Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2018

15.10.2016

DOAS: Efficient data owner authorized search over encrypted cloud data

verfasst von: Yinbin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Junwei Zhang, Fushan Wei

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data outsourcing service can shift the local data storage and maintenance to cloud service provider (CSP) to ease the burden from data owner, but it brings the data security threats as CSP is always considered to honest-but-curious. Therefore, searchable encryption (SE) technique which allows cloud clients (including data owner and data user) to securely search over ciphertext through keywords and selectively retrieve files of interest is of prime importance. However, in practice, data user’s access permission always dynamically varies with data owner’s preferences. Moreover, existing SE schemes which are based on attribute-based encryption (ABE) incur heavy computational burden through attribution revocation and policy updating. To allow data owner to flexibly grant access permissions, we design a secure cryptographic primitive called as efficient data owner authorized search over encrypted data scheme through utilizing identity-based encryption (IBE) technique. The formal security analysis proves that our scheme is secure against chosen-plaintext attack (CPA) and chosen-keyword attack (CKA) without random oracle. Besides, empirical experiments over real-world dataset show that our scheme is efficient and feasible with regard to data access control.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
2.
Zurück zum Zitat Jiang Q, Khan MK, Lu X, Ma JF, He DB (2016) A privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing. doi:10.1007/s11227-015-1610-x Jiang Q, Khan MK, Lu X, Ma JF, He DB (2016) A privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing. doi:10.​1007/​s11227-015-1610-x
3.
Zurück zum Zitat Ren Y J, Shen J, Wang J, Han J, Lee S Y (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323 Ren Y J, Shen J, Wang J, Han J, Lee S Y (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317–323
4.
Zurück zum Zitat Wei L F, Zhu H J, Cao Z F, Dong X L, Jia W W, Chen Y L, Vasilakos A (2014) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386CrossRef Wei L F, Zhu H J, Cao Z F, Dong X L, Jia W W, Chen Y L, Vasilakos A (2014) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386CrossRef
5.
Zurück zum Zitat Yang B, Zhang M W, Du J Q (2016) An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing. Concurr Comput Pract Exper 28(4):1083– 1093CrossRef Yang B, Zhang M W, Du J Q (2016) An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing. Concurr Comput Pract Exper 28(4):1083– 1093CrossRef
6.
Zurück zum Zitat Boneh D, Crescenzo G D, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506–522 Boneh D, Crescenzo G D, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506–522
7.
Zurück zum Zitat Dai S G, Li H G, Zhang F G (2016) Memory leakage-resilient searchable symmetric encryption. Fut Gen Comput Syst 62:76– 84CrossRef Dai S G, Li H G, Zhang F G (2016) Memory leakage-resilient searchable symmetric encryption. Fut Gen Comput Syst 62:76– 84CrossRef
8.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on computer and communications security. ACM, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on computer and communications security. ACM, pp 89–98
9.
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy. IEEE, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy. IEEE, pp 321–334
10.
Zurück zum Zitat Sun W H, Yu S C, Lou W J, Hou Y T, Li H (2016) Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198CrossRef Sun W H, Yu S C, Lou W J, Hou Y T, Li H (2016) Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187–1198CrossRef
11.
Zurück zum Zitat Zheng Q, Xu S H, Ateniese E G (2014) Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE International Conference on Computer Communications. IEEE, pp 522–530 Zheng Q, Xu S H, Ateniese E G (2014) Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE International Conference on Computer Communications. IEEE, pp 522–530
12.
Zurück zum Zitat Fang L M, Susilo W, Ge C P, Wang J D (2009) A secure channel free public key encryption with keyword search scheme without random oracle. In: International conference on cryptology and network security. Springer, pp 248–258 Fang L M, Susilo W, Ge C P, Wang J D (2009) A secure channel free public key encryption with keyword search scheme without random oracle. In: International conference on cryptology and network security. Springer, pp 248–258
13.
Zurück zum Zitat Miao Y B, Ma J F, Wei F S, Liu Z Q, Wang X A, Lu C B (2016) VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel. Peer-to-Peer Network Appli :1–13 Miao Y B, Ma J F, Wei F S, Liu Z Q, Wang X A, Lu C B (2016) VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel. Peer-to-Peer Network Appli :1–13
14.
Zurück zum Zitat Li H W, Liu D X, Dai Y S, Luan T H, Shen X M (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Topics Comput 3(1):127–138CrossRef Li H W, Liu D X, Dai Y S, Luan T H, Shen X M (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Topics Comput 3(1):127–138CrossRef
15.
Zurück zum Zitat Li H W, Liu D X, Dai Y S, Luan T H (2015) Engineering searchable encryption of mobile cloud networks: When QoE meets QoP. IEEE Wireless Commun 22(4):74–80CrossRef Li H W, Liu D X, Dai Y S, Luan T H (2015) Engineering searchable encryption of mobile cloud networks: When QoE meets QoP. IEEE Wireless Commun 22(4):74–80CrossRef
16.
Zurück zum Zitat Wen M, Lu R X, Zhang K, Lei J S, Liang X H, Shen X M (2013) PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Trans Emerg Topics Comput 1(1):178–191CrossRef Wen M, Lu R X, Zhang K, Lei J S, Liang X H, Shen X M (2013) PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Trans Emerg Topics Comput 1(1):178–191CrossRef
17.
Zurück zum Zitat Wen M, Lu R X, Lei J S, Liang X H, Li H W, Shen X M (2013) ECQ: An efficient conjunctive query scheme over encrypted multidimensional data in smart grid. In: IEEE global communications conference. IEEE, pp 796–801 Wen M, Lu R X, Lei J S, Liang X H, Li H W, Shen X M (2013) ECQ: An efficient conjunctive query scheme over encrypted multidimensional data in smart grid. In: IEEE global communications conference. IEEE, pp 796–801
18.
Zurück zum Zitat Fu Z J, Ren K, Shu J G, Sun XM, Huang FX (2015) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst. doi:10.1109/TPDS.2015.2506573 Fu Z J, Ren K, Shu J G, Sun XM, Huang FX (2015) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst. doi:10.​1109/​TPDS.​2015.​2506573
19.
Zurück zum Zitat Wen M, Lei J S, Bi Z Q (2013) SSE: A secure searchable encryption scheme for urban sensing and querying. Int J Distrib Sensor Netw:2013 Wen M, Lei J S, Bi Z Q (2013) SSE: A secure searchable encryption scheme for urban sensing and querying. Int J Distrib Sensor Netw:2013
20.
Zurück zum Zitat Miao Y B, Ma J F, Liu Z Q (2016) Revocable and anonymous searchable encryption in multi-user setting. Concurr Comput Pract Exper 28(4):1204–1218CrossRef Miao Y B, Ma J F, Liu Z Q (2016) Revocable and anonymous searchable encryption in multi-user setting. Concurr Comput Pract Exper 28(4):1204–1218CrossRef
21.
Zurück zum Zitat Yang Y, Ma M D (2016) Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans Inf Forens Secur 11(4):746– 759 Yang Y, Ma M D (2016) Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds. IEEE Trans Inf Forens Secur 11(4):746– 759
22.
Zurück zum Zitat Li H W, Yang Y, Luan T H, Liang X H, Zhou L, Shen X M (2016) Enabling fine-grained multi-keyword search supporting classified subdictionaries over encrypted cloud data. IEEE Trans Depend Secur Comput 13(3):312–325CrossRef Li H W, Yang Y, Luan T H, Liang X H, Zhou L, Shen X M (2016) Enabling fine-grained multi-keyword search supporting classified subdictionaries over encrypted cloud data. IEEE Trans Depend Secur Comput 13(3):312–325CrossRef
23.
Zurück zum Zitat Fu Z J, Sun X M, Liu Q, Zhou L, Shu J G (2015) Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans 98-B(1):190–200CrossRef Fu Z J, Sun X M, Liu Q, Zhou L, Shu J G (2015) Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans 98-B(1):190–200CrossRef
24.
Zurück zum Zitat Xia Z H, Wang X H, Sun X M, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef Xia Z H, Wang X H, Sun X M, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef
25.
Zurück zum Zitat Zhang W, Lin Y P, Xiao S, Wu J, Zhou S W (2016) Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans Comput 65(5):1566– 1577MathSciNetCrossRefMATH Zhang W, Lin Y P, Xiao S, Wu J, Zhou S W (2016) Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans Comput 65(5):1566– 1577MathSciNetCrossRefMATH
26.
Zurück zum Zitat Waters B (2005) Efficient identity-based encryption without random oracles. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 114–127 Waters B (2005) Efficient identity-based encryption without random oracles. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 114–127
27.
Zurück zum Zitat Khader D (2007) Public key encryption with keyword search based on k-resilient IBE. In: International conference on computational science and its applications. Springer, pp 1086– 1095 Khader D (2007) Public key encryption with keyword search based on k-resilient IBE. In: International conference on computational science and its applications. Springer, pp 1086– 1095
28.
Zurück zum Zitat Tomida K, Doi H, Mohri M, Shiraishi Y (2015) Ciphertext divided anonymous HIBE and its transformation to identity-based encryption with keyword search. J Inf Process 23(5):562– 569 Tomida K, Doi H, Mohri M, Shiraishi Y (2015) Ciphertext divided anonymous HIBE and its transformation to identity-based encryption with keyword search. J Inf Process 23(5):562– 569
Metadaten
Titel
DOAS: Efficient data owner authorized search over encrypted cloud data
verfasst von
Yinbin Miao
Jianfeng Ma
Ximeng Liu
Zhiquan Liu
Junwei Zhang
Fushan Wei
Publikationsdatum
15.10.2016
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2018
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-016-0523-7

Weitere Artikel der Ausgabe 3/2018

Peer-to-Peer Networking and Applications 3/2018 Zur Ausgabe