AKSER: Attribute-based keyword search with efficient revocation in cloud computing

被引:61
|
作者
Cui, Jie [1 ]
Zhou, Han [1 ]
Zhong, Hong [1 ]
Xu, Yan [1 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Hefei, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Outsourcing computation; Multi-keyword search; Attribute-based encryption; Efficient revocation; PUBLIC-KEY ENCRYPTION; SYMMETRIC-ENCRYPTION; SECURITY; PRIVACY;
D O I
10.1016/j.ins.2017.09.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advent of cloud computing, it is becoming increasingly popular for data owners to outsource their data to public cloud servers while allowing indented data users to retrieve these data stored in the cloud. For security and privacy reasons, data owners usually encrypt their data prior to outsourcing to the cloud server. At the same time, users often need to find data related to specific keywords of interest, this motivates research on the searchable encryption technique. In this paper, we focus on a different, yet more challenging, scenario where the outsourced dataset can have contribution from multiple owners and are searchable by multiple users. Based on our research of attribute-based encryption (ABE), we propose an attribute-based keyword search with efficient revocation scheme (AMER). Our scheme is highly efficient in terms of user revocation and can achieve fine-grained authorization of the search under the distributed multiple-attribute authorized institution. Security analysis demonstrates that the proposed scheme AKSER can achieve keyword semantic security, keyword secrecy, trapdoor unlinkability, and collusion resistance. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:343 / 352
页数:10
相关论文
共 50 条
  • [21] ABDKS: attribute-based encryption with dynamic keyword search in fog computing
    Fei MENG
    Leixiao CHENG
    Mingqiang WANG
    Frontiers of Computer Science, 2021, (05) : 189 - 197
  • [22] Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing
    Huang, Qinlong
    Ma, Zhaofeng
    Fu, Jingyi
    Niu, Xinxin
    Yang, Yixian
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2776 - 2781
  • [23] ABDKS: attribute-based encryption with dynamic keyword search in fog computing
    Meng, Fei
    Cheng, Leixiao
    Wang, Mingqiang
    FRONTIERS OF COMPUTER SCIENCE, 2021, 15 (05)
  • [24] Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
    Chen, Yanli
    Hu, Yuanyuan
    Zhu, Minhui
    Yang, Geng
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (08) : 1798 - 1808
  • [25] ABDKS: attribute-based encryption with dynamic keyword search in fog computing
    Fei Meng
    Leixiao Cheng
    Mingqiang Wang
    Frontiers of Computer Science, 2021, 15
  • [26] DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
    Nasiraee, H.
    Ashouri-Talouki, M.
    INTERNATIONAL JOURNAL OF ENGINEERING, 2019, 32 (09): : 1290 - 1298
  • [27] An Efficient Attribute-Based Multi-Keyword Search Scheme in Encrypted Keyword Generation
    Cui, Yuanbo
    Gao, Fei
    Shi, Yijie
    Yin, Wei
    Panaousis, Emmanouil
    Liang, Kaitai
    IEEE ACCESS, 2020, 8 (08): : 99024 - 99036
  • [28] Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing
    Li, Yuan
    Wang, Haiyan
    Wang, Shulan
    Ding, Yong
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [29] Efficient Decentralized Attribute-based Access Control for Cloud Storage with User Revocation
    Chen, Jianwei
    Ma, Huadong
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3782 - 3787
  • [30] Attribute-based public encryption with keyword search
    Li, S. (lishuang@th.btbu.edu.cn), 1600, Science Press (37):