Skip to main content
Top

2019 | OriginalPaper | Chapter

A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud Computing

Authors : Fan Wang, Zheng Qin, Hui Yin

Published in: Cyberspace Safety and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The development of the Internet and the Internet of Things has led to a sharp increase in the amount of data. The great advantages of big data have promoted the research and usage of a series of related technologies in various fields. In the field of government, data from various departments is being aggregated to acquire more value which can help to improve the efficiency and quality of public service. Cloud computing, as an infrastructure of big data, is also applied in government big data. However, the sensitivity of government data determines that the data stored in the cloud must be well protected. Meanwhile, fine-grained data sharing is also important for the public services of government. Recently, several searchable attribute-based encryption schemes have been proposed to achieve fine-grained data access control and search on ciphertext simultaneously. Unfortunately, each of them has some imperfections in efficiency or access policy. In this paper, we propose a fine-grained authorized keyword secure search scheme by leveraging the attribute-based encryption primitive, whose access policy supports AND, OR, and threshold gates. We give the concrete construction, rigorous verification of correctness, detailed security analysis, and prove that our solution is efficiency through several experiments.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp. 321–334. IEEE (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp. 321–334. IEEE (2007)
7.
go back to reference Cui, H., Wan, Z., Deng, R.H., Wang, G., Li, Y.: Efficient and expressive keyword search over encrypted data in cloud. IEEE Trans. Dependable Secur. Comput. 15(3), 409–422 (2018)CrossRef Cui, H., Wan, Z., Deng, R.H., Wang, G., Li, Y.: Efficient and expressive keyword search over encrypted data in cloud. IEEE Trans. Dependable Secur. Comput. 15(3), 409–422 (2018)CrossRef
9.
go back to reference Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM, New York (2006) Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM, New York (2006)
10.
go back to reference Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 965–976. ACM, New York (2012) Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 965–976. ACM, New York (2012)
11.
go back to reference Kim, K.S., Kim, M., Lee, D., Park, J.H., Kim, W.H.: Forward secure dynamic searchable symmetric encryption with efficient updates. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1449–1463. ACM, New York (2017) Kim, K.S., Kim, M., Lee, D., Park, J.H., Kim, W.H.: Forward secure dynamic searchable symmetric encryption with efficient updates. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1449–1463. ACM, New York (2017)
12.
go back to reference Lai, J., Zhou, X., Deng, R.H., Li, Y., Chen, K.: Expressive search on encrypted data. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, pp. 243–252. ACM (2013) Lai, J., Zhou, X., Deng, R.H., Li, Y., Chen, K.: Expressive search on encrypted data. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, pp. 243–252. ACM (2013)
13.
go back to reference Peng, T., Liu, Q., Hu, B., Liu, J., Zhu, J.: Dynamic keyword search with hierarchical attributes in cloud computing. IEEE Access 6, 68948–68960 (2018)CrossRef Peng, T., Liu, Q., Hu, B., Liu, J., Zhu, J.: Dynamic keyword search with hierarchical attributes in cloud computing. IEEE Access 6, 68948–68960 (2018)CrossRef
15.
go back to reference Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp. 44–55. IEEE (2000) Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp. 44–55. IEEE (2000)
16.
go back to reference Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Toronto, ON, Canada, pp. 226–234. IEEE (2014) Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Toronto, ON, Canada, pp. 226–234. IEEE (2014)
17.
go back to reference Wang, Z., Han, W., Lin, Y., Li, J.: Research on security assurance architecture of e-government. Comput. Appl. 28(s1), 55–58 (2008) Wang, Z., Han, W., Lin, Y., Li, J.: Research on security assurance architecture of e-government. Comput. Appl. 28(s1), 55–58 (2008)
18.
go back to reference Yin, H., et al.: Secure conjunctive multi-keyword search for multiple data owners in cloud computing. In: ICPADS 2016, Wuhan, China, pp. 761–768. IEEE (2016) Yin, H., et al.: Secure conjunctive multi-keyword search for multiple data owners in cloud computing. In: ICPADS 2016, Wuhan, China, pp. 761–768. IEEE (2016)
19.
go back to reference Yin, H., Xiong, Y., Zhang, J., Ou, L., Liao, S., Qin, Z.: A key-policy searchable attribute-based encryption scheme for efficient keyword search and fine-grained access control over encrypted data. Electronics 8(256), 1–20 (2019) Yin, H., Xiong, Y., Zhang, J., Ou, L., Liao, S., Qin, Z.: A key-policy searchable attribute-based encryption scheme for efficient keyword search and fine-grained access control over encrypted data. Electronics 8(256), 1–20 (2019)
20.
go back to reference Yin, H., et al.: CP-ABSE: a ciphertext-policy attribute-based searchable encryption scheme. IEEE Access 7, 5682–5694 (2019)CrossRef Yin, H., et al.: CP-ABSE: a ciphertext-policy attribute-based searchable encryption scheme. IEEE Access 7, 5682–5694 (2019)CrossRef
Metadata
Title
A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud Computing
Authors
Fan Wang
Zheng Qin
Hui Yin
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-37352-8_38

Premium Partner