Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage

被引:17
|
作者
Zhang, Kai [1 ]
Jiang, Zhe [1 ]
Ning, Jianting [2 ,3 ]
Huang, Xinyi [2 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai 201306, Peoples R China
[2] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Security; Encryption; Authorization; Keyword search; Indexes; Eavesdropping; Cloud security; searchable encryption; attribute-based keyword search; subversion-resistant; cryptographic reverse firewall; ENCRYPTION; EFFICIENT;
D O I
10.1109/TIFS.2022.3172627
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure cloud search service allows resource-constrained clients to effectively search over encrypted cloud storage. Towards enabling owner-enforced search authorization, the notion of attribute-based keyword search (ABKS) has been introduced and widely deployed in practice. To enhance traditional security of ABKS, two state-of-the-art solutions are presented to address keyword guessing attacks or setup inconsistency for secret key. Nevertheless, they have not simultaneously considered the following threats to a data user: (i) inconsistent secret key/cipher-index caused by outside dishonest authority and/or data owner; (ii) algorithm substitution attacks (ASA) launched by inside adversarial eavesdropping. These attacks may unfortunately lead to cloud data breach and user information exposure. To tackle such outside and inside threats, we introduce subversion-resistance and consistency for secure and fine-grained cloud document search services. In particular, we propose a consistent ABKS system with cryptographic reverse firewalls (CRF). Technically, we refer to verifiable functional encryption and employ non-interactive zero-knowledge proofs of discrete logarithm equality to ensure strong input consistency for ABKS. In addition, we build a trusted CRF zone for sanitizing algorithm outputs against ASA attacks. Moreover, we formalize the security model and formally prove security of our system. To clarify practical performance, we implement state-of-the-art solutions and our system in real cloud environment based on Enron dataset. The results show that our system achieves more enhanced security properties without obviously sacrificing performance. In particular, our system achieves comparable time and storage cost for document-index encryption and document search, as compared to state-of-the-art solutions.
引用
收藏
页码:1771 / 1784
页数:14
相关论文
共 50 条
  • [41] Attribute-Based Secure Messaging in the Public Cloud
    Poh, Zhi Yuan
    Cui, Hui
    Deng, Robert H.
    Li, Yingjiu
    SYSTEMS APPROACH TO CYBER SECURITY, 2017, 15 : 86 - 96
  • [42] Attribute-Based Encryption with Multi-Keyword Search
    Li, Runhe
    Zheng, Dong
    Zhang, Yinghui
    Su, Haonan
    Yang, Menglei
    Lang, Pengzhen
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 172 - 177
  • [43] Practical verifiable multi-keyword attribute-based searchable signcryption in cloud storage
    Varri, Uma Sankararao
    Pasupuleti, Syam Kumar
    Kadambari, K., V
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 14 (9) : 11455 - 11467
  • [44] Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage
    Wang, Shangping
    Jia, Shasha
    Zhang, Yaling
    IEEE ACCESS, 2019, 7 : 50136 - 50147
  • [45] Efficient Attribute-Based Access Control With Authorized Search in Cloud Storage
    Hao, Jialu
    Liu, Jian
    Wang, Huimei
    Liu, Lingshuang
    Xian, Ming
    Shen, Xuemin
    IEEE ACCESS, 2019, 7 : 182772 - 182783
  • [46] Secure Symmetric Keyword Search with Keyword Privacy for Cloud Storage Services
    Youn, Taek-Young
    Rhee, Hyun Sook
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [47] Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage
    Liang, Kaitai
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 1981 - 1992
  • [48] Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing
    Wu, Axin
    Zheng, Dong
    Zhang, Yinghui
    Yang, Menglei
    SENSORS, 2018, 18 (07)
  • [49] Verifiable Attribute-Based Keyword Search Over Encrypted Cloud Data Supporting Data Deduplication
    Liu, Xueyan
    Lu, Tingting
    He, Xiaomei
    Yang, Xiaotao
    Niu, Shufen
    IEEE ACCESS, 2020, 8 (08): : 52062 - 52074
  • [50] Multiauthority Attribute-Based Keyword Search over Cloud-Edge-End Collaboration in IoV
    Zhen, Yan
    Chui, Yilan
    Zhang, Puning
    Liu, Huan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022