang, Jixin
    Ou, Lu
    Li, Fangmin
    Li, Keqin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 689 - 700
  • [37] Secure Encrypted Data With Authorized Deduplication in Cloud
    Xiong, Jinbo
    Zhang, Yuanyuan
    Tang, Shaohua
    Liu, Ximeng
    Yao, Zhiqiang
    IEEE ACCESS, 2019, 7 : 75090 - 75104
  • [38] A shareable keyword search over encrypted data in cloud computing
    Xu, Li
    Weng, Chi-Yao
    Yuan, Lun-Pin
    Wu, Mu-En
    Tso, Raylin
    Sun, Hung-Min
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (03): : 1001 - 1023
  • [39] Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Li, Jin
    Wang, Qian
    Wang, Cong
    Cao, Ning
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [40] Two-Step-Ranking Secure Multi-Keyword Search Over Encrypted Cloud Data
    Xu, Jun
    Zhang, Weiming
    Yang, Ce
    Xu, Jiajia
    Yu, Nenghai
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICE COMPUTING (CSC), 2012, : 124 - 130